Show filters
439 Total Results
Displaying 61-70 of 439
Sort by:
Attacker Value
Unknown

CVE-2022-1398

Disclosure Date: May 16, 2022 (last updated February 23, 2025)
The External Media without Import WordPress plugin through 1.1.2 does not have any authorisation and does to ensure that medias added via URLs are external medias, which could allow any authenticated users, such as subscriber to perform blind SSRF attacks
Attacker Value
Unknown

CVE-2022-1386

Disclosure Date: May 16, 2022 (last updated February 23, 2025)
The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.
Attacker Value
Unknown

CVE-2022-30049

Disclosure Date: May 15, 2022 (last updated February 23, 2025)
A Server-Side Request Forgery (SSRF) in Rebuild v2.8.3 allows attackers to obtain the real IP address and scan Intranet information via the fileurl parameter.
Attacker Value
Unknown

CVE-2022-1379

Disclosure Date: May 14, 2022 (last updated February 23, 2025)
URL Restriction Bypass in GitHub repository plantuml/plantuml prior to V1.2022.5. An attacker can abuse this to bypass URL restrictions that are imposed by the different security profiles and achieve server side request forgery (SSRF). This allows accessing restricted internal resources/servers or sending requests to third party servers.
Attacker Value
Unknown

CVE-2020-22983

Disclosure Date: May 13, 2022 (last updated February 23, 2025)
A Server-Side Request Forgery (SSRF) vulnerability exists in MicroStrategy Web SDK 11.1 and earlier, allows remote unauthenticated attackers to conduct a server-side request forgery (SSRF) attack via the srcURL parameter to the shortURL task.
Attacker Value
Unknown

CVE-2022-29848

Disclosure Date: May 11, 2022 (last updated February 23, 2025)
In Progress Ipswitch WhatsUp Gold 17.0.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read sensitive operating-system attributes from a host that is accessible by the WhatsUp Gold system.
Attacker Value
Unknown

CVE-2022-29847

Disclosure Date: May 11, 2022 (last updated February 23, 2025)
In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.
Attacker Value
Unknown

CVE-2022-29180

Disclosure Date: May 07, 2022 (last updated February 23, 2025)
A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `charm` instances update immediately. This vulnerability was found in-house and we haven't been notified of any potential exploiters. ### Additional notes * Encrypted user data uploaded to the Charm server is safe as Charm servers cannot decrypt user data. This includes filenames, paths, and all key-value data. * Users running the official Charm [Docker images](https://github.com/charmbracelet/charm/blob/main/docker.md) are at minimal risk because the exploit is limited to the containerized filesystem.
Attacker Value
Unknown

CVE-2022-1592

Disclosure Date: May 05, 2022 (last updated February 23, 2025)
Server-Side Request Forgery in scout in GitHub repository clinical-genomics/scout prior to v4.42. An attacker could make the application perform arbitrary requests to fishing steal cookie, request to private area, or lead to xss...
Attacker Value
Unknown

CVE-2022-29942

Disclosure Date: May 04, 2022 (last updated February 23, 2025)
Talend Administration Center has a vulnerability that allows an authenticated user to use the Service Registry 'Add' functionality to perform SSRF HTTP GET requests on URLs in the internal network. The issue is fixed for versions 8.0.x in TPS-5189, versions 7.3.x in TPS-5175, and versions 7.2.x in TPS-5201. Earlier versions of Talend Administration Center may also be impacted; users are encouraged to update to a supported version.