Логотип exploitDog
bind:CVE-2023-26118
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26118

Количество 6

Количество 6

ubuntu логотип

CVE-2023-26118

почти 3 года назад

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-26118

почти 3 года назад

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-26118

почти 3 года назад

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-26118

почти 3 года назад

Versions of the package angular from 1.4.9 are vulnerable to Regular E ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-qwqh-hm9m-p5hr

почти 3 года назад

angular vulnerable to regular expression denial of service via the <input type="url"> element

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-05196

почти 3 года назад

Уязвимость функции input[url] среды проектирования приложений и платформы разработки одностраничных приложений Аngular, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-26118

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2023-26118

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-26118

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
debian логотип
CVE-2023-26118

Versions of the package angular from 1.4.9 are vulnerable to Regular E ...

CVSS3: 5.3
0%
Низкий
почти 3 года назад
github логотип
GHSA-qwqh-hm9m-p5hr

angular vulnerable to regular expression denial of service via the <input type="url"> element

CVSS3: 5.3
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-05196

Уязвимость функции input[url] среды проектирования приложений и платформы разработки одностраничных приложений Аngular, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
почти 3 года назад

Уязвимостей на страницу