Total
967 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-36365 | 1 Smartstore | 1 Smartstorenet | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
Smartstore (aka SmartStoreNET) before 4.1.0 allows CommonController.ClearCache, ClearDatabaseCache, RestartApplication, and ScheduleTaskController.Edit open redirect. | |||||
CVE-2021-27612 | 1 Sap | 1 Gui For Windows | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
In specific situations SAP GUI for Windows until and including 7.60 PL9, 7.70 PL0, forwards a user to specific malicious website which could contain malware or might lead to phishing attacks to steal credentials of the victim. | |||||
CVE-2021-20105 | 1 Machform | 1 Machform | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
Machform prior to version 16 is vulnerable to an open redirect in Safari_init.php due to an improperly sanitized 'ref' parameter. | |||||
CVE-2021-29622 | 1 Prometheus | 1 Prometheus | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
Prometheus is an open-source monitoring system and time series database. In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with a specially crafted address, they can be redirected to an arbitrary URL. The issue was patched in the 2.26.1 and 2.27.1 releases. In 2.28.0, the /new endpoint will be removed completely. The workaround is to disable access to /new via a reverse proxy in front of Prometheus. | |||||
CVE-2021-21392 | 2 Fedoraproject, Matrix | 2 Fedora, Synapse | 2024-02-04 | 4.9 MEDIUM | 6.3 MEDIUM |
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addresses were used. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. This could cause Synapse to make requests to internal infrastructure on dual-stack networks. See referenced GitHub security advisory for details and workarounds. | |||||
CVE-2021-23888 | 1 Mcafee | 1 Epolicy Orchestrator | 2024-02-04 | 4.9 MEDIUM | 6.3 MEDIUM |
Unvalidated client-side URL redirect vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 10 could cause an authenticated ePO user to load an untrusted site in an ePO iframe which could steal information from the authenticated user. | |||||
CVE-2020-23182 | 1 Php-fusion | 1 Php-fusion | 2024-02-04 | 4.9 MEDIUM | 5.4 MEDIUM |
The component /php-fusion/infusions/shoutbox_panel/shoutbox_archive.php in PHP-Fusion 9.03.60 allows attackers to redirect victim users to malicious websites via a crafted payload entered into the Shoutbox message panel. | |||||
CVE-2021-3664 | 1 Url-parse Project | 1 Url-parse | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
url-parse is vulnerable to URL Redirection to Untrusted Site | |||||
CVE-2021-24406 | 1 Gvectors | 1 Wpforo Forum | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
The wpForo Forum WordPress plugin before 1.9.7 did not validate the redirect_to parameter in the login form of the forum, leading to an open redirect issue after a successful login. Such issue could allow an attacker to induce a user to use a login URL redirecting to a website under their control and being a replica of the legitimate one, asking them to re-enter their credentials (which will then in the attacker hands) | |||||
CVE-2021-29456 | 1 Authelia | 1 Authelia | 2024-02-04 | 4.9 MEDIUM | 5.4 MEDIUM |
Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. In versions 4.27.4 and earlier, utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any domain, including potentially malicious sites. This security issue does not directly impact the security of the web application itself. As a workaround, one can use a reverse proxy to strip the query parameter from the affected endpoint. There is a patch for version 4.28.0. | |||||
CVE-2020-5329 | 1 Dell | 1 Emc Avamar Server | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
Dell EMC Avamar Server contains an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. | |||||
CVE-2021-1629 | 3 Linux, Microsoft, Tableau | 3 Linux Kernel, Windows, Tableau Server | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
Tableau Server fails to validate certain URLs that are embedded in emails sent to Tableau Server users. | |||||
CVE-2020-18660 | 1 Get-simple | 1 Getsimplecms | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
GetSimpleCMS <=3.3.15 has an open redirect in admin/changedata.php via the redirect function to the url parameter. | |||||
CVE-2021-21578 | 1 Dell | 1 Emc Idrac9 Firmware | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
Dell EMC iDRAC9 versions prior to 4.40.40.00 contain an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. | |||||
CVE-2021-29652 | 1 Pomerium | 1 Pomerium | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process | |||||
CVE-2021-32721 | 1 Powermux Project | 1 Powermux | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. The issue is resolved in v1.1.1. There are no existing workarounds. | |||||
CVE-2021-39191 | 3 Debian, Fedoraproject, Openidc | 3 Debian Linux, Fedora, Mod Auth Openidc | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version. | |||||
CVE-2021-29137 | 1 Arubanetworks | 1 Airwave | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
A remote URL redirection vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability. | |||||
CVE-2021-24210 | 1 Kiboit | 1 Phastpress | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain. | |||||
CVE-2020-13662 | 1 Drupal | 1 Drupal | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
Open Redirect vulnerability in Drupal Core allows a user to be tricked into visiting a specially crafted link which would redirect them to an arbitrary external URL. This issue affects: Drupal Drupal Core 7 version 7.70 and prior versions. |