In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.
Start learningUpgrade timetagger
to version 24.12.2 or higher.
timetagger is a Tag your time, get the insight - an open source time tracker for individuals
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to binding to 0.0.0.0:80
by default and not checking for localhost
requests in the get_webtoken_localhost()
function. This allows attackers to spoof internal requests if the server is exposed to the Internet.