Filtered by vendor
Subscriptions
Total
1486 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-25827 | 1 Emlog | 1 Emlog | 2025-04-07 | 6.8 Medium |
A Server-Side Request Forgery (SSRF) in the component sort.php of Emlog Pro v2.5.4 allows attackers to scan local and internal ports via supplying a crafted URL. | ||||
CVE-2025-32358 | 2025-04-07 | 4 Medium | ||
In Zammad 6.4.x before 6.4.2, SSRF can occur. Authenticated admin users can enable webhooks in Zammad, which are triggered as POST requests when certain conditions are met. If a webhook endpoint returned a redirect response, Zammad would follow it automatically with another GET request. This could be abused by an attacker to cause GET requests for example in the local network. | ||||
CVE-2025-28089 | 1 Maccms | 1 Maccms | 2025-04-07 | 9.1 Critical |
maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) via the Scheduled Task function. | ||||
CVE-2025-2245 | 2025-04-07 | N/A | ||
A server-side request forgery (SSRF) vulnerability exists in the Bitdefender GravityZone Update Server when operating in Relay Mode. The HTTP proxy component on port 7074 uses a domain allowlist to restrict outbound requests, but fails to properly sanitize hostnames containing null-byte (%00) sequences. By crafting a request to a domain such as evil.com%00.bitdefender.com, an attacker can bypass the allowlist check, causing the proxy to forward requests to arbitrary external or internal systems. | ||||
CVE-2025-2243 | 2025-04-07 | N/A | ||
A server-side request forgery (SSRF) vulnerability in Bitdefender GravityZone Console allows an attacker to bypass input validation logic using leading characters in DNS requests. Paired with other potential vulnerabilities, this bypass could be used for execution of third party code. This issue affects GravityZone Console: before 6.41.2.1. | ||||
CVE-2025-3192 | 2025-04-07 | 8.2 High | ||
Versions of the package spatie/browsershot from 0.0.0 are vulnerable to Server-side Request Forgery (SSRF) in the setUrl() function due to a missing restriction on user input, enabling attackers to access localhost and list all of its directories. | ||||
CVE-2025-28090 | 1 Maccms | 1 Maccms | 2025-04-07 | 9.1 Critical |
maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) in the Collection Custom Interface feature. | ||||
CVE-2025-3254 | 2025-04-07 | 6.3 Medium | ||
A vulnerability was found in xujiangfei admintwo 1.0. It has been classified as critical. Affected is an unknown function of the file /resource/add. The manipulation of the argument description leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | ||||
CVE-2025-32013 | 2025-04-07 | N/A | ||
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vulnerability has been discovered in LNbits' LNURL authentication handling functionality. When processing LNURL authentication requests, the application accepts a callback URL parameter and makes an HTTP request to that URL using the httpx library with redirect following enabled. The application doesn't properly validate the callback URL, allowing attackers to specify internal network addresses and access internal resources. | ||||
CVE-2025-28091 | 1 Maccms | 1 Maccms | 2025-04-07 | 9.1 Critical |
maccms10 v2025.1000.4047 has a Server-Side Request Forgery (SSRF) vulnerability via Add Article. | ||||
CVE-2025-28092 | 1 Shopxo | 1 Shopxo | 2025-04-07 | 6.3 Medium |
ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) via image upload function. | ||||
CVE-2025-28093 | 1 Shopxo | 1 Shopxo | 2025-04-07 | 6.3 Medium |
ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) in Email Settings. | ||||
CVE-2025-28094 | 1 Shopxo | 1 Shopxo | 2025-04-07 | 6.5 Medium |
shopxo v6.4.0 has a ssrf/xss vulnerability in multiple places. | ||||
CVE-2025-28096 | 1 Onenav | 1 Onenav | 2025-04-07 | 5.4 Medium |
OneNav 1.1.0 is vulnerable to Server-Side Request Forgery (SSRF) in custom headers. | ||||
CVE-2022-45926 | 1 Opentext | 1 Opentext Extended Ecm | 2025-04-04 | 8.8 High |
An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The endpoint notify.localizeEmailTemplate allows a low-privilege user to evaluate webreports. | ||||
CVE-2024-38791 | 1 Meowapps | 1 Ai Engine | 2025-04-04 | 4.9 Medium |
Server-Side Request Forgery (SSRF) vulnerability in Jordy Meow AI Engine: ChatGPT Chatbot allows Server Side Request Forgery.This issue affects AI Engine: ChatGPT Chatbot: from n/a through 2.4.7. | ||||
CVE-2025-1548 | 1 Iteachyou | 1 Dreamer Cms | 2025-04-04 | 3.5 Low |
A vulnerability was found in iteachyou Dreamer CMS 4.1.3. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/archives/edit. The manipulation of the argument editorValue/answer/content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2024-12450 | 1 Infiniflow | 1 Ragflow | 2025-04-04 | 9.8 Critical |
In infiniflow/ragflow versions 0.12.0, the `web_crawl` function in `document_app.py` contains multiple vulnerabilities. The function does not filter URL parameters, allowing attackers to exploit Full Read SSRF by accessing internal network addresses and viewing their content through the generated PDF files. Additionally, the lack of restrictions on the file protocol enables Arbitrary File Read, allowing attackers to read server files. Furthermore, the use of an outdated Chromium headless version with --no-sandbox mode enabled makes the application susceptible to Remote Code Execution (RCE) via known Chromium v8 vulnerabilities. These issues are resolved in version 0.14.0. | ||||
CVE-2021-37498 | 1 Reprisesoftware | 1 Reprise License Manager | 2025-04-03 | 6.5 Medium |
An SSRF issue was discovered in Reprise License Manager (RLM) web interface through 14.2BL4 that allows remote attackers to trigger outbound requests to intranet servers, conduct port scans via the actserver parameter in License Activation function. | ||||
CVE-2002-1484 | 1 Siemens | 1 Db4web | 2025-04-03 | 9.8 Critical |
DB4Web server, when configured to use verbose debug messages, allows remote attackers to use DB4Web as a proxy and attempt TCP connections to other systems (port scan) via a request for a URL that specifies the target IP address and port, which produces a connection status in the resulting error message. |