Show filters
707 Total Results
Displaying 191-200 of 707
Sort by:
Attacker Value
Unknown
CVE-2021-37498
Disclosure Date: January 20, 2023 (last updated February 24, 2025)
An SSRF issue was discovered in Reprise License Manager (RLM) web interface through 14.2BL4 that allows remote attackers to trigger outbound requests to intranet servers, conduct port scans via the actserver parameter in License Activation function.
0
Attacker Value
Unknown
CVE-2023-20002
Disclosure Date: January 20, 2023 (last updated February 24, 2025)
A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device.
This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system.
0
Attacker Value
Unknown
CVE-2022-45926
Disclosure Date: January 18, 2023 (last updated February 24, 2025)
An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The endpoint notify.localizeEmailTemplate allows a low-privilege user to evaluate webreports.
0
Attacker Value
Unknown
CVE-2023-22493
Disclosure Date: January 13, 2023 (last updated February 24, 2025)
RSSHub is an open source RSS feed generator. RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. An attacker could also use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. The patch for this issue can be found in commit a66cbcf.
0
Attacker Value
Unknown
CVE-2022-3841
Disclosure Date: January 13, 2023 (last updated February 24, 2025)
RHACM: unauthenticated SSRF in console API endpoint. A Server-Side Request Forgery (SSRF) vulnerability was found in the console API endpoint from Red Hat Advanced Cluster Management for Kubernetes (RHACM). An attacker could take advantage of this as the console API endpoint is missing an authentication check, allowing unauthenticated users making requests.
0
Attacker Value
Unknown
CVE-2022-25026
Disclosure Date: January 12, 2023 (last updated February 24, 2025)
A Server-Side Request Forgery (SSRF) in Rocket TRUfusion Portal v7.9.2.1 allows remote attackers to gain access to sensitive resources on the internal network via a crafted HTTP request to /trufusionPortal/upDwModuleProxy.
0
Attacker Value
Unknown
CVE-2023-21761
Disclosure Date: January 10, 2023 (last updated February 24, 2025)
Microsoft Exchange Server Information Disclosure Vulnerability
0
Attacker Value
Unknown
CVE-2022-45027
Disclosure Date: January 01, 2023 (last updated February 24, 2025)
perfSONAR before 4.4.6, when performing participant discovery, incorrectly uses an HTTP request header value to determine a local address.
0
Attacker Value
Unknown
CVE-2017-20157
Disclosure Date: December 31, 2022 (last updated February 24, 2025)
A vulnerability was found in Ariadne Component Library up to 2.x. It has been classified as critical. Affected is an unknown function of the file src/url/Url.php. The manipulation leads to server-side request forgery. Upgrading to version 3.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217140.
0
Attacker Value
Unknown
CVE-2022-23544
Disclosure Date: December 28, 2022 (last updated February 24, 2025)
MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.0 are subject to a Server-Side Request Forgery that leads to Cross-Site Scripting. A Server-Side request forgery in `IssueProxyResourceService::getMdImageByUrl` allows an attacker to access internal resources, as well as executing JavaScript code in the context of Metersphere's origin by a victim of a reflected XSS. This vulnerability has been fixed in v2.5.0. There are no known workarounds.
0