Show filters
200 Total Results
Displaying 11-20 of 200
Sort by:
Attacker Value
Unknown
CVE-2021-20789
Disclosure Date: July 30, 2021 (last updated February 23, 2025)
Open redirect vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack via a specially crafted URL.
0
Attacker Value
Unknown
CVE-2021-3664
Disclosure Date: July 26, 2021 (last updated February 23, 2025)
url-parse is vulnerable to URL Redirection to Untrusted Site
0
Attacker Value
Unknown
CVE-2021-32786
Disclosure Date: July 22, 2021 (last updated February 23, 2025)
mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.
0
Attacker Value
Unknown
CVE-2021-35966
Disclosure Date: July 19, 2021 (last updated February 23, 2025)
The specific function of the Orca HCM digital learning platform does not filter input parameters properly, which causing the URL can be redirected to any website. Remote attackers can use the vulnerability to execute phishing attacks.
0
Attacker Value
Unknown
CVE-2021-3647
Disclosure Date: July 16, 2021 (last updated February 23, 2025)
URI.js is vulnerable to URL Redirection to Untrusted Site
0
Attacker Value
Unknown
CVE-2021-20534
Disclosure Date: July 13, 2021 (last updated February 23, 2025)
IBM Security Verify Access Docker 10.0.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 198814
0
Attacker Value
Unknown
CVE-2021-35037
Disclosure Date: July 12, 2021 (last updated February 23, 2025)
Jamf Pro before 10.30.1 allows for an unvalidated URL redirect vulnerability affecting Jamf Pro customers who host their environments on-premises. An attacker may craft a URL that appears to be for a customer's Jamf Pro instance, but when clicked will forward a user to an arbitrary URL that may be malicious. This is tracked via Jamf with the following ID: PI-009822
0
Attacker Value
Unknown
CVE-2021-24406
Disclosure Date: July 06, 2021 (last updated February 22, 2025)
The wpForo Forum WordPress plugin before 1.9.7 did not validate the redirect_to parameter in the login form of the forum, leading to an open redirect issue after a successful login. Such issue could allow an attacker to induce a user to use a login URL redirecting to a website under their control and being a replica of the legitimate one, asking them to re-enter their credentials (which will then in the attacker hands)
0
Attacker Value
Unknown
CVE-2021-23401
Disclosure Date: July 05, 2021 (last updated February 22, 2025)
This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
0
Attacker Value
Unknown
CVE-2021-34807
Disclosure Date: July 02, 2021 (last updated February 22, 2025)
An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL via isredirect=1&redirectURL= in conjunction with the token data (e.g., a valid authtoken= value).
0