Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jetbrains ktor vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-12737
UserHashedTableAuth in JetBrains Ktor framework prior to 1.2.0-rc uses a One-Way Hash with a Predictable Salt for storing user credentials.
Jetbrains Ktor 1.2.0
Jetbrains Ktor
6.8
CVSSv2
CVE-2019-10102
JetBrains Ktor framework (created using the Kotlin IDE template) versions prior to 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.
Jetbrains Kotlin
Jetbrains Ktor
7.5
CVSSv2
CVE-2019-12736
JetBrains Ktor framework prior to 1.2.0-rc does not sanitize the username provided by the user for the LDAP protocol, leading to command injection.
Jetbrains Ktor
3.5
CVSSv2
CVE-2019-19389
JetBrains Ktor framework before version 1.2.6 was vulnerable to HTTP Response Splitting.
Jetbrains Ktor
NA
CVE-2023-45612
In JetBrains Ktor prior to 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE
Jetbrains Ktor
NA
CVE-2023-45613
In JetBrains Ktor prior to 2.3.5 server certificates were not verified
Jetbrains Ktor
NA
CVE-2022-48476
In JetBrains Ktor prior to 2.3.0 path traversal in the `resolveResource` method was possible
Jetbrains Ktor
5
CVSSv2
CVE-2020-5207
In Ktor prior to 1.3.0, request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle \n as a headers separator.
Jetbrains Ktor
5
CVSSv2
CVE-2021-25761
In JetBrains Ktor prior to 1.5.0, a birthday attack on SessionStorage key was possible.
Jetbrains Ktor
5
CVSSv2
CVE-2021-25763
In JetBrains Ktor prior to 1.4.2, weak cipher suites were enabled by default.
Jetbrains Ktor
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »