Количество 4
Количество 4
CVE-2016-9752
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
CVE-2016-9752
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
CVE-2016-9752
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by ...
GHSA-q64h-5888-4mvg
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-9752 In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code. | CVSS3: 8.6 | 0% Низкий | около 9 лет назад | |
CVE-2016-9752 In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code. | CVSS3: 8.6 | 0% Низкий | около 9 лет назад | |
CVE-2016-9752 In Serendipity before 2.0.5, an attacker can bypass SSRF protection by ... | CVSS3: 8.6 | 0% Низкий | около 9 лет назад | |
GHSA-q64h-5888-4mvg In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code. | CVSS3: 8.6 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу