{"uuid": "66f0e979-a323-43d4-bda6-ca38a3e1f18e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-28861", "type": "seen", "source": "https://t.me/cvedetector/19150", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1300 - CodeChecker Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1300 \nPublished : Feb. 28, 2025, 1:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy.   \n  \nThe CodeChecker web server contains an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL. This results in bypassing the protections against CVE-2021-28861, leading to the same open redirect pathway.  \n  \nThis issue affects CodeChecker: through 6.24.5. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T15:21:22.000000Z"}