First published: Tue Oct 15 2024(Updated: )
CVE-2019-10768 In AngularJS before 1.7.9 the function `merge()` could be tricked into adding or modifying properties of `Object.prototype` using a `__proto__` payload. CVE-2023-26116 Versions of the package angular from 1.2.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000141463 is critical due to potential exploitation of vulnerabilities in affected F5 BIG-IP versions.
To fix F5-K000141463, upgrade your F5 BIG-IP systems to the latest patched versions provided in the advisory.
F5-K000141463 affects F5 BIG-IP versions 15.1.0 to 15.1.10, 16.1.0 to 16.1.5, and 17.1.0 to 17.1.1.
F5-K000141463 identifies the vulnerabilities CVE-2019-10768 and CVE-2023-26116 affecting AngularJS.
Exploitation of F5-K000141463 could lead to unauthorized manipulation of properties and denial of service on systems running affected versions.