Total
1017 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-6025 | 1 Sixapart | 1 Movable Type | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
Open redirect vulnerability in Movable Type series Movable Type 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Advanced 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type Advanced 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type Advanced 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Premium 1.24 and earlier (Movable Type Premium), and Movable Type Premium (Advanced Edition) 1.24 and earlier (Movable Type Premium) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL. | |||||
CVE-2019-19775 | 1 Zulip | 1 Zulip Server | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
The image thumbnailing handler in Zulip Server versions 1.9.0 to before 2.0.8 allowed an open redirect that was visible to logged-in users. | |||||
CVE-2018-13257 | 1 Blackboard | 1 Blackboard Learn | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
The bb-auth-provider-cas authentication module within Blackboard Learn 2018-07-02 is susceptible to HTTP host header spoofing during Central Authentication Service (CAS) service ticket validation, enabling a phishing attack from the CAS server login page. | |||||
CVE-2014-3652 | 1 Redhat | 1 Keycloak | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL. | |||||
CVE-2014-2213 | 1 Posh Project | 1 Posh | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
Open redirect vulnerability in the password reset functionality in POSH 3.0 through 3.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to portal/scr_sendmd5.php. | |||||
CVE-2020-6803 | 1 Mozilla | 1 Webthings Gateway | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
An open redirect is present on the gateway's login page, which could cause a user to be redirected to a malicious site after logging in. | |||||
CVE-2019-19703 | 1 Jetbrains | 1 Ktor | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location. | |||||
CVE-2019-15041 | 1 Jetbrains | 1 Youtrack | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
JetBrains YouTrack versions before 2019.1.52545 allowed unbounded URL whitelisting because of Inclusion of Functionality from an Untrusted Control Sphere. | |||||
CVE-2019-4595 | 1 Ibm | 1 Sterling B2b Integrator | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 167878. | |||||
CVE-2010-3661 | 1 Typo3 | 1 Typo3 | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows Open Redirection on the backend. | |||||
CVE-2016-1000108 | 2 Debian, Yaws | 2 Debian Linux, Yaws | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
yaws before 2.0.4 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. | |||||
CVE-2019-10098 | 1 Apache | 1 Http Server | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL. | |||||
CVE-2019-19709 | 2 Debian, Mediawiki | 2 Debian Linux, Mediawiki | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
MediaWiki through 1.33.1 allows attackers to bypass the Title_blacklist protection mechanism by starting with an arbitrary title, establishing a non-resolvable redirect for the associated page, and using redirect=1 in the action API when editing that page. | |||||
CVE-2019-14857 | 1 Openidc | 1 Mod Auth Openidc | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
A flaw was found in mod_auth_openidc before version 2.4.0.1. An open redirect issue exists in URLs with trailing slashes similar to CVE-2019-3877 in mod_auth_mellon. | |||||
CVE-2019-15688 | 1 Kaspersky | 5 Anti-virus, Internet Security, Security Cloud and 2 more | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component did not adequately inform the user about the threat of redirecting to an untrusted site. Bypass. | |||||
CVE-2019-18781 | 1 Zohocorp | 1 Manageengine Adselfservice Plus | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
An open redirect vulnerability was discovered in Zoho ManageEngine ADSelfService Plus 5.x before 5809 that allows attackers to force users who click on a crafted link to be sent to a specified external site. | |||||
CVE-2019-17151 | 1 Tencent | 1 Wechat | 2024-02-28 | 5.8 MEDIUM | 5.4 MEDIUM |
This vulnerability allows remote attackers redirect users to an external resource on affected installations of Tencent WeChat Prior to 7.0.9. User interaction is required to exploit this vulnerability in that the target must be within a chat session together with the attacker. The specific flaw exists within the parsing of a users profile. The issue lies in the failure to properly validate a users name. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-9302. | |||||
CVE-2018-18288 | 1 Crushftp | 1 Crushftp | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
CrushFTP through 8.3.0 is vulnerable to credentials theft via URL redirection. | |||||
CVE-2019-20479 | 4 Debian, Fedoraproject, Openidc and 1 more | 4 Debian Linux, Fedora, Mod Auth Openidc and 1 more | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
A flaw was found in mod_auth_openidc before version 2.4.1. An open redirect issue exists in URLs with a slash and backslash at the beginning. | |||||
CVE-2019-4538 | 1 Ibm | 1 Security Directory Server | 2024-02-28 | 5.8 MEDIUM | 8.2 HIGH |
IBM Security Directory Server 6.4.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 165660. |