Show filters
121 Total Results
Displaying 1-10 of 121
Sort by:
Attacker Value
Unknown

CVE-2020-35560

Disclosure Date: February 16, 2021 (last updated February 22, 2025)
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an unauthenticated open redirect in the redirect.php.
Attacker Value
Unknown

CVE-2021-22984

Disclosure Date: February 12, 2021 (last updated February 22, 2025)
On BIG-IP Advanced WAF and ASM version 15.1.x before 15.1.0.2, 15.0.x before 15.0.1.4, 14.1.x before 14.1.2.5, 13.1.x before 13.1.3.4, 12.1.x before 12.1.5.2, and 11.6.x before 11.6.5.2, when receiving a unauthenticated client request with a maliciously crafted URI, a BIG-IP Advanced WAF or ASM virtual server configured with a DoS profile with Proactive Bot Defense (versions prior to 14.1.0), or a Bot Defense profile (versions 14.1.0 and later), may subject clients and web servers to Open Redirection attacks. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Attacker Value
Unknown

CVE-2021-22881

Disclosure Date: February 11, 2021 (last updated February 22, 2025)
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
Attacker Value
Unknown

CVE-2020-13565

Disclosure Date: February 10, 2021 (last updated February 22, 2025)
An open redirect vulnerability exists in the return_page redirection functionality of phpGACL 3.3.7, OpenEMR 5.0.2 and OpenEMR development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can redirect users to an arbitrary URL. An attacker can provide a crafted URL to trigger this vulnerability.
Attacker Value
Unknown

CVE-2021-21478

Disclosure Date: February 09, 2021 (last updated February 22, 2025)
SAP Web Dynpro ABAP allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
Attacker Value
Unknown

CVE-2021-21476

Disclosure Date: February 09, 2021 (last updated February 22, 2025)
SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
Attacker Value
Unknown

CVE-2020-22840

Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Open redirect vulnerability in b2evolution CMS version prior to 6.11.6 allows an attacker to perform malicious open redirects to an attacker controlled resource via redirect_to parameter in email_passthrough.php.
Attacker Value
Unknown

CVE-2021-25757

Disclosure Date: February 03, 2021 (last updated February 22, 2025)
In JetBrains Hub before 2020.1.12629, an open redirect was possible.
Attacker Value
Unknown

CVE-2021-21291

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
OAuth2 Proxy is an open-source reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. In OAuth2 Proxy before version 7.0.0, for users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect. For example, if a whitelist domain was configured for ".example.com", the intention is that subdomains of example.com are allowed. Instead, "example.com" and "badexample.com" could also match. This is fixed in version 7.0.0 onwards. As a workaround, one can disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain.
Attacker Value
Unknown

CVE-2020-29537

Disclosure Date: January 29, 2021 (last updated February 22, 2025)
Archer before 6.8 P2 (6.8.0.2) is affected by an open redirect vulnerability. A remote privileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the Archer application without the victims realizing an attack occurred.