CVE-2015-10052

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The patch is named 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d Patch Third Party Advisory
https://vuldb.com/?ctiid.218379 Permissions Required Third Party Advisory
https://vuldb.com/?id.218379 Third Party Advisory
https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d Patch Third Party Advisory
https://vuldb.com/?ctiid.218379 Permissions Required Third Party Advisory
https://vuldb.com/?id.218379 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gibb-modul-151_project:gibb-modul-151:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
CVSS v2 : 5.5
v3 : 6.1
v2 : 5.5
v3 : 4.6
References () https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d - Patch, Third Party Advisory () https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d - Patch, Third Party Advisory
References () https://vuldb.com/?ctiid.218379 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.218379 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.218379 - Third Party Advisory () https://vuldb.com/?id.218379 - Third Party Advisory

29 Feb 2024, 01:16

Type Values Removed Values Added
Summary
  • (es) ** NO SOPORTADO CUANDO ESTÁ ASIGNADO ** Una vulnerabilidad clasificada como problemática fue encontrada en calesanz gibb-modul-151. Esto afecta a la función Bearbeiten/login. La manipulación conduce a open redirect. Es posible iniciar el ataque de forma remota. El parche se llama 88a517dc19443081210c804b655e72770727540d. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218379. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante.

Information

Published : 2023-01-15 19:15

Updated : 2024-11-21 02:24


NVD link : CVE-2015-10052

Mitre link : CVE-2015-10052

CVE.ORG link : CVE-2015-10052


JSON object : View

Products Affected

gibb-modul-151_project

  • gibb-modul-151
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')