Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| jgraph | jgraph/drawio | unspecified ~ 18.0.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Drawio prior to 18.0.4 is vulnerable to server-side request forgery. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-1713.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-1721 | Path Traversal in WellKnownServlet in jgraph/drawio | |
| CVE-2022-1722 | SSRF in editor's proxy via IPv6 link-local address in jgraph/drawio |
No comments yet