Show filters
460 Total Results
Displaying 71-80 of 460
Sort by:
Attacker Value
Unknown
CVE-2022-28997
Disclosure Date: May 23, 2022 (last updated February 23, 2025)
CSZCMS v1.3.0 allows attackers to execute a Server-Side Request Forgery (SSRF) which can be leveraged to leak sensitive data via a local file inclusion at /admin/filemanager/connector/.
0
Attacker Value
Unknown
CVE-2022-29188
Disclosure Date: May 21, 2022 (last updated February 23, 2025)
Smokescreen is an HTTP proxy. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by surrounding the hostname with square brackets (e.g. `[example.com]`). This only impacted the HTTP proxy functionality of Smokescreen. HTTPS requests were not impacted. Smokescreen version 0.0.4 contains a patch for this issue.
0
Attacker Value
Unknown
CVE-2022-1784
Disclosure Date: May 20, 2022 (last updated February 23, 2025)
Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.8.
0
Attacker Value
Unknown
CVE-2022-1767
Disclosure Date: May 18, 2022 (last updated February 23, 2025)
Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.7.
0
Attacker Value
Unknown
CVE-2022-28616
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
A remote server-side request forgery (ssrf) vulnerability was discovered in HPE OneView version(s): Prior to 7.0. HPE has provided a software update to resolve this vulnerability in HPE OneView.
0
Attacker Value
Unknown
CVE-2022-24856
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
FlyteConsole is the web user interface for the Flyte platform. FlyteConsole prior to version 0.52.0 is vulnerable to server-side request forgery (SSRF) when FlyteConsole is open to the general internet. An attacker can exploit any user of a vulnerable instance to access the internal metadata server or other unauthenticated URLs. Passing of headers to an unauthorized actor may occur. The patch for this issue deletes the entire `cors_proxy`, as this is not required for console anymore. A patch is available in FlyteConsole version 0.52.0. Disable FlyteConsole availability on the internet as a workaround.
0
Attacker Value
Unknown
CVE-2022-1711
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.5.
0
Attacker Value
Unknown
CVE-2022-1723
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.6.
0
Attacker Value
Unknown
CVE-2022-23668
Disclosure Date: May 16, 2022 (last updated February 23, 2025)
A remote authenticated server-side request forgery (ssrf) vulnerability was discovered in Aruba ClearPass Policy Manager version(s): 6.10.4 and below, 6.9.9 and below, 6.8.9-HF2 and below, 6.7.x and below. Aruba has released updates to ClearPass Policy Manage that address this security vulnerability.
0
Attacker Value
Unknown
CVE-2022-1722
Disclosure Date: May 16, 2022 (last updated February 23, 2025)
SSRF in editor's proxy via IPv6 link-local address in GitHub repository jgraph/drawio prior to 18.0.5. SSRF to internal link-local IPv6 addresses
0