![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-26116
https://notcve.org/view.php?id=CVE-2023-26116
30 Mar 2023 — Versions of the package angular from 1.2.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. • https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ • CWE-1333: Inefficient Regular Expression Complexity •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-26118
https://notcve.org/view.php?id=CVE-2023-26118
30 Mar 2023 — Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. • https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ • CWE-1333: Inefficient Regular Expression Complexity •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-26117
https://notcve.org/view.php?id=CVE-2023-26117
30 Mar 2023 — Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. • https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ • CWE-1333: Inefficient Regular Expression Complexity •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-4231 – Angular Comment cross site scripting
https://notcve.org/view.php?id=CVE-2021-4231
26 May 2022 — A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. • https://github.com/angular/angular/commit/ba8da742e3b243e8f43d4c63aa842b44e14f2b09 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •