{"id":"CVE-2016-10742","details":"Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.","modified":"2026-03-12T22:11:52.968745Z","published":"2019-02-17T16:29:00.240Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"},{"type":"ADVISORY","url":"https://support.zabbix.com/browse/ZBX-13133"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"},{"type":"EVIDENCE","url":"https://support.zabbix.com/browse/ZBX-10272"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10742.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.2.20"}]},{"events":[{"introduced":"3.0.0"},{"last_affected":"3.0.12"}]},{"events":[{"introduced":"3.1.0"},{"last_affected":"3.2.9"}]},{"events":[{"introduced":"3.3.0"},{"last_affected":"3.4.3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"fixed":"2.2.21rc1"}]},{"events":[{"introduced":"3.x"},{"fixed":"3.0.13rc1"}]},{"events":[{"introduced":"3.2.x"},{"fixed":"3.2.10rc1"}]},{"events":[{"introduced":"3.4.x"},{"fixed":"3.4.4rc1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}