Vulnerabilities (CVE)

Filtered by CWE-601
Total 1018 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-15300 1 Salesagility 1 Suitecrm 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
SuiteCRM through 7.11.13 has an Open Redirect in the Documents module via a crafted SVG document.
CVE-2020-15242 1 Vercel 1 Next.js 2024-11-21 5.8 MEDIUM 4.7 MEDIUM
Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4.
CVE-2020-15233 1 Ory 1 Fosite 2024-11-21 4.9 MEDIUM 6.1 MEDIUM
ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redirect URL by performing an OAuth flow and requesting a redirect URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface. This vulnerability has been patched in ORY Fosite v0.34.1.
CVE-2020-15129 1 Traefik 1 Traefik 2024-11-21 4.0 MEDIUM 6.1 MEDIUM
In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the "X-Forwarded-Prefix" header. The Traefik API dashboard component doesn't validate that the value of the header "X-Forwarded-Prefix" is a site relative path and will redirect to any header provided URI. Successful exploitation of an open redirect can be used to entice victims to disclose sensitive information. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios.
CVE-2020-14454 1 Mattermost 1 Mattermost Desktop 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
An issue was discovered in Mattermost Desktop App before 4.4.0. Attackers can open web pages in the desktop application because server redirection is mishandled, aka MMSA-2020-0008.
CVE-2020-14446 1 Wso2 2 Identity Server, Identity Server As Key Manager 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
An issue was discovered in WSO2 Identity Server through 5.10.0 and WSO2 IS as Key Manager through 5.10.0. An open redirect exists.
CVE-2020-14118 1 Mi 1 Mi App Store 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
An intent redirection vulnerability in the Mi App Store product. This vulnerability is caused by the Mi App Store does not verify the validity of the incoming data, can cause the app store to automatically download and install apps.
CVE-2020-13662 1 Drupal 1 Drupal 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
Open Redirect vulnerability in Drupal Core allows a user to be tricked into visiting a specially crafted link which would redirect them to an arbitrary external URL. This issue affects: Drupal Drupal Core 7 version 7.70 and prior versions.
CVE-2020-13565 2 Open-emr, Phpgacl Project 2 Openemr, Phpgacl 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
An open redirect vulnerability exists in the return_page redirection functionality of phpGACL 3.3.7, OpenEMR 5.0.2 and OpenEMR development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can redirect users to an arbitrary URL. An attacker can provide a crafted URL to trigger this vulnerability.
CVE-2020-13486 1 Verbb 1 Knock Knock 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
The Knock Knock plugin before 1.2.8 for Craft CMS allows malicious redirection.
CVE-2020-13121 1 Rcos 1 Submitty 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
Submitty through 20.04.01 has an open redirect via authentication/login?old= during an invalid login attempt.
CVE-2020-12699 1 Dkd 1 Direct Mail 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
The direct_mail extension through 5.2.3 for TYPO3 has an Open Redirect via jumpUrl.
CVE-2020-12666 2 Fedoraproject, Go-macaron 2 Fedora, Macaron 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
macaron before 1.3.7 has an open redirect in the static handler, as demonstrated by the http://127.0.0.1:4000//example.com/ URL.
CVE-2020-12483 1 Vivo 1 Appstore 2024-11-21 5.8 MEDIUM 8.2 HIGH
The appstore before 8.12.0.0 exposes some of its components, and the attacker can cause remote download and install apps through carefully constructed parameters.
CVE-2020-12283 1 Sourcegraph 1 Sourcegraph 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
Sourcegraph before 3.15.1 has a vulnerable authentication workflow because of improper validation in the SafeRedirectURL method in cmd/frontend/auth/redirect.go, such as for the //foo//example.com substring.
CVE-2020-11882 1 Telefonica 1 O2 Business 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
The O2 Business application 1.2.0 for Android exposes the canvasm.myo2.SplashActivity activity to other applications. The purpose of this activity is to handle deeplinks that can be delivered either via links or by directly calling the activity. However, the deeplink format is not properly validated. This can be abused by an attacker to redirect a user to any page and deliver any content to the user.
CVE-2020-11665 1 Broadcom 1 Ca Api Developer Portal 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
CA API Developer Portal 4.3.1 and earlier handles loginRedirect page redirects in an insecure manner, which allows attackers to perform open redirect attacks.
CVE-2020-11664 1 Broadcom 1 Ca Api Developer Portal 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
CA API Developer Portal 4.3.1 and earlier handles homeRedirect page redirects in an insecure manner, which allows attackers to perform open redirect attacks.
CVE-2020-11663 1 Broadcom 1 Ca Api Developer Portal 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
CA API Developer Portal 4.3.1 and earlier handles 404 requests in an insecure manner, which allows attackers to perform open redirect attacks.
CVE-2020-11611 1 Cross Domain Local Storage Project 1 Cross Domain Local Storage 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends.