4 results (0.013 seconds)

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 5

Versions of the package angular from 1.2.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. • https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321 https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044 https://stackblitz.com/edit/angul • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 5

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. • https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327 https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046 https://stackblitz.com/edit/angul • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 5

Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. • https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324 https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045 https://stackblitz.com/edit/angul • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 5.4EPSS: 0%CPEs: 4EXPL: 0

A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. • https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09 https://github.com/angular/angular/issues/40136 https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902 https://vuldb.com/?id.181356 https://access.redhat.com/security/cve/CVE-2021-4231 https://bugzilla.redhat.com/show_bug.cgi?id=2094052 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •