CVE-2024-8372
- EPSS 0.17%
- Veröffentlicht 09.09.2024 15:15:12
- Zuletzt bearbeitet 28.04.2025 14:15:20
Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This...
CVE-2024-8373
- EPSS 0.03%
- Veröffentlicht 09.09.2024 15:15:12
- Zuletzt bearbeitet 12.02.2025 20:15:05
Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attack...
CVE-2024-21490
- EPSS 0.64%
- Veröffentlicht 10.02.2024 05:15:08
- Zuletzt bearbeitet 16.01.2025 12:15:25
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastr...
CVE-2020-7676
- EPSS 0.7%
- Veröffentlicht 08.06.2020 14:15:13
- Zuletzt bearbeitet 21.11.2024 05:37:35
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing cod...
CVE-2019-14863
- EPSS 0.24%
- Veröffentlicht 02.01.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 04:27:31
There is a vulnerability in all angular versions before 1.5.0-beta.0, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
CVE-2019-10768
- EPSS 0.5%
- Veröffentlicht 19.11.2019 21:15:11
- Zuletzt bearbeitet 21.11.2024 04:19:53
In AngularJS before 1.7.9 the function `merge()` could be tricked into adding or modifying properties of `Object.prototype` using a `__proto__` payload.