Show filters
460 Total Results
Displaying 71-80 of 460
Sort by:
Attacker Value
Unknown

CVE-2022-28997

Disclosure Date: May 23, 2022 (last updated February 23, 2025)
CSZCMS v1.3.0 allows attackers to execute a Server-Side Request Forgery (SSRF) which can be leveraged to leak sensitive data via a local file inclusion at /admin/filemanager/connector/.
Attacker Value
Unknown

CVE-2022-29188

Disclosure Date: May 21, 2022 (last updated February 23, 2025)
Smokescreen is an HTTP proxy. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by surrounding the hostname with square brackets (e.g. `[example.com]`). This only impacted the HTTP proxy functionality of Smokescreen. HTTPS requests were not impacted. Smokescreen version 0.0.4 contains a patch for this issue.
Attacker Value
Unknown

CVE-2022-1784

Disclosure Date: May 20, 2022 (last updated February 23, 2025)
Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.8.
Attacker Value
Unknown

CVE-2022-1767

Disclosure Date: May 18, 2022 (last updated February 23, 2025)
Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.7.
Attacker Value
Unknown

CVE-2022-28616

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
A remote server-side request forgery (ssrf) vulnerability was discovered in HPE OneView version(s): Prior to 7.0. HPE has provided a software update to resolve this vulnerability in HPE OneView.
Attacker Value
Unknown

CVE-2022-24856

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
FlyteConsole is the web user interface for the Flyte platform. FlyteConsole prior to version 0.52.0 is vulnerable to server-side request forgery (SSRF) when FlyteConsole is open to the general internet. An attacker can exploit any user of a vulnerable instance to access the internal metadata server or other unauthenticated URLs. Passing of headers to an unauthorized actor may occur. The patch for this issue deletes the entire `cors_proxy`, as this is not required for console anymore. A patch is available in FlyteConsole version 0.52.0. Disable FlyteConsole availability on the internet as a workaround.
Attacker Value
Unknown

CVE-2022-1711

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.5.
Attacker Value
Unknown

CVE-2022-1723

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.6.
Attacker Value
Unknown

CVE-2022-23668

Disclosure Date: May 16, 2022 (last updated February 23, 2025)
A remote authenticated server-side request forgery (ssrf) vulnerability was discovered in Aruba ClearPass Policy Manager version(s): 6.10.4 and below, 6.9.9 and below, 6.8.9-HF2 and below, 6.7.x and below. Aruba has released updates to ClearPass Policy Manage that address this security vulnerability.
Attacker Value
Unknown

CVE-2022-1722

Disclosure Date: May 16, 2022 (last updated February 23, 2025)
SSRF in editor's proxy via IPv6 link-local address in GitHub repository jgraph/drawio prior to 18.0.5. SSRF to internal link-local IPv6 addresses