We found results for “”
WS-2017-0126
Good to know:
Date: November 12, 2013
Affected versions of the package are vulnerable to Protection Bypass via ng-attr-action and ng-attr-srcdoc
Language: JS
Severity Score
Severity Score
Weakness Type (CWE)
Authentication Bypass Using an Alternate Path or Channel
CWE-288Top Fix
Upgrade Version
Upgrade to version melisplatform/melis-core - dev-php-7.0;melisplatform/melis-core - v4.0.8;melisplatform/melis-core - dev-fix/gdpr-email-conf-smtp;melisplatform/melis-core - dev-fix/log-error-500;melisplatform/melis-core - v4.1.1;melisplatform/melis-core - v4.0.15;melisplatform/melis-core - dev-fix/reset-password-link;melisplatform/melis-core - v4.0.18;melisplatform/melis-core - no_fix;melisplatform/melis-core - v3.2.0;melisplatform/melis-core - dev-fix/bo-lang-icon-column;melisplatform/melis-core - v3.0.0;melisplatform/melis-core - dev-update/php-8-upgrade;melisplatform/melis-core - dev-feature/update-tinymce-5.10.0;melisplatform/melis-core - dev-feature/update-dashboard-plugin;melisplatform/melis-core - v2.1;melisplatform/melis-core - v3.0.13;melisplatform/melis-core - v3.1.2;melisplatform/melis-core - dev-update/change-composer-version;melisplatform/melis-core - v2.4.4;rogerclotet/angularjsbundle - 1.0.3;angular - v1.0.7;angular - v1.2.0-rc.1;HotTowel-Angular - no_fix;HotTowel-Angular - 2.0.0-beta8;tiny-queries/tiny-queries - v3.0;atlantis/admin - no_fix;angularjs - 1.2.2;jadu/pulsar - 1.0.16;angularjs-seedfriendy - no_fix;angular - 1.2.2;AngularJS.Locale - 1.2.0-rc3;mak.rocks.AngularJsMvcCrud.client - no_fix;AngularJS.Core - 1.2.3;mak.rocks.AngularJsMvcCrudAuthenticationGlobalization.client - no_fix;hatframework/hat-skeleton - v0.1.1;pi/pi - 2.5.0;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:1.2.0.redhat-133;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;io.fabric8.support:support-webapp:no_fix;org.webjars.bower:ngFlowGrid:no_fix;org.webjars.bower:angular:1.2.7;org.webjars.npm:angular:1.2.23;org.webjars.bower:angular-1.1.6:1.2.16;org.webjars.npm:angular-ellipsis:no_fix;org.webjars:angularjs:1.2.2;org.webjars.npm:ng-twitter:no_fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | LOW |
Vulnerabilities
Projects
Contact Us


