Total
962 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-21998 | 1 Homeautomation Project | 1 Homeautomation | 2021-05-06 | 5.8 MEDIUM | 6.1 MEDIUM |
In HomeAutomation 3.3.2 input passed via the 'redirect' GET parameter in 'api.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain. | |||||
CVE-2021-29137 | 1 Arubanetworks | 1 Airwave | 2021-05-03 | 5.8 MEDIUM | 6.1 MEDIUM |
A remote URL redirection vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability. | |||||
CVE-2010-2471 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2021-04-28 | 5.8 MEDIUM | 6.1 MEDIUM |
Drupal versions 5.x and 6.x has open redirection | |||||
CVE-2021-29456 | 1 Authelia | 1 Authelia | 2021-04-27 | 4.9 MEDIUM | 5.4 MEDIUM |
Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. In versions 4.27.4 and earlier, utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any domain, including potentially malicious sites. This security issue does not directly impact the security of the web application itself. As a workaround, one can use a reverse proxy to strip the query parameter from the affected endpoint. There is a patch for version 4.28.0. | |||||
CVE-2016-4334 | 1 Jivesoftware | 1 Jive | 2021-04-20 | 5.8 MEDIUM | 6.1 MEDIUM |
Jive before 2016.3.1 has an open redirect from the external-link.jspa page. | |||||
CVE-2020-6365 | 1 Sap | 1 Netweaver Application Server Java | 2021-04-12 | 5.8 MEDIUM | 6.1 MEDIUM |
SAP NetWeaver AS Java, versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, Start Page allows an unauthenticated remote attacker to redirect users to a malicious site due to insufficient reverse tabnabbing URL validation. The attacker could execute phishing attacks to steal credentials of the victim or to redirect users to untrusted web pages containing malware or similar malicious exploits. | |||||
CVE-2021-24210 | 1 Kiboit | 1 Phastpress | 2021-04-12 | 5.8 MEDIUM | 6.1 MEDIUM |
There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain. | |||||
CVE-2021-24165 | 1 Ninjaforms | 1 Ninja Forms | 2021-04-09 | 5.8 MEDIUM | 6.1 MEDIUM |
In the Ninja Forms Contact Form WordPress plugin before 3.4.34, the wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place. | |||||
CVE-2020-9995 | 1 Apple | 1 Macos Server | 2021-04-07 | 5.8 MEDIUM | 6.1 MEDIUM |
An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Server 5.11. Processing a maliciously crafted URL may lead to an open redirect or cross site scripting. | |||||
CVE-2021-29652 | 1 Pomerium | 1 Pomerium | 2021-04-06 | 5.8 MEDIUM | 6.1 MEDIUM |
Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process | |||||
CVE-2021-29651 | 1 Pomerium | 1 Pomerium | 2021-04-06 | 5.8 MEDIUM | 6.1 MEDIUM |
Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2). | |||||
CVE-2020-24550 | 1 Episerver | 1 Find | 2021-04-05 | 5.8 MEDIUM | 6.1 MEDIUM |
An Open Redirect vulnerability in EpiServer Find before 13.2.7 allows an attacker to redirect users to untrusted websites via the _t_redirect parameter in a crafted URL, such as a /find_v2/_click URL. | |||||
CVE-2021-21476 | 1 Sap | 1 Ui5 | 2021-04-01 | 5.8 MEDIUM | 6.1 MEDIUM |
SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities. | |||||
CVE-2021-21377 | 1 Openmicroscopy | 1 Omero.web | 2021-03-27 | 4.9 MEDIUM | 5.4 MEDIUM |
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the omero.web.redirect_allowed_hosts setting. | |||||
CVE-2020-12483 | 1 Vivo | 1 Appstore | 2021-03-27 | 5.8 MEDIUM | 6.1 MEDIUM |
The appstore before 8.12.0.0 exposes some of its components, and the attacker can cause remote download and install apps through carefully constructed parameters. | |||||
CVE-2021-21338 | 1 Typo3 | 1 Typo3 | 2021-03-26 | 5.8 MEDIUM | 6.1 MEDIUM |
TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 it has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability. This is fixed in versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1. | |||||
CVE-2021-21491 | 1 Sap | 1 Netweaver Application Server Java | 2021-03-17 | 5.8 MEDIUM | 6.1 MEDIUM |
SAP Netweaver Application Server Java (Applications based on WebDynpro Java) versions 7.00, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities. | |||||
CVE-2020-28150 | 1 Inetsoftware | 1 I-net Clear Reports | 2021-03-12 | 5.8 MEDIUM | 6.1 MEDIUM |
I-Net Software Clear Reports 20.10.136 web application accepts a user-controlled input that specifies a link to an external site, and uses the user supplied data in a Redirect. | |||||
CVE-2021-21354 | 1 Mozilla | 1 Pollbot | 2021-03-12 | 5.8 MEDIUM | 6.1 MEDIUM |
Pollbot is open source software which "frees its human masters from the toilsome task of polling for the state of things during the Firefox release process." In Pollbot before version 1.4.4 there is an open redirection vulnerability in the path of "https://pollbot.services.mozilla.com/". An attacker can redirect anyone to malicious sites. To Reproduce type in this URL: "https://pollbot.services.mozilla.com//evil.com/". Affected versions will redirect to that website when you inject a payload like "//evil.com/". This is fixed in version 1.4.4. | |||||
CVE-2020-29565 | 2 Debian, Openstack | 2 Debian Linux, Horizon | 2021-03-09 | 5.8 MEDIUM | 6.1 MEDIUM |
An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and 18.x before 18.3.3, 18.4.x, and 18.5.x. There is a lack of validation of the "next" parameter, which would allow someone to supply a malicious URL in Horizon that can cause an automatic redirect to the provided malicious URL. |