" elements in "" ones changes p…"/> " elements in "" ones changes p…"/> " elements in "" ones changes p…"/> Code Scanner Integrations AI Features Vulnerability database Blog Try Vulnetix Request Demo CVE-2020-7676 PUBLISHED angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code. EPSS 0.56% · 68.2th percentile Risk Scores EPSS Score0.56%68.2th percentile Affected Products VendorProductVersions Ubuntu:Pro:20.04:LTSangular.js1.7.9-1, 1.5.10-1, 0Ubuntu:Pro:18.04:LTSangular.js1.5.10-1ubuntu0.1~esm1, 0, 1.5.10-1Ubuntu:Pro:16.04:LTSangular.js0, 1.2.28-1ubuntu2+esm1, 1.2.28-1ubuntu2 Timeline Jun 8, 2020 CVE PublishedApr 14, 2021 EPSS ScoreJun 22, 2021 EPSS ScoreAug 23, 2021 EPSS ScoreOct 24, 2021 EPSS ScoreFeb 25, 2022 EPSS ScoreApr 28, 2022 EPSS ScoreJun 29, 2022 EPSS ScoreAug 31, 2022 EPSS ScoreNov 1, 2022 EPSS ScoreJan 2, 2023 EPSS ScoreMar 5, 2023 EPSS Score References https://ubuntu.com/security/CVE-2020-7676 third-party-advisoryhttps://snyk.io/vuln/SNYK-JS-ANGULAR-570058 third-party-advisoryhttps://www.cve.org/CVERecord?id=CVE-2020-7676 third-party-advisory Open in Interactive Console →
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.
EPSS 0.56% · 68.2th percentile