Filtered by vendor Angularjs Subscriptions
Filtered by product Angular.js Subscriptions
Total 5 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-8373 1 Angularjs 1 Angular.js 2024-09-17 4.8 Medium
Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CVE-2024-8372 1 Angularjs 1 Angular.js 2024-09-17 4.8 Medium
Improper sanitization of the value of the '[srcset]' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CVE-2019-14863 2 Angularjs, Redhat 5 Angular.js, Decision Manager, Jboss Enterprise Bpms Platform and 2 more 2024-08-05 6.1 Medium
There is a vulnerability in all angular versions before 1.5.0-beta.0, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
CVE-2019-10768 2 Angularjs, Redhat 4 Angular.js, Amq Broker, Jboss Fuse and 1 more 2024-08-04 7.5 High
In AngularJS before 1.7.9 the function `merge()` could be tricked into adding or modifying properties of `Object.prototype` using a `__proto__` payload.
CVE-2020-7676 2 Angularjs, Redhat 5 Angular.js, Amq Broker, Ansible Tower and 2 more 2024-08-04 5.4 Medium
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.