Show filters
687 Total Results
Displaying 181-190 of 687
Sort by:
Attacker Value
Unknown
CVE-2022-45429
Disclosure Date: December 27, 2022 (last updated February 24, 2025)
Some Dahua software products have a vulnerability of server-side request forgery (SSRF). An Attacker can access internal resources by concatenating links (URL) that conform to specific rules.
0
Attacker Value
Unknown
CVE-2022-4725
Disclosure Date: December 27, 2022 (last updated February 24, 2025)
A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 is able to address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2022-37313
Disclosure Date: December 26, 2022 (last updated February 24, 2025)
OX App Suite through 7.10.6 allows SSRF because the anti-SSRF protection mechanism only checks the first DNS AA or AAAA record.
0
Attacker Value
Unknown
CVE-2022-3189
Disclosure Date: December 21, 2022 (last updated February 24, 2025)
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where a specially crafted PHP script could use parameters from a HTTP request to create a URL capable of changing the host parameter. The changed host parameter in the HTTP could point to another host that will send a request to the host or IP specified in the changed host parameter.
0
Attacker Value
Unknown
CVE-2022-47635
Disclosure Date: December 21, 2022 (last updated February 24, 2025)
Wildix WMS 6 before 6.02.20221216, WMS 5 before 5.04.20221214, and WMS4 before 4.04.45396.23 allows Server-side request forgery (SSRF) via ZohoClient.php.
0
Attacker Value
Unknown
CVE-2022-38708
Disclosure Date: December 19, 2022 (last updated February 24, 2025)
IBM Cognos Analytics 11.1.7 11.2.0, and 11.2.1 could be vulnerable to a Server-Side Request Forgery Attack (SSRF) attack by constructing URLs from user-controlled data. This could enable attackers to make arbitrary requests to the internal network or to the local file system. IBM X-Force ID: 234180.
0
Attacker Value
Unknown
CVE-2022-39039
Disclosure Date: December 14, 2022 (last updated February 24, 2025)
aEnrich’s a+HRD has inadequate filtering for specific URL parameter. An unauthenticated remote attacker can exploit this vulnerability to send arbitrary HTTP(s) request to launch Server-Side Request Forgery (SSRF) attack, to perform arbitrary system command or disrupt service.
0
Attacker Value
Unknown
CVE-2022-42343
Disclosure Date: December 13, 2022 (last updated February 24, 2025)
Adobe Campaign version 7.3.1 (and earlier) and 8.3.9 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A low-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction.
0
Attacker Value
Unknown
CVE-2022-46364
Disclosure Date: December 13, 2022 (last updated February 24, 2025)
A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.
0
Attacker Value
Unknown
CVE-2022-41949
Disclosure Date: December 08, 2022 (last updated February 24, 2025)
DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. In affected versions an authenticated DHIS2 user can craft a request to DHIS2 to instruct the server to make requests to external resources (like third party servers). This could allow an attacker, for example, to identify vulnerable services which might not be otherwise exposed to the public internet or to determine whether a specific file is present on the DHIS2 server. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. At this time, there is no known workaround or mitigation for this vulnerability.
0