Логотип exploitDog
bind:CVE-2024-54152
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-54152

Количество 4

Количество 4

ubuntu логотип

CVE-2024-54152

около 1 года назад

Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.

EPSS: Средний
nvd логотип

CVE-2024-54152

около 1 года назад

Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.

EPSS: Средний
github логотип

GHSA-5462-4vcx-jh7j

около 1 года назад

Angular Expressions - Remote Code Execution when using locals

EPSS: Средний
fstec логотип

BDU:2024-11152

около 1 года назад

Уязвимость среды проектирования приложений и платформы разработки одностраничных приложений Аngular, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-54152

Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.

16%
Средний
около 1 года назад
nvd логотип
CVE-2024-54152

Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.

16%
Средний
около 1 года назад
github логотип
GHSA-5462-4vcx-jh7j

Angular Expressions - Remote Code Execution when using locals

16%
Средний
около 1 года назад
fstec логотип
BDU:2024-11152

Уязвимость среды проектирования приложений и платформы разработки одностраничных приложений Аngular, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
16%
Средний
около 1 года назад

Уязвимостей на страницу