Vulnerability Details CVE-2024-8372
Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .
This issue affects AngularJS versions 1.3.0-rc.4 and greater.
Note:
The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 35.6%
CVSS Severity
CVSS v3 Score 4.8
Products affected by CVE-2024-8372
-
cpe:2.3:a:angularjs:angular.js:1.3.0
-
cpe:2.3:a:angularjs:angular.js:1.3.1
-
cpe:2.3:a:angularjs:angular.js:1.3.10
-
cpe:2.3:a:angularjs:angular.js:1.3.11
-
cpe:2.3:a:angularjs:angular.js:1.3.12
-
cpe:2.3:a:angularjs:angular.js:1.3.13
-
cpe:2.3:a:angularjs:angular.js:1.3.14
-
cpe:2.3:a:angularjs:angular.js:1.3.15
-
cpe:2.3:a:angularjs:angular.js:1.3.16
-
cpe:2.3:a:angularjs:angular.js:1.3.17
-
cpe:2.3:a:angularjs:angular.js:1.3.18
-
cpe:2.3:a:angularjs:angular.js:1.3.19
-
cpe:2.3:a:angularjs:angular.js:1.3.2
-
cpe:2.3:a:angularjs:angular.js:1.3.20
-
cpe:2.3:a:angularjs:angular.js:1.3.3
-
cpe:2.3:a:angularjs:angular.js:1.3.4
-
cpe:2.3:a:angularjs:angular.js:1.3.5
-
cpe:2.3:a:angularjs:angular.js:1.3.6
-
cpe:2.3:a:angularjs:angular.js:1.3.7
-
cpe:2.3:a:angularjs:angular.js:1.3.8
-
cpe:2.3:a:angularjs:angular.js:1.3.9
-
cpe:2.3:a:angularjs:angular.js:1.4.0
-
cpe:2.3:a:angularjs:angular.js:1.4.1
-
cpe:2.3:a:angularjs:angular.js:1.4.10
-
cpe:2.3:a:angularjs:angular.js:1.4.11
-
cpe:2.3:a:angularjs:angular.js:1.4.12
-
cpe:2.3:a:angularjs:angular.js:1.4.13
-
cpe:2.3:a:angularjs:angular.js:1.4.14
-
cpe:2.3:a:angularjs:angular.js:1.4.2
-
cpe:2.3:a:angularjs:angular.js:1.4.3
-
cpe:2.3:a:angularjs:angular.js:1.4.4
-
cpe:2.3:a:angularjs:angular.js:1.4.5
-
cpe:2.3:a:angularjs:angular.js:1.4.6
-
cpe:2.3:a:angularjs:angular.js:1.4.7
-
cpe:2.3:a:angularjs:angular.js:1.4.8
-
cpe:2.3:a:angularjs:angular.js:1.4.9
-
cpe:2.3:a:angularjs:angular.js:1.5.0
-
cpe:2.3:a:angularjs:angular.js:1.5.1
-
cpe:2.3:a:angularjs:angular.js:1.5.10
-
cpe:2.3:a:angularjs:angular.js:1.5.11
-
cpe:2.3:a:angularjs:angular.js:1.5.2
-
cpe:2.3:a:angularjs:angular.js:1.5.3
-
cpe:2.3:a:angularjs:angular.js:1.5.4
-
cpe:2.3:a:angularjs:angular.js:1.5.5
-
cpe:2.3:a:angularjs:angular.js:1.5.6
-
cpe:2.3:a:angularjs:angular.js:1.5.7
-
cpe:2.3:a:angularjs:angular.js:1.5.8
-
cpe:2.3:a:angularjs:angular.js:1.5.9
-
cpe:2.3:a:angularjs:angular.js:1.6.0
-
cpe:2.3:a:angularjs:angular.js:1.6.1
-
cpe:2.3:a:angularjs:angular.js:1.6.10
-
cpe:2.3:a:angularjs:angular.js:1.6.2
-
cpe:2.3:a:angularjs:angular.js:1.6.3
-
cpe:2.3:a:angularjs:angular.js:1.6.4
-
cpe:2.3:a:angularjs:angular.js:1.6.5
-
cpe:2.3:a:angularjs:angular.js:1.6.6
-
cpe:2.3:a:angularjs:angular.js:1.6.7
-
cpe:2.3:a:angularjs:angular.js:1.6.8
-
cpe:2.3:a:angularjs:angular.js:1.6.9
-
cpe:2.3:a:angularjs:angular.js:1.7.0
-
cpe:2.3:a:angularjs:angular.js:1.7.1
-
cpe:2.3:a:angularjs:angular.js:1.7.2
-
cpe:2.3:a:angularjs:angular.js:1.7.3
-
cpe:2.3:a:angularjs:angular.js:1.7.4
-
cpe:2.3:a:angularjs:angular.js:1.7.5
-
cpe:2.3:a:angularjs:angular.js:1.7.6
-
cpe:2.3:a:angularjs:angular.js:1.7.7
-
cpe:2.3:a:angularjs:angular.js:1.7.8
-
cpe:2.3:a:angularjs:angular.js:1.7.9
-
cpe:2.3:a:angularjs:angular.js:1.8.0
-
cpe:2.3:a:netapp:active_iq_unified_manager:-