Vulnerabilities > URL Redirection to Untrusted Site ('Open Redirect')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-08-01 | CVE-2019-9140 | Open Redirect vulnerability in Happypointcard Happypoint 6.3.19 When processing Deeplink scheme, Happypoint mobile app 6.3.19 and earlier versions doesn't check Deeplink URL correctly. | 8.1 |
2019-08-01 | CVE-2018-20929 | Open Redirect vulnerability in Cpanel cPanel before 70.0.23 allows an open redirect via the /unprotected/redirect.html endpoint (SEC-392). | 6.1 |
2019-07-30 | CVE-2019-14403 | Open Redirect vulnerability in Cpanel cPanel before 78.0.18 offers an open mail relay because of incorrect domain-redirect routing (SEC-483). | 4.3 |
2019-07-30 | CVE-2018-20867 | Open Redirect vulnerability in Cpanel cPanel before 76.0.8 has an open redirect when resetting connections (SEC-462). | 6.1 |
2019-07-29 | CVE-2019-1020016 | Open Redirect vulnerability in Ash-Aio Project Ash-Aio 2.0.0.0/2.0.0.1/2.0.0.2 ASH-AIO before 2.0.0.3 allows an open redirect. | 6.1 |
2019-07-17 | CVE-2019-1943 | Open Redirect vulnerability in Cisco products A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. | 6.1 |
2019-07-16 | CVE-2019-1010290 | Open Redirect vulnerability in Cmsmadesimple Bable:Multilingual Site Babel: Multilingual site Babel All is affected by: Open Redirection. | 6.1 |
2019-07-15 | CVE-2019-1075 | Open Redirect vulnerability in Microsoft Asp.Net Core 2.1/2.2 A spoofing vulnerability exists in ASP.NET Core that could lead to an open redirect, aka 'ASP.NET Core Spoofing Vulnerability'. | 6.1 |
2019-07-05 | CVE-2018-12621 | Open Redirect vulnerability in Eventum Project Eventum 3.5.0 An issue was discovered in Eventum 3.5.0. | 6.1 |
2019-07-05 | CVE-2019-5969 | Open Redirect vulnerability in Weseek Growi Open redirect vulnerability in GROWI v3.4.6 and earlier allows remote attackersto redirect users to arbitrary web sites and conduct phishing attacks via the process of login. | 6.1 |