You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
mend-bolt-for-githubbot
changed the title
CVE-2023-26117 (Medium) detected in angular-1.8.3.tgz
CVE-2023-26117 (Medium) detected in angular-1.8.3.tgz - autoclosed
Mar 12, 2025
mend-bolt-for-githubbot
changed the title
CVE-2023-26117 (Medium) detected in angular-1.8.3.tgz - autoclosed
CVE-2023-26117 (Medium) detected in angular-1.8.3.tgz
Apr 28, 2025
Uh oh!
There was an error while loading. Please reload this page.
CVE-2023-26117 - Medium Severity Vulnerability
HTML enhanced for web apps
Library home page: https://registry.npmjs.org/angular/-/angular-1.8.3.tgz
Path to dependency file: /vendor/cache/manageiq-ui-classic-4dce1e6af35a/package.json
Path to vulnerable library: /vendor/cache/manageiq-ui-classic-4dce1e6af35a/package.json
Dependency Hierarchy:
Found in HEAD commit: 99489caead4b82daad011bd2d1b5f720b8428654
Found in base branch: master
Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
Publish Date: 2023-03-30
URL: CVE-2023-26117
Base Score Metrics:
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: