| 0 |
| url |
VCID-1nqc-e1g6-e3bf |
| vulnerability_id |
VCID-1nqc-e1g6-e3bf |
| summary |
Cross-Site Scripting via JSONP
JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:npm/angular@1.6.0 |
| purl |
pkg:npm/angular@1.6.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1x1p-ye9j-rug4 |
|
| 1 |
| vulnerability |
VCID-2m5b-zvmc-pygf |
|
| 2 |
| vulnerability |
VCID-6map-62jp-tkgu |
|
| 3 |
| vulnerability |
VCID-7p32-5sdx-j3hq |
|
| 4 |
| vulnerability |
VCID-8juz-913g-zfdb |
|
| 5 |
| vulnerability |
VCID-cfxn-m6af-2kb8 |
|
| 6 |
| vulnerability |
VCID-cpwp-gasq-kffz |
|
| 7 |
| vulnerability |
VCID-dxq2-dfym-3fcv |
|
| 8 |
| vulnerability |
VCID-njvf-2y8u-5kfw |
|
| 9 |
| vulnerability |
VCID-qwfu-v1x6-e3ep |
|
| 10 |
| vulnerability |
VCID-rcvr-9ews-tfab |
|
| 11 |
| vulnerability |
VCID-rvrc-5q4c-63bh |
|
| 12 |
| vulnerability |
VCID-tbpx-hrpt-gkej |
|
| 13 |
| vulnerability |
VCID-xd5a-s1n3-bkhg |
|
| 14 |
| vulnerability |
VCID-yjab-2vra-zug8 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/angular@1.6.0 |
|
|
| aliases |
GHSA-28hp-fgcr-2r4h, GMS-2019-114
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1nqc-e1g6-e3bf |
|
| 1 |
| url |
VCID-1x1p-ye9j-rug4 |
| vulnerability_id |
VCID-1x1p-ye9j-rug4 |
| summary |
Improper sanitization of the value of the `[srcset]` attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .
This issue affects AngularJS versions 1.3.0-rc.4 and greater.
Note:
The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status . |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8372 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03346 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03225 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03296 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03215 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0324 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03261 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03289 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03331 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0331 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03305 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03285 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8372 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/angular/angular.js |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
2.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/angular/angular.js |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-8372, GHSA-m9gf-397r-hwpg
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1x1p-ye9j-rug4 |
|
| 2 |
| url |
VCID-2m5b-zvmc-pygf |
| vulnerability_id |
VCID-2m5b-zvmc-pygf |
| summary |
XSS in $sanitize in Safari/Firefox
Both Firefox and Safari are vulnerable to XSS if we use an inert document created via `document.implementation.createHTMLDocument()`. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:npm/angular@1.6.5 |
| purl |
pkg:npm/angular@1.6.5 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1x1p-ye9j-rug4 |
|
| 1 |
| vulnerability |
VCID-6map-62jp-tkgu |
|
| 2 |
| vulnerability |
VCID-8juz-913g-zfdb |
|
| 3 |
| vulnerability |
VCID-cfxn-m6af-2kb8 |
|
| 4 |
| vulnerability |
VCID-cpwp-gasq-kffz |
|
| 5 |
| vulnerability |
VCID-dxq2-dfym-3fcv |
|
| 6 |
| vulnerability |
VCID-njvf-2y8u-5kfw |
|
| 7 |
| vulnerability |
VCID-qwfu-v1x6-e3ep |
|
| 8 |
| vulnerability |
VCID-rcvr-9ews-tfab |
|
| 9 |
| vulnerability |
VCID-rvrc-5q4c-63bh |
|
| 10 |
| vulnerability |
VCID-tbpx-hrpt-gkej |
|
| 11 |
| vulnerability |
VCID-xd5a-s1n3-bkhg |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/angular@1.6.5 |
|
|
| aliases |
GMS-2017-134
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2m5b-zvmc-pygf |
|
| 3 |
| url |
VCID-6map-62jp-tkgu |
| vulnerability_id |
VCID-6map-62jp-tkgu |
| summary |
angular vulnerable to regular expression denial of service via the $resource service
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-26117 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.5084 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50855 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50878 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50836 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50838 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50781 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50824 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50799 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54914 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54893 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-26117 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:38:00Z/ |
|
|
| url |
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-26117, GHSA-2qqx-w9hr-q5gx
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6map-62jp-tkgu |
|
| 4 |
| url |
VCID-7p32-5sdx-j3hq |
| vulnerability_id |
VCID-7p32-5sdx-j3hq |
| summary |
Denial of service in $sanitize
Running $sanitize on bad HTML can freeze the browser. The problem occurs with clobbered data; typically the "nextSibling" property on an element is changed to one of it's child node, this makes it impossible to walk the HTML tree and leads to an infinite loop which freezes the browser. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:npm/angular@1.6.3 |
| purl |
pkg:npm/angular@1.6.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1x1p-ye9j-rug4 |
|
| 1 |
| vulnerability |
VCID-2m5b-zvmc-pygf |
|
| 2 |
| vulnerability |
VCID-6map-62jp-tkgu |
|
| 3 |
| vulnerability |
VCID-8juz-913g-zfdb |
|
| 4 |
| vulnerability |
VCID-cfxn-m6af-2kb8 |
|
| 5 |
| vulnerability |
VCID-cpwp-gasq-kffz |
|
| 6 |
| vulnerability |
VCID-dxq2-dfym-3fcv |
|
| 7 |
| vulnerability |
VCID-njvf-2y8u-5kfw |
|
| 8 |
| vulnerability |
VCID-qwfu-v1x6-e3ep |
|
| 9 |
| vulnerability |
VCID-rcvr-9ews-tfab |
|
| 10 |
| vulnerability |
VCID-rvrc-5q4c-63bh |
|
| 11 |
| vulnerability |
VCID-tbpx-hrpt-gkej |
|
| 12 |
| vulnerability |
VCID-xd5a-s1n3-bkhg |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/angular@1.6.3 |
|
|
| aliases |
GMS-2017-115
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7p32-5sdx-j3hq |
|
| 5 |
| url |
VCID-8juz-913g-zfdb |
| vulnerability_id |
VCID-8juz-913g-zfdb |
| summary |
angular vulnerable to super-linear runtime due to backtracking
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
**Note:**
This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21490 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84596 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84512 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84533 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84536 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84595 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84594 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84574 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84583 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84558 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.02246 |
| scoring_system |
epss |
| scoring_elements |
0.84564 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21490 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-21490, GHSA-4w4v-5hc9-xrr2
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8juz-913g-zfdb |
|
| 6 |
| url |
VCID-9nuw-8wc1-vkc4 |
| vulnerability_id |
VCID-9nuw-8wc1-vkc4 |
| summary |
Bypass CSP protection
Extension URIs (`resource://...`) bypass ````Content-Security-Policy```` in Chrome and Firefox and can always be loaded. Now if a site already has a XSS bug, and uses CSP to protect itself, but the user has an extension installed that uses Angular, an attacked can load Angular from the extension, and Angular's auto-bootstrapping can be used to bypass the victim site's CSP protection. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:npm/angular@1.5.9 |
| purl |
pkg:npm/angular@1.5.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nqc-e1g6-e3bf |
|
| 1 |
| vulnerability |
VCID-1x1p-ye9j-rug4 |
|
| 2 |
| vulnerability |
VCID-2m5b-zvmc-pygf |
|
| 3 |
| vulnerability |
VCID-6map-62jp-tkgu |
|
| 4 |
| vulnerability |
VCID-7p32-5sdx-j3hq |
|
| 5 |
| vulnerability |
VCID-8juz-913g-zfdb |
|
| 6 |
| vulnerability |
VCID-cfxn-m6af-2kb8 |
|
| 7 |
| vulnerability |
VCID-cpwp-gasq-kffz |
|
| 8 |
| vulnerability |
VCID-dxq2-dfym-3fcv |
|
| 9 |
| vulnerability |
VCID-njvf-2y8u-5kfw |
|
| 10 |
| vulnerability |
VCID-qwfu-v1x6-e3ep |
|
| 11 |
| vulnerability |
VCID-rcvr-9ews-tfab |
|
| 12 |
| vulnerability |
VCID-rvrc-5q4c-63bh |
|
| 13 |
| vulnerability |
VCID-tbpx-hrpt-gkej |
|
| 14 |
| vulnerability |
VCID-xd5a-s1n3-bkhg |
|
| 15 |
| vulnerability |
VCID-yjab-2vra-zug8 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/angular@1.5.9 |
|
| 1 |
| url |
pkg:npm/angular@1.6.0-rc.1 |
| purl |
pkg:npm/angular@1.6.0-rc.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nqc-e1g6-e3bf |
|
| 1 |
| vulnerability |
VCID-1x1p-ye9j-rug4 |
|
| 2 |
| vulnerability |
VCID-2m5b-zvmc-pygf |
|
| 3 |
| vulnerability |
VCID-6map-62jp-tkgu |
|
| 4 |
| vulnerability |
VCID-7p32-5sdx-j3hq |
|
| 5 |
| vulnerability |
VCID-8juz-913g-zfdb |
|
| 6 |
| vulnerability |
VCID-cfxn-m6af-2kb8 |
|
| 7 |
| vulnerability |
VCID-cpwp-gasq-kffz |
|
| 8 |
| vulnerability |
VCID-dxq2-dfym-3fcv |
|
| 9 |
| vulnerability |
VCID-njvf-2y8u-5kfw |
|
| 10 |
| vulnerability |
VCID-qwfu-v1x6-e3ep |
|
| 11 |
| vulnerability |
VCID-rcvr-9ews-tfab |
|
| 12 |
| vulnerability |
VCID-rvrc-5q4c-63bh |
|
| 13 |
| vulnerability |
VCID-tbpx-hrpt-gkej |
|
| 14 |
| vulnerability |
VCID-xd5a-s1n3-bkhg |
|
| 15 |
| vulnerability |
VCID-yjab-2vra-zug8 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/angular@1.6.0-rc.1 |
|
| 2 |
| url |
pkg:npm/angular@1.6.0 |
| purl |
pkg:npm/angular@1.6.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1x1p-ye9j-rug4 |
|
| 1 |
| vulnerability |
VCID-2m5b-zvmc-pygf |
|
| 2 |
| vulnerability |
VCID-6map-62jp-tkgu |
|
| 3 |
| vulnerability |
VCID-7p32-5sdx-j3hq |
|
| 4 |
| vulnerability |
VCID-8juz-913g-zfdb |
|
| 5 |
| vulnerability |
VCID-cfxn-m6af-2kb8 |
|
| 6 |
| vulnerability |
VCID-cpwp-gasq-kffz |
|
| 7 |
| vulnerability |
VCID-dxq2-dfym-3fcv |
|
| 8 |
| vulnerability |
VCID-njvf-2y8u-5kfw |
|
| 9 |
| vulnerability |
VCID-qwfu-v1x6-e3ep |
|
| 10 |
| vulnerability |
VCID-rcvr-9ews-tfab |
|
| 11 |
| vulnerability |
VCID-rvrc-5q4c-63bh |
|
| 12 |
| vulnerability |
VCID-tbpx-hrpt-gkej |
|
| 13 |
| vulnerability |
VCID-xd5a-s1n3-bkhg |
|
| 14 |
| vulnerability |
VCID-yjab-2vra-zug8 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/angular@1.6.0 |
|
|
| aliases |
GMS-2016-73
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9nuw-8wc1-vkc4 |
|
| 7 |
| url |
VCID-cfxn-m6af-2kb8 |
| vulnerability_id |
VCID-cfxn-m6af-2kb8 |
| summary |
Improper sanitization of the value of the `[srcset]` attribute in `<source>` HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .
This issue affects all versions of AngularJS.
Note:
The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status . |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8373 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02329 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02247 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02258 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02276 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02254 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02253 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02245 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0224 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8373 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/angular/angular.js |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
2.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/angular/angular.js |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-8373, GHSA-mqm9-c95h-x2p6
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cfxn-m6af-2kb8 |
|
| 8 |
| url |
VCID-cpwp-gasq-kffz |
| vulnerability_id |
VCID-cpwp-gasq-kffz |
| summary |
angular vulnerable to regular expression denial of service via the <input type="url"> element
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-26118 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67031 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67045 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67025 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67013 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.66989 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.66964 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67033 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0061 |
| scoring_system |
epss |
| scoring_elements |
0.69803 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0061 |
| scoring_system |
epss |
| scoring_elements |
0.69784 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-26118 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:37:33Z/ |
|
|
| url |
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-26118, GHSA-qwqh-hm9m-p5hr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cpwp-gasq-kffz |
|
| 9 |
| url |
VCID-dxq2-dfym-3fcv |
| vulnerability_id |
VCID-dxq2-dfym-3fcv |
| summary |
Cross Site Scripting
On Firefox there is a XSS vulnerability if a malicious attacker can write into the `xml:base` attribute on an SVG anchor. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:npm/angular@1.6.9 |
| purl |
pkg:npm/angular@1.6.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1x1p-ye9j-rug4 |
|
| 1 |
| vulnerability |
VCID-6map-62jp-tkgu |
|
| 2 |
| vulnerability |
VCID-8juz-913g-zfdb |
|
| 3 |
| vulnerability |
VCID-cfxn-m6af-2kb8 |
|
| 4 |
| vulnerability |
VCID-cpwp-gasq-kffz |
|
| 5 |
| vulnerability |
VCID-njvf-2y8u-5kfw |
|
| 6 |
| vulnerability |
VCID-qwfu-v1x6-e3ep |
|
| 7 |
| vulnerability |
VCID-rcvr-9ews-tfab |
|
| 8 |
| vulnerability |
VCID-rvrc-5q4c-63bh |
|
| 9 |
| vulnerability |
VCID-tbpx-hrpt-gkej |
|
| 10 |
| vulnerability |
VCID-xd5a-s1n3-bkhg |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/angular@1.6.9 |
|
|
| aliases |
GMS-2018-9
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dxq2-dfym-3fcv |
|
| 10 |
| url |
VCID-ex2m-smbh-3kgy |
| vulnerability_id |
VCID-ex2m-smbh-3kgy |
| summary |
AngularJS Cross-site Scripting due to failure to sanitize `xlink.href` attributes
Versions of `angular` prior to 1.5.0-beta.1 are vulnerable to Cross-Site Scripting. The package fails to sanitize `xlink:href` attributes, which may allow attackers to execute arbitrary JavaScript in a victim's browser if the value is user-controlled.
## Recommendation
Upgrade to version 1.5.0-beta.1 or later. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14863 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26711 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.2675 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26771 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26828 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26872 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26869 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26822 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26753 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26963 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26926 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00097 |
| scoring_system |
epss |
| scoring_elements |
0.26886 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14863 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:npm/angular@1.5.0-beta.2 |
| purl |
pkg:npm/angular@1.5.0-beta.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nqc-e1g6-e3bf |
|
| 1 |
| vulnerability |
VCID-1x1p-ye9j-rug4 |
|
| 2 |
| vulnerability |
VCID-2m5b-zvmc-pygf |
|
| 3 |
| vulnerability |
VCID-6map-62jp-tkgu |
|
| 4 |
| vulnerability |
VCID-7p32-5sdx-j3hq |
|
| 5 |
| vulnerability |
VCID-8juz-913g-zfdb |
|
| 6 |
| vulnerability |
VCID-9nuw-8wc1-vkc4 |
|
| 7 |
| vulnerability |
VCID-cfxn-m6af-2kb8 |
|
| 8 |
| vulnerability |
VCID-cpwp-gasq-kffz |
|
| 9 |
| vulnerability |
VCID-dxq2-dfym-3fcv |
|
| 10 |
| vulnerability |
VCID-njvf-2y8u-5kfw |
|
| 11 |
| vulnerability |
VCID-qwfu-v1x6-e3ep |
|
| 12 |
| vulnerability |
VCID-rcvr-9ews-tfab |
|
| 13 |
| vulnerability |
VCID-rvrc-5q4c-63bh |
|
| 14 |
| vulnerability |
VCID-tbpx-hrpt-gkej |
|
| 15 |
| vulnerability |
VCID-xd5a-s1n3-bkhg |
|
| 16 |
| vulnerability |
VCID-yjab-2vra-zug8 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/angular@1.5.0-beta.2 |
|
|
| aliases |
CVE-2019-14863, GHSA-r5fx-8r73-v86c
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ex2m-smbh-3kgy |
|
| 11 |
| url |
VCID-njvf-2y8u-5kfw |
| vulnerability_id |
VCID-njvf-2y8u-5kfw |
| summary |
AngularJS improperly sanitizes SVG elements
Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images.
This issue affects all versions of AngularJS.
Note:
The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status . |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0716 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14655 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14798 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14876 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14677 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14767 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14828 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14787 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.1475 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14694 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14594 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0716 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/angular/angular.js |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
2.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/angular/angular.js |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-0716, GHSA-j58c-ww9w-pwp5
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-njvf-2y8u-5kfw |
|
| 12 |
| url |
VCID-qwfu-v1x6-e3ep |
| vulnerability_id |
VCID-qwfu-v1x6-e3ep |
| summary |
angular vulnerable to regular expression denial of service via the angular.copy() utility
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-26116 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50855 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.5084 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50878 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50836 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50838 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50781 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50824 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50799 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54893 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54914 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-26116 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:36:07Z/ |
|
|
| url |
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-26116, GHSA-2vrf-hf26-jrp5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qwfu-v1x6-e3ep |
|
| 13 |
| url |
VCID-rcvr-9ews-tfab |
| vulnerability_id |
VCID-rcvr-9ews-tfab |
| summary |
XSS via JQLite DOM manipulation functions in AngularJS
### Summary
XSS may be triggered in AngularJS applications that sanitize user-controlled HTML snippets before passing them to `JQLite` methods like `JQLite.prepend`, `JQLite.after`, `JQLite.append`, `JQLite.replaceWith`, `JQLite.append`, `new JQLite` and `angular.element`.
### Description
JQLite (DOM manipulation library that's part of AngularJS) manipulates input HTML before inserting it to the DOM in `jqLiteBuildFragment`.
One of the modifications performed [expands an XHTML self-closing tag](https://github.com/angular/angular.js/blob/418355f1cf9a9a9827ae81d257966e6acfb5623a/src/jqLite.js#L218).
If `jqLiteBuildFragment` is called (e.g. via `new JQLite(aString)`) with user-controlled HTML string that was sanitized (e.g. with [DOMPurify](https://github.com/cure53/DOMPurify)), the transformation done by JQLite may modify some forms of an inert, sanitized payload into a payload containing JavaScript - and trigger an XSS when the payload is inserted into DOM.
This is similar to a bug in jQuery `htmlPrefilter` function that was [fixed in 3.5.0](https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/).
### Proof of concept
```javascript
const inertPayload = `<div><style><style/><img src=x onerror="alert(1337)"/>`Â
```
Note that the style element is not closed and `<img` would be a text node inside the style if inserted into the DOM as-is.
As such, some HTML sanitizers would leave the `<img` as is without processing it and stripping the `onerror` attribute.
```javascript
angular.element(document).append(inertPayload);
```
This will alert, as `<style/>` will be replaced with `<style></style>` before adding it to the DOM, closing the style element early and reactivating `img`.
### Patches
The issue is patched in `JQLite` bundled with angular 1.8.0. AngularJS users using JQuery should upgrade JQuery to 3.5.0, as a similar vulnerability [affects jQuery <3.5.0](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2).
### Workarounds
Changing sanitizer configuration not to allow certain tag grouping (e.g. `<option><style></option>`) or inline style elements may stop certain exploitation vectors, but it's uncertain if all possible exploitation vectors would be covered. Upgrade of AngularJS to 1.8.0 is recommended.
### References
https://github.com/advisories/GHSA-mhp6-pxh8-r675
https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://snyk.io/vuln/SNYK-JS-ANGULAR-570058 |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-5cp4-xmrw-59wf, GMS-2020-703
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rcvr-9ews-tfab |
|
| 14 |
| url |
VCID-rvrc-5q4c-63bh |
| vulnerability_id |
VCID-rvrc-5q4c-63bh |
| summary |
Angular vulnerable to Cross-site Scripting
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping `<option>` elements in `<select>` ones changes parsing behavior, leading to possibly unsanitizing code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7676 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68399 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68408 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.6837 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68403 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68415 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68388 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68371 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.6832 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68343 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68324 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68304 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7676 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-7676, GHSA-mhp6-pxh8-r675
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rvrc-5q4c-63bh |
|
| 15 |
| url |
VCID-tbpx-hrpt-gkej |
| vulnerability_id |
VCID-tbpx-hrpt-gkej |
| summary |
Angular (deprecated package) Cross-site Scripting
All versions of package angular are vulnerable to Cross-site Scripting (XSS) due to insecure page caching in the Internet Explorer browser, which allows interpolation of `<textarea>` elements.
NPM package [angular](https://www.npmjs.com/package/angular) is deprecated. Those who want to receive security updates should use the actively maintained package [@angular/core](https://www.npmjs.com/package/@angular/core). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25869 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07519 |
| scoring_system |
epss |
| scoring_elements |
0.91822 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.07519 |
| scoring_system |
epss |
| scoring_elements |
0.91814 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.07519 |
| scoring_system |
epss |
| scoring_elements |
0.9183 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.07519 |
| scoring_system |
epss |
| scoring_elements |
0.9181 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.07519 |
| scoring_system |
epss |
| scoring_elements |
0.91812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.07519 |
| scoring_system |
epss |
| scoring_elements |
0.91809 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.07519 |
| scoring_system |
epss |
| scoring_elements |
0.91802 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.07519 |
| scoring_system |
epss |
| scoring_elements |
0.9179 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.07708 |
| scoring_system |
epss |
| scoring_elements |
0.919 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.07708 |
| scoring_system |
epss |
| scoring_elements |
0.91892 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25869 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-25869, GHSA-prc3-vjfx-vhm9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tbpx-hrpt-gkej |
|
| 16 |
| url |
VCID-xd5a-s1n3-bkhg |
| vulnerability_id |
VCID-xd5a-s1n3-bkhg |
| summary |
angular Prototype Pollution vulnerability
Versions of `angular ` prior to 1.7.9 are vulnerable to prototype pollution. The deprecated API function `merge()` does not restrict the modification of an Object's prototype in the , which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
Upgrade to version 1.7.9 or later. The function was already deprecated and upgrades are not expected to break functionality. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10768 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55863 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.5586 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55842 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55862 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55854 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55851 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.558 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.5582 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55797 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55686 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00423 |
| scoring_system |
epss |
| scoring_elements |
0.62146 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10768 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:npm/angular@1.7.9 |
| purl |
pkg:npm/angular@1.7.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1x1p-ye9j-rug4 |
|
| 1 |
| vulnerability |
VCID-6map-62jp-tkgu |
|
| 2 |
| vulnerability |
VCID-8juz-913g-zfdb |
|
| 3 |
| vulnerability |
VCID-cfxn-m6af-2kb8 |
|
| 4 |
| vulnerability |
VCID-cpwp-gasq-kffz |
|
| 5 |
| vulnerability |
VCID-njvf-2y8u-5kfw |
|
| 6 |
| vulnerability |
VCID-qwfu-v1x6-e3ep |
|
| 7 |
| vulnerability |
VCID-rcvr-9ews-tfab |
|
| 8 |
| vulnerability |
VCID-rvrc-5q4c-63bh |
|
| 9 |
| vulnerability |
VCID-tbpx-hrpt-gkej |
|
| 10 |
| vulnerability |
VCID-tgyd-qy7s-kkew |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/angular@1.7.9 |
|
|
| aliases |
CVE-2019-10768, GHSA-89mq-4x47-5v83
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xd5a-s1n3-bkhg |
|
| 17 |
| url |
VCID-yjab-2vra-zug8 |
| vulnerability_id |
VCID-yjab-2vra-zug8 |
| summary |
Bypass CSP protection
, AngularJS allows bootstrapping of invalid/bad svg and currentScript if it was clobbered. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:npm/angular@1.6.3 |
| purl |
pkg:npm/angular@1.6.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1x1p-ye9j-rug4 |
|
| 1 |
| vulnerability |
VCID-2m5b-zvmc-pygf |
|
| 2 |
| vulnerability |
VCID-6map-62jp-tkgu |
|
| 3 |
| vulnerability |
VCID-8juz-913g-zfdb |
|
| 4 |
| vulnerability |
VCID-cfxn-m6af-2kb8 |
|
| 5 |
| vulnerability |
VCID-cpwp-gasq-kffz |
|
| 6 |
| vulnerability |
VCID-dxq2-dfym-3fcv |
|
| 7 |
| vulnerability |
VCID-njvf-2y8u-5kfw |
|
| 8 |
| vulnerability |
VCID-qwfu-v1x6-e3ep |
|
| 9 |
| vulnerability |
VCID-rcvr-9ews-tfab |
|
| 10 |
| vulnerability |
VCID-rvrc-5q4c-63bh |
|
| 11 |
| vulnerability |
VCID-tbpx-hrpt-gkej |
|
| 12 |
| vulnerability |
VCID-xd5a-s1n3-bkhg |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/angular@1.6.3 |
|
|
| aliases |
GMS-2017-110
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yjab-2vra-zug8 |
|