CVE-2024-21490
https://notcve.org/view.php?id=CVE-2024-21490
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service. **Note:** This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core). • https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos https://support.herodevs.com/hc/en-us/articles/25715686953485-CVE-2024-21490-AngularJS-Regular-Expression-Denial-of-Service-ReDoS • CWE-1333: Inefficient Regular Expression Complexity •
CVE-2023-26116
https://notcve.org/view.php?id=CVE-2023-26116
Versions of the package angular from 1.2.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. • https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321 https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044 https://stackblitz.com/edit/angul • CWE-1333: Inefficient Regular Expression Complexity •
CVE-2023-26118
https://notcve.org/view.php?id=CVE-2023-26118
Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. • https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327 https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046 https://stackblitz.com/edit/angul • CWE-1333: Inefficient Regular Expression Complexity •
CVE-2023-26117
https://notcve.org/view.php?id=CVE-2023-26117
Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. • https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324 https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045 https://stackblitz.com/edit/angul • CWE-1333: Inefficient Regular Expression Complexity •
CVE-2021-4231 – Angular Comment cross site scripting
https://notcve.org/view.php?id=CVE-2021-4231
A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. • https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09 https://github.com/angular/angular/issues/40136 https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902 https://vuldb.com/?id.181356 https://access.redhat.com/security/cve/CVE-2021-4231 https://bugzilla.redhat.com/show_bug.cgi?id=2094052 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •