We found results for “”
CVE-2024-21490
Good to know:
Date: February 10, 2024
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service. Note: This package is EOL and will not receive any updates to address this issue. Users should migrate to "@angular/core" (https://www.npmjs.com/package/@angular/core).
Language: JS
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Inefficient Regular Expression Complexity
CWE-1333Top Fix
Upgrade Version
Upgrade to version angular - 1.9.7;angular - 1.5.23;angular-loader - 1.5.23-loader;angular-loader - 1.9.7-loader;angular-parse-ext - 1.9.7-parse-ext;angular-parse-ext - 1.5.23-parse-ext;angular-mocks - 1.5.23-mocks;angular-mocks - 1.9.7-mocks;angular-touch - 1.9.7-touch;angular-touch - 1.5.23-touch;angular-sanitize - 1.9.7-sanitize;angular-sanitize - 1.5.23-sanitize;angular-resource - 1.5.23-resource;angular-resource - 1.9.7-resource;angular-cookies - 1.5.23-cookies;angular-cookies - 1.9.7-cookies;angular-messages - 1.9.7-messages;angular-messages - 1.5.23-messages;angular-animate - 1.9.7-animate;angular-animate - 1.5.23-animate;angular-aria - 1.9.7-aria;angular-aria - 1.5.23-aria;angular-message-format - 1.5.23-message-format;angular-message-format - 1.9.7-message-format;angular-route - 1.5.23-route;angular-route - 1.9.7-route;angular-i18n - 1.5.23-i18n;angular-i18n - 1.9.7-i18n
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


