Show filters
238 Total Results
Displaying 31-40 of 238
Sort by:
Attacker Value
Unknown
CVE-2021-41826
Disclosure Date: September 30, 2021 (last updated February 23, 2025)
PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect.
0
Attacker Value
Unknown
CVE-2021-23052
Disclosure Date: September 14, 2021 (last updated February 23, 2025)
On version 14.1.x before 14.1.4.4 and all versions of 13.1.x, an open redirect vulnerability exists on virtual servers enabled with a BIG-IP APM access policy. This vulnerability allows an unauthenticated malicious user to build an open redirect URI. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2021-23435
Disclosure Date: September 12, 2021 (last updated February 23, 2025)
This affects the package clearance before 2.5.0. The vulnerability can be possible when users are able to set the value of session[:return_to]. If the value used for return_to contains multiple leading slashes (/////example.com) the user ends up being redirected to the external domain that comes after the slashes (http://example.com).
0
Attacker Value
Unknown
CVE-2021-32805
Disclosure Date: September 08, 2021 (last updated February 23, 2025)
Flask-AppBuilder is an application development framework, built on top of Flask. In affected versions if using Flask-AppBuilder OAuth, an attacker can share a carefully crafted URL with a trusted domain for an application built with Flask-AppBuilder, this URL can redirect a user to a malicious site. This is an open redirect vulnerability. To resolve this issue upgrade to Flask-AppBuilder 3.2.2 or above. If upgrading is infeasible users may filter HTTP traffic containing `?next={next-site}` where the `next-site` domain is different from the application you are protecting as a workaround.
0
Attacker Value
Unknown
CVE-2021-39501
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
EyouCMS 1.5.4 is vulnerable to Open Redirect. An attacker can redirect a user to a malicious url via the Logout function.
0
Attacker Value
Unknown
CVE-2021-38123
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
Open Redirect vulnerability in Micro Focus Network Automation, affecting Network Automation versions 10.4x, 10.5x, 2018.05, 2018.11, 2019.05, 2020.02, 2020.08, 2020.11, 2021.05. The vulnerability could allow redirect users to malicious websites after authentication.
0
Attacker Value
Unknown
CVE-2021-39191
Disclosure Date: September 03, 2021 (last updated February 23, 2025)
mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.
0
Attacker Value
Unknown
CVE-2021-22526
Disclosure Date: August 31, 2021 (last updated February 23, 2025)
Open Redirection vulnerability in NetIQ Access Manager prior to 5.0.1 and 4.5.4
0
Attacker Value
Unknown
CVE-2021-38343
Disclosure Date: August 25, 2021 (last updated February 23, 2025)
The Nested Pages WordPress plugin <= 3.1.15 was vulnerable to an Open Redirect via the `page` POST parameter in the `npBulkActions`, `npBulkEdit`, `npListingSort`, and `npCategoryFilter` `admin_post` actions.
0
Attacker Value
Unknown
CVE-2021-30888
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
An information leakage issue was addressed. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1. A malicious website using Content Security Policy reports may be able to leak information via redirect behavior .
0