Логотип exploitDog
bind:CVE-2020-21998
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-21998

Количество 2

Количество 2

nvd логотип

CVE-2020-21998

почти 5 лет назад

In HomeAutomation 3.3.2 input passed via the 'redirect' GET parameter in 'api.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-jp2g-6jcr-6p62

больше 3 лет назад

In HomeAutomation 3.3.2 input passed via the 'redirect' GET parameter in 'api.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-21998

In HomeAutomation 3.3.2 input passed via the 'redirect' GET parameter in 'api.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

CVSS3: 6.1
2%
Низкий
почти 5 лет назад
github логотип
GHSA-jp2g-6jcr-6p62

In HomeAutomation 3.3.2 input passed via the 'redirect' GET parameter in 'api.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу