Количество 4
Количество 4
CVE-2024-54152
Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.
CVE-2024-54152
Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.
GHSA-5462-4vcx-jh7j
Angular Expressions - Remote Code Execution when using locals
BDU:2024-11152
Уязвимость среды проектирования приложений и платформы разработки одностраничных приложений Аngular, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-54152 Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument. | 16% Средний | около 1 года назад | ||
CVE-2024-54152 Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument. | 16% Средний | около 1 года назад | ||
GHSA-5462-4vcx-jh7j Angular Expressions - Remote Code Execution when using locals | 16% Средний | около 1 года назад | ||
BDU:2024-11152 Уязвимость среды проектирования приложений и платформы разработки одностраничных приложений Аngular, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 16% Средний | около 1 года назад |
Уязвимостей на страницу