Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2016-9451

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-25 Nov, 2016 | 18:00
Updated At-06 Aug, 2024 | 02:50
Rejected At-
Credits

Confirmation forms in Drupal 7.x before 7.52 make it easier for remote authenticated users to conduct open redirect attacks via unspecified vectors.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:25 Nov, 2016 | 18:00
Updated At:06 Aug, 2024 | 02:50
Rejected At:
â–¼CVE Numbering Authority (CNA)

Confirmation forms in Drupal 7.x before 7.52 make it easier for remote authenticated users to conduct open redirect attacks via unspecified vectors.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.debian.org/security/2016/dsa-3718
vendor-advisory
x_refsource_DEBIAN
http://www.securityfocus.com/bid/94367
vdb-entry
x_refsource_BID
https://www.drupal.org/SA-CORE-2016-005
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2016/dsa-3718
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.securityfocus.com/bid/94367
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://www.drupal.org/SA-CORE-2016-005
Resource:
x_refsource_CONFIRM
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.debian.org/security/2016/dsa-3718
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.securityfocus.com/bid/94367
vdb-entry
x_refsource_BID
x_transferred
https://www.drupal.org/SA-CORE-2016-005
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2016/dsa-3718
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/94367
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.drupal.org/SA-CORE-2016-005
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:25 Nov, 2016 | 18:59
Updated At:06 May, 2026 | 22:30

Confirmation forms in Drupal 7.x before 7.52 make it easier for remote authenticated users to conduct open redirect attacks via unspecified vectors.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.06.8MEDIUM
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N
Primary2.04.9MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:N
Type: Primary
Version: 3.0
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 4.9
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:S/C:P/I:P/A:N
CPE Matches

The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.0
cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.1
cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.2
cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.3
cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.4
cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.10
cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.11
cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.12
cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.13
cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.14
cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.15
cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.16
cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.17
cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.18
cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.19
cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.20
cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.21
cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.22
cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.23
cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.24
cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.25
cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.26
cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.27
cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.28
cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.29
cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.30
cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.31
cpe:2.3:a:drupal:drupal:7.31:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.32
cpe:2.3:a:drupal:drupal:7.32:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.33
cpe:2.3:a:drupal:drupal:7.33:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.34
cpe:2.3:a:drupal:drupal:7.34:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.35
cpe:2.3:a:drupal:drupal:7.35:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.36
cpe:2.3:a:drupal:drupal:7.36:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.37
cpe:2.3:a:drupal:drupal:7.37:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.38
cpe:2.3:a:drupal:drupal:7.38:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>7.40
cpe:2.3:a:drupal:drupal:7.40:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-601Primarynvd@nist.gov
CWE ID: CWE-601
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.debian.org/security/2016/dsa-3718cve@mitre.org
N/A
http://www.securityfocus.com/bid/94367cve@mitre.org
Third Party Advisory
VDB Entry
https://www.drupal.org/SA-CORE-2016-005cve@mitre.org
Patch
Vendor Advisory
http://www.debian.org/security/2016/dsa-3718af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/94367af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://www.drupal.org/SA-CORE-2016-005af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
Hyperlink: http://www.debian.org/security/2016/dsa-3718
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/94367
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.drupal.org/SA-CORE-2016-005
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.debian.org/security/2016/dsa-3718
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/94367
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.drupal.org/SA-CORE-2016-005
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

64Records found

CVE-2016-3047
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.09% / 25.69%
||
7 Day CHG~0.00%
Published-01 Dec, 2016 | 11:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in IBM FileNet Workplace 4.0.2 through 4.0.2.14 IF001 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Action-Not Available
Vendor-n/aIBM Corporation
Product-filenet_workplacen/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2016-3040
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.11% / 29.33%
||
7 Day CHG~0.00%
Published-26 Sep, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM WebSphere Application Server (WAS) Liberty, as used in IBM Security Privileged Identity Manager (ISPIM) Virtual Appliance 2.x before 2.0.2 FP8, allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Action-Not Available
Vendor-n/aIBM Corporation
Product-security_privileged_identity_manager_virtual_appliancen/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2016-0228
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.10% / 27.70%
||
7 Day CHG~0.00%
Published-17 Apr, 2017 | 21:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Marketing Platform 10.0 could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability in various scripts. An attacker could exploit this vulnerability to redirect a victim to arbitrary Web sites. IBM X-Force ID: 110236.

Action-Not Available
Vendor-IBM Corporation
Product-marketing_platformMarketing Platform
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2016-0329
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.09% / 24.65%
||
7 Day CHG~0.00%
Published-02 Feb, 2018 | 21:00
Updated-05 Aug, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in IBM Emptoris Sourcing 10.0.0.x before 10.0.0.1_iFix3, 10.0.1.x before 10.0.1.3_iFix3, 10.0.2.x before 10.0.2.8_iFix1, 10.0.4.0 before 10.0.4.0_iFix8, and 10.1.0.0 before 10.1.0.0_iFix3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. IBM X-Force ID: 111692.

Action-Not Available
Vendor-n/aIBM Corporation
Product-emptoris_sourcingn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2020-23182
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.12% / 30.58%
||
7 Day CHG~0.00%
Published-02 Jul, 2021 | 17:51
Updated-04 Aug, 2024 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The component /php-fusion/infusions/shoutbox_panel/shoutbox_archive.php in PHP-Fusion 9.03.60 allows attackers to redirect victim users to malicious websites via a crafted payload entered into the Shoutbox message panel.

Action-Not Available
Vendor-php-fusionn/a
Product-php-fusionn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2018-8813
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.8||MEDIUM
EPSS-1.44% / 80.94%
||
7 Day CHG~0.00%
Published-04 Apr, 2018 | 15:00
Updated-05 Aug, 2024 | 07:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in the login[redirect] parameter login functionality in WolfCMS 0.8.3.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a malformed URL.

Action-Not Available
Vendor-wolfcmsn/a
Product-wolf_cmsn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2018-1939
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.18% / 39.66%
||
7 Day CHG~0.00%
Published-05 Mar, 2019 | 18:00
Updated-16 Sep, 2024 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Cloud Private 3.1.1 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 153319.

Action-Not Available
Vendor-IBM Corporation
Product-cloud_privateCloud Private
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2018-1704
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.08% / 23.81%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 13:00
Updated-16 Sep, 2024 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Platform Symphony 7.1 Fix Pack 1 and 7.1.1 and IBM Spectrum Symphony 7.1.2 and 7.2.0.2 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 146339.

Action-Not Available
Vendor-IBM Corporation
Product-spectrum_symphonyplatform_symphonyPlatform SymphonySpectrum Symphony
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2020-15233
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.26% / 48.80%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 20:40
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses

ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redirect URL by performing an OAuth flow and requesting a redirect URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface. This vulnerability has been patched in ORY Fosite v0.34.1.

Action-Not Available
Vendor-oryory
Product-fositefosite
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE ID-CWE-20
Improper Input Validation
CVE-2019-4595
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.19% / 40.50%
||
7 Day CHG~0.00%
Published-24 Feb, 2020 | 15:35
Updated-16 Sep, 2024 | 23:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 167878.

Action-Not Available
Vendor-IBM Corporation
Product-sterling_b2b_integratorSterling B2B Integrator
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-4153
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.09% / 25.51%
||
7 Day CHG~0.00%
Published-25 Jun, 2019 | 15:45
Updated-17 Sep, 2024 | 00:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Access Manager 9.0.1 through 9.0.6 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 158517.

Action-Not Available
Vendor-IBM Corporation
Product-security_access_managerSecurity Access Manager
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2018-15403
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.16% / 36.13%
||
7 Day CHG~0.00%
Published-05 Oct, 2018 | 14:00
Updated-26 Nov, 2024 | 14:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Cisco Unified Communications Products Open Redirect Vulnerability

A vulnerability in the web interface of Cisco Emergency Responder, Cisco Unified Communications Manager, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an authenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by crafting an HTTP request that causes the web interface to redirect a request to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_manager_im_and_presence_serviceunified_communications_managerunity_connectionemergency_responderCisco Emergency Responder
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2017-16569
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.8||MEDIUM
EPSS-0.14% / 33.14%
||
7 Day CHG~0.00%
Published-06 Nov, 2017 | 08:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Open URL Redirect issue exists in Zurmo 3.2.1.57987acc3018 via an http: URL in the redirectUrl parameter to app/index.php/meetings/default/createMeeting.

Action-Not Available
Vendor-zurmon/a
Product-zurmo_crmn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2016-0204
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.16% / 36.45%
||
7 Day CHG~0.00%
Published-16 Oct, 2016 | 21:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in IBM Cloud Orchestrator 2.4.x before 2.4.0 FP3 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Action-Not Available
Vendor-n/aIBM Corporation
Product-cloud_orchestratorn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
  • Previous
  • 1
  • 2
  • Next
Details not found