Total
1050 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2016-1213 | 1 Cybozu | 1 Garoon | 2024-08-05 | N/A |
The "Scheduler" function in Cybozu Garoon before 4.2.2 allows remote attackers to redirect users to arbitrary websites. | ||||
CVE-2016-0928 | 1 Pivotal | 1 Cloud Foundry Elastic Runtime | 2024-08-05 | N/A |
Multiple open redirect vulnerabilities in Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.6.30 and 1.7.x before 1.7.8 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | ||||
CVE-2016-0329 | 1 Ibm | 1 Emptoris Sourcing | 2024-08-05 | N/A |
Open redirect vulnerability in IBM Emptoris Sourcing 10.0.0.x before 10.0.0.1_iFix3, 10.0.1.x before 10.0.1.3_iFix3, 10.0.2.x before 10.0.2.8_iFix1, 10.0.4.0 before 10.0.4.0_iFix8, and 10.1.0.0 before 10.1.0.0_iFix3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. IBM X-Force ID: 111692. | ||||
CVE-2016-0228 | 1 Ibm | 1 Marketing Platform | 2024-08-05 | N/A |
IBM Marketing Platform 10.0 could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability in various scripts. An attacker could exploit this vulnerability to redirect a victim to arbitrary Web sites. IBM X-Force ID: 110236. | ||||
CVE-2016-0204 | 1 Ibm | 1 Cloud Orchestrator | 2024-08-05 | N/A |
Open redirect vulnerability in IBM Cloud Orchestrator 2.4.x before 2.4.0 FP3 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | ||||
CVE-2017-1002150 | 1 Fedoraproject | 1 Python-fedora | 2024-08-05 | N/A |
python-fedora 0.8.0 and lower is vulnerable to an open redirect resulting in loss of CSRF protection | ||||
CVE-2017-1000434 | 1 Furikake Project | 1 Furikake | 2024-08-05 | N/A |
Wordpress plugin Furikake version 0.1.0 is vulnerable to an Open Redirect The furikake-redirect parameter on a page allows for a redirect to an attacker controlled page classes/Furigana.php: header('location:'.urldecode($_GET['furikake-redirect'])); | ||||
CVE-2017-1000117 | 2 Git-scm, Redhat | 4 Git, Enterprise Linux, Mobile Application Platform and 1 more | 2024-08-05 | N/A |
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability. | ||||
CVE-2017-1000070 | 1 Oauth2 Proxy Project | 1 Oauth2 Proxy | 2024-08-05 | N/A |
The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819 | ||||
CVE-2017-1000027 | 1 Koozali | 1 Sme Server | 2024-08-05 | N/A |
Koozali Foundation SME Server versions 8.x, 9.x, 10.x are vulnerable to an open URL redirect vulnerability in the user web login function resulting in unauthorized account access. | ||||
CVE-2017-1000013 | 1 Phpmyadmin | 1 Phpmyadmin | 2024-08-05 | N/A |
phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to an open redirect weakness | ||||
CVE-2017-20164 | 1 Symbiote | 1 Seed | 2024-08-05 | 6.3 Medium |
A vulnerability was found in Symbiote Seed up to 6.0.2. It has been classified as critical. Affected is the function onBeforeSecurityLogin of the file code/extensions/SecurityLoginExtension.php of the component Login. The manipulation of the argument URL leads to open redirect. It is possible to launch the attack remotely. Upgrading to version 6.0.3 is able to address this issue. The patch is identified as b065ebd82da53009d273aa7e989191f701485244. It is recommended to upgrade the affected component. VDB-217626 is the identifier assigned to this vulnerability. | ||||
CVE-2017-20119 | 1 Trueconf | 1 Server | 2024-08-05 | 3.5 Low |
A vulnerability classified as problematic has been found in TrueConf Server 4.3.7. This affects an unknown part of the file /admin/general/change-lang. The manipulation of the argument redirect_url leads to open redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | ||||
CVE-2017-18897 | 1 Mattermost | 1 Mattermost Server | 2024-08-05 | 6.1 Medium |
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5, when used as an OAuth 2.0 service provider. It mishandles a deny action for a redirection. | ||||
CVE-2017-18891 | 1 Mattermost | 1 Mattermost Server | 2024-08-05 | 6.1 Medium |
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5. It allows Phishing because an error page can have a link. | ||||
CVE-2017-18441 | 1 Cpanel | 1 Cpanel | 2024-08-05 | N/A |
cPanel before 64.0.21 allows demo accounts to redirect web traffic (SEC-245). | ||||
CVE-2017-18414 | 1 Cpanel | 1 Cpanel | 2024-08-05 | N/A |
cPanel before 67.9999.103 allows an open redirect in /unprotected/redirect.html (SEC-300). | ||||
CVE-2017-18262 | 1 Blackboard | 1 Blackboard Learn | 2024-08-05 | N/A |
Blackboard Learn (Since at least 17th of October 2017) has allowed Unvalidated Redirects on any signed-in user through its endpoints for handling Shibboleth logins, as demonstrated by a webapps/bb-auth-provider-shibboleth-BBLEARN/execute/shibbolethLogin?returnUrl= URI. | ||||
CVE-2017-16761 | 1 Inedo | 1 Buildmaster | 2024-08-05 | N/A |
An Open Redirect vulnerability in Inedo BuildMaster before 5.8.2 allows remote attackers to redirect users to arbitrary web sites. | ||||
CVE-2017-16652 | 2 Debian, Sensiolabs | 2 Debian Linux, Symfony | 2024-08-05 | N/A |
An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler takes the content of the _target_path parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exploited for example to mount effective phishing attacks. |