Show filters
235 Total Results
Displaying 21-30 of 235
Sort by:
Attacker Value
Unknown

CVE-2021-22942

Disclosure Date: October 18, 2021 (last updated February 23, 2025)
A possible open redirect vulnerability in the Host Authorization middleware in Action Pack >= 6.0.0 that could allow attackers to redirect users to a malicious website.
Attacker Value
Unknown

CVE-2021-22964

Disclosure Date: October 14, 2021 (last updated February 23, 2025)
A redirect vulnerability in the `fastify-static` module version >= 4.2.4 and < 4.4.1 allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`.A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is "http://localhost:3000//^/.."`The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.
Attacker Value
Unknown

CVE-2021-22963

Disclosure Date: October 14, 2021 (last updated February 23, 2025)
A redirect vulnerability in the fastify-static module version < 4.2.4 allows remote attackers to redirect users to arbitrary websites via a double slash // followed by a domain: http://localhost:3000//google.com/%2e%2e.The issue shows up on all the fastify-static applications that set redirect: true option. By default, it is false.
Attacker Value
Unknown

CVE-2021-20806

Disclosure Date: October 13, 2021 (last updated February 23, 2025)
Open redirect vulnerability in Cybozu Remote Service 3.0.0 to 3.1.9 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
Attacker Value
Unknown

CVE-2021-20031

Disclosure Date: October 12, 2021 (last updated February 23, 2025)
A Host Header Redirection vulnerability in SonicOS potentially allows a remote attacker to redirect firewall management users to arbitrary web domains.
Attacker Value
Unknown

CVE-2021-34772

Disclosure Date: October 06, 2021 (last updated February 23, 2025)
A vulnerability in the web-based management interface of Cisco Orbital could allow an unauthenticated, remote attacker to redirect users to a malicious webpage. This vulnerability is due to improper validation of URL paths in the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted URL. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability, known as an open redirect attack, is used in phishing attacks to persuade users to visit malicious sites.
Attacker Value
Unknown

CVE-2021-35205

Disclosure Date: September 30, 2021 (last updated February 23, 2025)
NETSCOUT Systems nGeniusONE version 6.3.0 build 1196 allows URL redirection in redirector.
Attacker Value
Unknown

CVE-2021-41826

Disclosure Date: September 30, 2021 (last updated February 23, 2025)
PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect.
Attacker Value
Unknown

CVE-2021-23052

Disclosure Date: September 14, 2021 (last updated February 23, 2025)
On version 14.1.x before 14.1.4.4 and all versions of 13.1.x, an open redirect vulnerability exists on virtual servers enabled with a BIG-IP APM access policy. This vulnerability allows an unauthenticated malicious user to build an open redirect URI. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attacker Value
Unknown

CVE-2021-23435

Disclosure Date: September 12, 2021 (last updated February 23, 2025)
This affects the package clearance before 2.5.0. The vulnerability can be possible when users are able to set the value of session[:return_to]. If the value used for return_to contains multiple leading slashes (/////example.com) the user ends up being redirected to the external domain that comes after the slashes (http://example.com).