Total
1050 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-45413 | 2 Google, Mozilla | 2 Android, Firefox | 2024-08-03 | 6.1 Medium |
Using the <code>S.browser_fallback_url parameter</code> parameter, an attacker could redirect a user to a URL and cause SameSite=Strict cookies to be sent.<br>*This issue only affects Firefox for Android. Other operating systems are not affected.*. This vulnerability affects Firefox < 107. | ||||
CVE-2022-44717 | 1 Netscout | 1 Ngeniusone | 2024-08-03 | 3.1 Low |
An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 1 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. | ||||
CVE-2022-44718 | 1 Netscout | 1 Ngeniusone | 2024-08-03 | 3.5 Low |
An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 2 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. | ||||
CVE-2022-43985 | 1 Apache | 1 Airflow | 2024-08-03 | 6.1 Medium |
In Apache Airflow versions prior to 2.4.2, there was an open redirect in the webserver's `/confirm` endpoint. | ||||
CVE-2022-43721 | 1 Apache | 1 Superset | 2024-08-03 | 5.4 Medium |
An authenticated attacker with update datasets permission could change a dataset link to an untrusted site, users could be redirected to this site when clicking on that specific dataset. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0. | ||||
CVE-2022-43479 | 1 Ss-proj | 1 Shirasagi | 2024-08-03 | 6.1 Medium |
Open redirect vulnerability in SHIRASAGI v1.14.4 to v1.15.0 allows a remote unauthenticated attacker to redirect users to an arbitrary web site and conduct a phishing attack. | ||||
CVE-2022-41965 | 1 Apereo | 1 Opencast | 2024-08-03 | 5.7 Medium |
Opencast is a free, open-source platform to support the management of educational audio and video content. Prior to Opencast 12.5, Opencast's Paella authentication page could be used to redirect to an arbitrary URL for authenticated users. The vulnerability allows attackers to redirect users to sites outside of one's Opencast install, potentially facilitating phishing attacks or other security issues. This issue is fixed in Opencast 12.5 and newer. | ||||
CVE-2022-41275 | 1 Sap | 1 Solution Manager | 2024-08-03 | 6.1 Medium |
In SAP Solution Manager (Enterprise Search) - versions 740, and 750, an unauthenticated attacker can generate a link that, if clicked by a logged-in user, can be redirected to a malicious page that could read or modify sensitive information, or expose the user to a phishing attack, with little impact on confidentiality and integrity. | ||||
CVE-2022-41273 | 1 Sap | 2 Contract Lifecycle Manager, Sourcing | 2024-08-03 | 4.3 Medium |
Due to improper input sanitization in SAP Sourcing and SAP Contract Lifecycle Management - version 1100, an attacker can redirect a user to a malicious website. In order to perform this attack, the attacker sends an email to the victim with a manipulated link that appears to be a legitimate SAP Sourcing URL, since the victim doesn’t suspect the threat, they click on the link, log in to SAP Sourcing and CLM and at this point, they get redirected to a malicious website. | ||||
CVE-2022-41215 | 1 Sap | 1 Netweaver Application Server Abap | 2024-08-03 | 4.7 Medium |
SAP NetWeaver ABAP Server and ABAP Platform allows an unauthenticated attacker to redirect users to a malicious site due to insufficient URL validation. This could lead to the user being tricked to disclose personal information. | ||||
CVE-2022-41204 | 1 Sap | 1 Commerce | 2024-08-03 | 8.8 High |
An attacker can change the content of an SAP Commerce - versions 1905, 2005, 2105, 2011, 2205, login page through a manipulated URL. They can inject code that allows them to redirect submissions from the affected login form to their own server. This allows them to steal credentials and hijack accounts. A successful attack could compromise the Confidentiality, Integrity, and Availability of the system. | ||||
CVE-2022-41207 | 1 Sap | 1 Biller Direct | 2024-08-03 | 6.1 Medium |
SAP Biller Direct allows an unauthenticated attacker to craft a legitimate looking URL. When clicked by an unsuspecting victim, it will use an unsensitized parameter to redirect the victim to a malicious site of the attacker's choosing which can result in disclosure or modification of the victim's information. | ||||
CVE-2022-40754 | 1 Apache | 1 Airflow | 2024-08-03 | 6.1 Medium |
In Apache Airflow 2.3.0 through 2.3.4, there was an open redirect in the webserver's `/confirm` endpoint. | ||||
CVE-2022-40083 | 1 Labstack | 1 Echo | 2024-08-03 | 9.6 Critical |
Labstack Echo v4.8.0 was discovered to contain an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF). | ||||
CVE-2022-39814 | 1 Nokia | 1 1350 Optical Management System | 2024-08-03 | 6.1 Medium |
In NOKIA 1350 OMS R14.2, an Open Redirect vulnerability occurs is the login page via next HTTP GET parameter. | ||||
CVE-2022-39359 | 1 Metabase | 1 Metabase | 2024-08-03 | 6.5 Medium |
Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, custom GeoJSON map URL address would follow redirects to addresses that were otherwise disallowed, like link-local or private-network. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase no longer follow redirects on GeoJSON map URLs. An environment variable `MB_CUSTOM_GEOJSON_ENABLED` was also added to disable custom GeoJSON completely (`true` by default). | ||||
CVE-2022-39183 | 1 Moodle | 1 Saml Authentication | 2024-08-03 | 6.5 Medium |
Moodle Plugin - SAML Auth may allow Open Redirect through unspecified vectors. | ||||
CVE-2022-39258 | 1 Mailcow | 1 Mailcow\ | 2024-08-03 | 8.1 High |
mailcow is a mailserver suite. A vulnerability innversions prior to 2022-09 allows an attacker to craft a custom Swagger API template to spoof Authorize links. This could redirect a victim to an attacker controller place to steal Swagger authorization credentials or create a phishing page to steal other information. The issue has been fixed with the 2022-09 mailcow Mootember Update. As a workaround, one may delete the Swapper API Documentation from their e-mail server. | ||||
CVE-2022-38779 | 1 Elastic | 1 Kibana | 2024-08-03 | 6.1 Medium |
An open redirect issue was discovered in Kibana that could lead to a user being redirected to an arbitrary website if they use a maliciously crafted Kibana URL. | ||||
CVE-2022-38662 | 1 Hcltech | 1 Hcl Digital Experience | 2024-08-03 | 6.1 Medium |
In HCL Digital Experience, URLs can be constructed to redirect users to untrusted sites. |