Total
1050 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-51675 | 1 Vasyltech | 1 Advanced Access Manager | 2024-09-09 | 4.7 Medium |
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in AAM Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More.This issue affects Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More: from n/a through 6.9.18. | ||||
CVE-2023-51517 | 1 Codepeople | 1 Calculated Fields Form | 2024-09-09 | 4.1 Medium |
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CodePeople Calculated Fields Form.This issue affects Calculated Fields Form: from n/a through 1.2.28. | ||||
CVE-2023-4964 | 1 Microfocus | 2 Asset Management X, Service Management Automation X | 2024-09-06 | 8.2 High |
Potential open redirect vulnerability in opentext Service Management Automation X (SMAX) versions 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11 and opentext Asset Management X (AMX) versions 2021.08, 2021.11, 2022.05, 2022.11. The vulnerability could allow attackers to redirect a user to malicious websites. | ||||
CVE-2019-25155 | 1 Cure53 | 1 Dompurify | 2024-09-06 | 6.1 Medium |
DOMPurify before 1.0.11 allows reverse tabnabbing in demos/hooks-target-blank-demo.html because links lack a 'rel="noopener noreferrer"' attribute. | ||||
CVE-2024-7211 | 1 1e | 1 Platform | 2024-09-06 | 4.7 Medium |
The 1E Platform's component utilized the third-party Duende Identity Server, which suffered from an open redirect vulnerability, permitting an attacker to control the redirection path of end users. Note: 1E Platform's component utilizing the third-party Duende Identity Server has been updated with the patch that includes the fix. | ||||
CVE-2023-45201 | 1 Projectworlds | 1 Online Examination System | 2024-09-05 | 6.1 Medium |
Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the admin.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL. | ||||
CVE-2023-45202 | 1 Projectworlds | 1 Online Examination System | 2024-09-05 | 6.1 Medium |
Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the feed.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL. | ||||
CVE-2023-45203 | 1 Projectworlds | 1 Online Examination System | 2024-09-05 | 6.1 Medium |
Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the login.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL. | ||||
CVE-2024-24034 | 1 Setorinformatica | 1 S.i.l | 2024-09-05 | 6.1 Medium |
Setor Informatica S.I.L version 3.0 is vulnerable to Open Redirect via the hprinter parameter, allows remote attackers to execute arbitrary code. | ||||
CVE-2023-49104 | 1 Owncloud | 1 Oauth2 | 2024-09-04 | 8.7 High |
An issue was discovered in ownCloud owncloud/oauth2 before 0.6.1, when Allow Subdomains is enabled. An attacker is able to pass in a crafted redirect-url that bypasses validation, and consequently allows an attacker to redirect callbacks to a Top Level Domain controlled by the attacker. | ||||
CVE-2024-44776 | 1 Vtiger | 1 Vtiger Crm | 2024-09-03 | 6.1 Medium |
An Open Redirect vulnerability in the page parameter of vTiger CRM v7.4.0 allows attackers to redirect users to a malicious site via a crafted URL. | ||||
CVE-2024-43236 | 2024-09-03 | 4.7 Medium | ||
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Scott Paterson Easy PayPal Buy Now Button.This issue affects Easy PayPal Buy Now Button: from n/a through 1.9. | ||||
CVE-2024-0319 | 1 Fireeye | 1 Hxtool | 2024-08-30 | 5.4 Medium |
Open Redirect vulnerability in FireEye HXTool affecting version 4.6, the exploitation of which could allow an attacker to redirect a legitimate user to a malicious page by changing the 'redirect_uri' parameter. | ||||
CVE-2024-22891 | 2024-08-29 | 9.8 Critical | ||
Nteract v.0.28.0 was discovered to contain a remote code execution (RCE) vulnerability via the Markdown link. | ||||
CVE-2022-36029 | 2024-08-29 | 9.1 Critical | ||
Greenlight is an end-user interface for BigBlueButton servers. Versions prior to 2.13.0 have an open redirect vulnerability in the Login page due to unchecked the value of the `return_to` cookie. Versions 2.13.0 contains a patch for the issue. | ||||
CVE-2023-41699 | 1 Payara | 1 Payara | 2024-08-29 | 6.1 Medium |
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Payara Platform Payara Server, Micro and Embedded (Servlet Implementation modules) allows Redirect Access to Libraries.This issue affects Payara Server, Micro and Embedded: from 5.0.0 before 5.57.0, from 4.1.2.191 before 4.1.2.191.46, from 6.0.0 before 6.8.0, from 6.2023.1 before 6.2023.11. | ||||
CVE-2023-44308 | 2024-08-28 | 6.1 Medium | ||
Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter. | ||||
CVE-2023-6380 | 1 Alkacon | 1 Opencms | 2024-08-28 | 6.1 Medium |
Open redirect vulnerability has been found in the Open CMS product affecting versions 14 and 15 of the 'Mercury' template. An attacker could create a specially crafted URL and send it to a specific user to redirect them to a malicious site and compromise them. Exploitation of this vulnerability is possible due to the fact that there is no proper sanitization of the 'URI' parameter. | ||||
CVE-2024-28287 | 2024-08-27 | 7.3 High | ||
A DOM-based open redirection in the returnUrl parameter of INSTINCT UI Web Client 6.5.0 allows attackers to redirect users to malicious sites via a crafted URL. | ||||
CVE-2024-39097 | 1 Gnuboard | 1 Gnuboard6 | 2024-08-27 | 6.1 Medium |
There is an Open Redirect vulnerability in Gnuboard v6.0.4 and below via the `url` parameter in login path. |