Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9752

Опубликовано: 01 дек. 2016
Источник: debian
EPSS Низкий

Описание

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
serendipityremovedpackage

EPSS

Процентиль: 40%
0.00185
Низкий

Связанные уязвимости

CVSS3: 8.6
ubuntu
около 9 лет назад

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.

CVSS3: 8.6
nvd
около 9 лет назад

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.

CVSS3: 8.6
github
больше 3 лет назад

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.

EPSS

Процентиль: 40%
0.00185
Низкий