Total
1137 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-29137 | 1 Arubanetworks | 1 Airwave | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
A remote URL redirection vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability. | |||||
CVE-2021-28861 | 2 Fedoraproject, Python | 2 Fedora, Python | 2024-11-21 | N/A | 7.4 HIGH |
Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states "Warning: http.server is not recommended for production. It only implements basic security checks." | |||||
CVE-2021-28125 | 1 Apache | 1 Superset | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
Apache Superset up to and including 1.0.1 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link. | |||||
CVE-2021-27612 | 1 Sap | 1 Gui For Windows | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
In specific situations SAP GUI for Windows until and including 7.60 PL9, 7.70 PL0, forwards a user to specific malicious website which could contain malware or might lead to phishing attacks to steal credentials of the victim. | |||||
CVE-2021-27404 | 1 Asus | 2 Askey Rtf8115vw, Askey Rtf8115vw Firmware | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow injection of a Host HTTP header. | |||||
CVE-2021-27352 | 1 Ilch | 1 Ilch Cms | 2024-11-21 | 4.9 MEDIUM | 5.4 MEDIUM |
An open redirect vulnerability in Ilch CMS version 2.1.42 allows attackers to redirect users to an attacker's site after a successful login. | |||||
CVE-2021-25757 | 1 Jetbrains | 1 Hub | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
In JetBrains Hub before 2020.1.12629, an open redirect was possible. | |||||
CVE-2021-25737 | 1 Kubernetes | 1 Kubernetes | 2024-11-21 | 4.9 MEDIUM | 2.7 LOW |
A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs. | |||||
CVE-2021-25655 | 1 Avaya | 1 Aura Experience Portal | 2024-11-21 | 5.8 MEDIUM | 4.4 MEDIUM |
A vulnerability in the system Service Menu component of Avaya Aura Experience Portal may allow URL Redirection to any untrusted site through a crafted attack. Affected versions include 7.0 through 7.2.3 (without hotfix) and 8.0.0 (without hotfix). | |||||
CVE-2021-25640 | 1 Apache | 1 Dubbo | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
In Apache Dubbo prior to 2.6.9 and 2.7.9, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability. | |||||
CVE-2021-25111 | 1 English Wordpress Admin Project | 1 English Wordpress Admin | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
The English WordPress Admin WordPress plugin before 1.5.2 does not validate the admin_custom_language_return_url before redirecting users o it, leading to an open redirect issue | |||||
CVE-2021-25074 | 1 Webp Converter For Media Project | 1 Webp Converter For Media | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
The WebP Converter for Media WordPress plugin before 4.0.3 contains a file (passthru.php) which does not validate the src parameter before redirecting the user to it, leading to an Open Redirect issue | |||||
CVE-2021-25033 | 1 Noptin | 1 Noptin | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
The WordPress Newsletter Plugin WordPress plugin before 1.6.5 does not validate the to parameter before redirecting the user to its given value, leading to an open redirect issue | |||||
CVE-2021-25028 | 1 Tri | 1 Event Tickets | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
The Event Tickets WordPress plugin before 5.2.2 does not validate the tribe_tickets_redirect_to parameter before redirecting the user to the given value, leading to an arbitrary redirect issue | |||||
CVE-2021-24838 | 1 Bologer | 1 Anycomment | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
The AnyComment WordPress plugin before 0.3.5 has an API endpoint which passes user input via the redirect parameter to the wp_redirect() function without being validated first, leading to an Open Redirect issue, which according to the vendor, is a feature. | |||||
CVE-2021-24406 | 1 Gvectors | 1 Wpforo Forum | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
The wpForo Forum WordPress plugin before 1.9.7 did not validate the redirect_to parameter in the login form of the forum, leading to an open redirect issue after a successful login. Such issue could allow an attacker to induce a user to use a login URL redirecting to a website under their control and being a replica of the legitimate one, asking them to re-enter their credentials (which will then in the attacker hands) | |||||
CVE-2021-24358 | 1 Posimyth | 1 The Plus Addons For Elementor | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.10 did not validate a redirect parameter on a specifically crafted URL before redirecting the user to it, leading to an Open Redirect issue. | |||||
CVE-2021-24288 | 1 Acymailing | 1 Acymailing | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
When subscribing using AcyMailing, the 'redirect' parameter isn't properly sanitized. Turning the request from POST to GET, an attacker can craft a link containing a potentially malicious landing page and send it to the victim. | |||||
CVE-2021-24210 | 1 Kiboit | 1 Phastpress | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain. | |||||
CVE-2021-24165 | 1 Ninjaforms | 1 Ninja Forms | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
In the Ninja Forms Contact Form WordPress plugin before 3.4.34, the wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place. |