Export limit exceeded: 334847 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (2717 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2019-11574 | 1 Simplemachines | 1 Simple Machine Forum | 2024-11-21 | 9.8 Critical |
| An issue was discovered in Simple Machines Forum (SMF) before release 2.0.17. There is SSRF related to Subs-Package.php and Subs.php because user-supplied data is used directly in curl calls. | ||||
| CVE-2019-11565 | 1 Print My Blog Project | 1 Print My Blog | 2024-11-21 | N/A |
| Server Side Request Forgery (SSRF) exists in the Print My Blog plugin before 1.6.7 for WordPress via the site parameter. | ||||
| CVE-2019-11066 | 1 Lightopenid Project | 1 Lightopenid | 2024-11-21 | N/A |
| openid.php in LightOpenID through 1.3.1 allows SSRF via a crafted OpenID 2.0 assertion request using the HTTP GET method. | ||||
| CVE-2019-10686 | 1 Ctrip | 1 Apollo | 2024-11-21 | N/A |
| An SSRF vulnerability was found in an API from Ctrip Apollo through 1.4.0-SNAPSHOT. An attacker may use it to do an intranet port scan or raise a GET request via /system-info/health because the %23 substring is mishandled. | ||||
| CVE-2019-1010017 | 1 Libnmap | 1 Libnmap | 2024-11-21 | N/A |
| libnmap < v0.6.3 is affected by: XML Injection. The impact is: Denial of service (DoS) by consuming resources. The component is: XML Parsing. The attack vector is: Specially crafted XML payload. | ||||
| CVE-2019-1003028 | 1 Jenkins | 1 Jms Messaging | 2024-11-21 | N/A |
| A server-side request forgery vulnerability exists in Jenkins JMS Messaging Plugin 1.1.1 and earlier in SSLCertificateAuthenticationMethod.java, UsernameAuthenticationMethod.java that allows attackers with Overall/Read permission to have Jenkins connect to a JMS endpoint. | ||||
| CVE-2019-1003027 | 1 Jenkins | 1 Octopusdeploy | 2024-11-21 | N/A |
| A server-side request forgery vulnerability exists in Jenkins OctopusDeploy Plugin 1.8.1 and earlier in OctopusDeployPlugin.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified URL and obtain the HTTP response code if successful, and exception error message otherwise. | ||||
| CVE-2019-1003026 | 1 Jenkins | 1 Mattermost | 2024-11-21 | N/A |
| A server-side request forgery vulnerability exists in Jenkins Mattermost Notification Plugin 2.6.2 and earlier in MattermostNotifier.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified Mattermost server and room and send a message. | ||||
| CVE-2019-1003020 | 1 Jenkins | 1 Kanboard | 2024-11-21 | N/A |
| A server-side request forgery vulnerability exists in Jenkins Kanboard Plugin 1.5.10 and earlier in KanboardGlobalConfiguration.java that allows attackers with Overall/Read permission to submit a GET request to an attacker-specified URL. | ||||
| CVE-2019-0370 | 1 Sap | 1 Financial Consolidation | 2024-11-21 | 6.5 Medium |
| Due to missing input validation, SAP Financial Consolidation, before versions 10.0 and 10.1, enables an attacker to use crafted input to interfere with the structure of the surrounding query leading to XPath Injection. | ||||
| CVE-2019-0345 | 1 Sap | 1 Netweaver Application Server Java | 2024-11-21 | N/A |
| A remote unauthenticated attacker can abuse a web service in SAP NetWeaver Application Server for Java (Administrator System Overview), versions 7.30, 7.31, 7.40, 7.50, by sending a specially crafted XML file and trick the application server into leaking authentication credentials for its own SAP Management console, resulting in Server-Side Request Forgery. | ||||
| CVE-2019-0268 | 1 Sap | 1 Businessobjects Business Intelligence | 2024-11-21 | N/A |
| SAP BusinessObjects Business Intelligence Platform (CMC Module), versions 4.10, 4.20 and 4.30, does not sufficiently validate an XML document accepted from an untrusted source. | ||||
| CVE-2019-0030 | 1 Juniper | 3 Advanced Threat Prevention Firmware, Atp400, Atp700 | 2024-11-21 | 7.2 High |
| Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3. | ||||
| CVE-2018-9920 | 1 K2 | 1 Smartforms | 2024-11-21 | N/A |
| Server side request forgery exists in the runtime application in K2 smartforms 4.6.11 via a modified hostname in an https://*/Identity/STS/Forms/Scripts URL. | ||||
| CVE-2018-9919 | 1 Tp-shop | 1 Tp-shop | 2024-11-21 | N/A |
| A web-accessible backdoor, with resultant SSRF, exists in Tp-shop 2.0.5 through 2.0.8, which allows remote attackers to obtain sensitive information, attack intranet hosts, or possibly trigger remote command execution, because /vendor/phpdocumentor/reflection-docblock/tests/phpDocumentor/Reflection/DocBlock/Tag/LinkTagTeet.php writes data from the "down_url" URL into the "bddlj" local file if the attacker knows the backdoor "jmmy" parameter. | ||||
| CVE-2018-9302 | 1 Getcockpit | 1 Cockpit | 2024-11-21 | N/A |
| SSRF (Server Side Request Forgery) in /assets/lib/fuc.js.php in Cockpit 0.4.4 through 0.5.5 allows remote attackers to read arbitrary files or send TCP traffic to intranet hosts via the url parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-14611, which was about version 0.13.0, which (surprisingly) is an earlier version than 0.4.4. | ||||
| CVE-2018-9233 | 1 Sophos | 1 Endpoint Protection | 2024-11-21 | N/A |
| Sophos Endpoint Protection 10.7 uses an unsalted SHA-1 hash for password storage in %PROGRAMDATA%\Sophos\Sophos Anti-Virus\Config\machine.xml, which makes it easier for attackers to determine a cleartext password, and subsequently choose unsafe malware settings, via rainbow tables or other approaches. | ||||
| CVE-2018-8939 | 1 Progress | 1 Whatsup Gold | 2024-11-21 | N/A |
| An SSRF issue was discovered in NmAPI.exe in Ipswitch WhatsUp Gold before 2018 (18.0). Malicious actors can submit specially crafted requests via the NmAPI executable to (1) gain unauthorized access to the WhatsUp Gold system, (2) obtain information about the WhatsUp Gold system, or (3) execute remote commands. | ||||
| CVE-2018-8801 | 1 Gitlab | 1 Gitlab | 2024-11-21 | N/A |
| GitLab Community and Enterprise Editions version 8.3 up to 10.x before 10.3 are vulnerable to SSRF in the Services and webhooks component. | ||||
| CVE-2018-7667 | 1 Adminer | 1 Adminer | 2024-11-21 | N/A |
| Adminer through 4.3.1 has SSRF via the server parameter. | ||||