Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q64h-5888-4mvg

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.6

Описание

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.

EPSS

Процентиль: 40%
0.00185
Низкий

8.6 High

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 8.6
ubuntu
около 9 лет назад

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.

CVSS3: 8.6
nvd
около 9 лет назад

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.

CVSS3: 8.6
debian
около 9 лет назад

In Serendipity before 2.0.5, an attacker can bypass SSRF protection by ...

EPSS

Процентиль: 40%
0.00185
Низкий

8.6 High

CVSS3

Дефекты

CWE-918