Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-7676

Опубликовано: 08 июн. 2020
Источник: debian

Описание

angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
angular.jsfixed1.8.0-1package
angular.jsno-dsabusterpackage
angular.jsignoredstretchpackage
angular.jsno-dsajessiepackage

Примечания

  • https://github.com/angular/angular.js/pull/17028

  • https://snyk.io/vuln/SNYK-JS-ANGULAR-570058

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 5 лет назад

angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.

CVSS3: 5.4
redhat
больше 5 лет назад

angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.

CVSS3: 5.4
nvd
больше 5 лет назад

angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.

CVSS3: 5.4
github
больше 5 лет назад

Angular vulnerable to Cross-site Scripting