It was possible to redirect an user to external websites through manipulating
GET parameters. To exploit this vulnerability, an attacker needs to trick a
user into following a crafted URL. The attack only works if the user does not
notice that he is redirected to a different URL.
To the list of all Werks