The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.
Start learningUpgrade @angular/ssr to version 19.2.21, 20.3.17, 21.1.5, 21.2.0-rc.0 or higher.
@angular/ssr is a the Angular server side rendering utilities.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the request handling pipeline due to improper validation of user-controlled HTTP headers such as Host and X-Forwarded-*. An attacker can redirect internal server requests to arbitrary external or internal destinations, potentially exfiltrating sensitive data or probing internal networks by manipulating these headers to influence URL resolution and request routing.
Note:
This is only exploitable if the application uses server-side rendering, performs HTTP requests using relative URLs or constructs URLs from unvalidated headers, and the infrastructure does not sanitize or validate incoming headers.
This vulnerability can be mitigated by using absolute URLs for API requests and implementing strict header validation middleware to enforce trusted hostnames and numeric ports.