{"vulnerability": "CVE-2021-28861", "sightings": [{"uuid": "66f0e979-a323-43d4-bda6-ca38a3e1f18e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28861", "type": "seen", "source": "https://t.me/cvedetector/19150", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1300 - CodeChecker Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1300 \nPublished : Feb. 28, 2025, 1:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy.   \n  \nThe CodeChecker web server contains an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL. This results in bypassing the protections against CVE-2021-28861, leading to the same open redirect pathway.  \n  \nThis issue affects CodeChecker: through 6.24.5. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T15:21:22.000000Z"}, {"uuid": "cc4aeba9-8faf-4c26-bcf1-f6e34e888f8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28861", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5901", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1300\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \n\nThe CodeChecker web server contains an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL. This results in bypassing the protections against CVE-2021-28861, leading to the same open redirect pathway.\n\nThis issue affects CodeChecker: through 6.24.5.\n\ud83d\udccf Published: 2025-02-28T12:47:19.205Z\n\ud83d\udccf Modified: 2025-02-28T12:47:19.205Z\n\ud83d\udd17 References:\n1. https://github.com/Ericsson/codechecker/security/advisories/GHSA-g839-x3p3-g5fm", "creation_timestamp": "2025-02-28T13:27:11.000000Z"}, {"uuid": "1398b157-dfa8-4be2-bb83-4aae25c885e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28861", "type": "seen", "source": "https://t.me/cibsecurity/48567", "content": "\u203c CVE-2021-28861 \u203c\n\nPython 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-23T07:21:07.000000Z"}]}