Total
1052 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-7272 | 1 Php | 1 Php | 2023-12-10 | 5.8 MEDIUM | 7.4 HIGH |
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function. | |||||
CVE-2015-8813 | 1 Umbraco | 1 Umbraco | 2023-12-10 | 4.3 MEDIUM | 8.2 HIGH |
The Page_Load function in Umbraco.Web/umbraco.presentation/umbraco/dashboard/FeedProxy.aspx.cs in Umbraco before 7.4.0 allows remote attackers to conduct server-side request forgery (SSRF) attacks via the url parameter. | |||||
CVE-2015-7570 | 1 Yeager | 1 Yeager Cms | 2023-12-10 | 6.4 MEDIUM | 7.2 HIGH |
Multiple server-side request forgery (SSRF) vulnerabilities in Yeager CMS 1.2.1 allow remote attackers to trigger outbound requests and enumerate open ports via the dbhost parameter to libs/org/adodb_lite/tests/test_adodb_lite.php, libs/org/adodb_lite/tests/test_datadictionary.php, or libs/org/adodb_lite/tests/test_adodb_lite_sessions.php. | |||||
CVE-2017-7200 | 1 Openstack | 1 Glance | 2023-12-10 | 5.0 MEDIUM | 5.8 MEDIUM |
An SSRF issue was discovered in OpenStack Glance before Newton. The 'copy_from' feature in the Image Service API v1 allowed an attacker to perform masked network port scans. With v1, it is possible to create images with a URL such as 'http://localhost:22'. This could then allow an attacker to enumerate internal network details while appearing masked, since the scan would appear to originate from the Glance Image service. | |||||
CVE-2017-6130 | 1 F5 | 2 Ssl Intercept Iapp, Ssl Orchestrator | 2023-12-10 | 5.8 MEDIUM | 7.4 HIGH |
F5 SSL Intercept iApp 1.5.0 - 1.5.7 and SSL Orchestrator 2.0 is vulnerable to a Server-Side Request Forgery (SSRF) attack when deployed using the Dynamic Domain Bypass (DDB) feature feature plus SNAT Auto Map option for egress traffic. | |||||
CVE-2016-4046 | 1 Open-xchange | 1 Open-xchange Appsuite | 2023-12-10 | 5.0 MEDIUM | 5.8 MEDIUM |
An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev11. The API to configure external mail accounts can be abused to map and access network components within the trust boundary of the operator. Users can inject arbitrary hosts and ports to API calls. Depending on the response type, content and latency, information about existence of hosts and services can be gathered. Attackers can get internal configuration information about the infrastructure of an operator to prepare subsequent attacks. | |||||
CVE-2016-6001 | 1 Ibm | 1 Forms Experience Builder | 2023-12-10 | 3.5 LOW | 3.1 LOW |
IBM Forms Experience Builder could be susceptible to a server-side request forgery (SSRF) from the application design interface allowing for some information disclosure of internal resources. | |||||
CVE-2017-7569 | 1 Vbulletin | 1 Vbulletin | 2023-12-10 | 5.0 MEDIUM | 8.6 HIGH |
In vBulletin before 5.3.0, remote attackers can bypass the CVE-2016-6483 patch and conduct SSRF attacks by leveraging the behavior of the PHP parse_url function, aka VBV-17037. | |||||
CVE-2017-7566 | 1 Mybb | 1 Mybb | 2023-12-10 | 4.0 MEDIUM | 7.7 HIGH |
MyBB before 1.8.11 allows remote attackers to bypass an SSRF protection mechanism. | |||||
CVE-2016-4374 | 1 Hp | 1 Release Control | 2023-12-10 | 4.0 MEDIUM | 7.7 HIGH |
HPE Release Control (RC) 9.13, 9.20, and 9.21 before 9.21.0005 p4 allows remote authenticated users to conduct server-side request forgery (SSRF) attacks, and consequently obtain sensitive information or cause a denial of service, via unspecified vectors. | |||||
CVE-2016-6483 | 1 Vbulletin | 1 Vbulletin | 2023-12-10 | 5.0 MEDIUM | 8.6 HIGH |
The media-file upload feature in vBulletin before 3.8.7 Patch Level 6, 3.8.8 before Patch Level 2, 3.8.9 before Patch Level 1, 4.x before 4.2.2 Patch Level 6, 4.2.3 before Patch Level 2, 5.x before 5.2.0 Patch Level 3, 5.2.1 before Patch Level 1, and 5.2.2 before Patch Level 1 allows remote attackers to conduct SSRF attacks via a crafted URL that results in a Redirection HTTP status code. | |||||
CVE-2016-7964 | 1 Dokuwiki | 1 Dokuwiki | 2023-12-10 | 4.3 MEDIUM | 8.6 HIGH |
The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16. |