Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jetbrains ktor vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-12737
UserHashedTableAuth in JetBrains Ktor framework prior to 1.2.0-rc uses a One-Way Hash with a Predictable Salt for storing user credentials.
Jetbrains Ktor 1.2.0
Jetbrains Ktor
6.8
CVSSv2
CVE-2019-10102
JetBrains Ktor framework (created using the Kotlin IDE template) versions prior to 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.
Jetbrains Kotlin
Jetbrains Ktor
NA
CVE-2023-34339
In JetBrains Ktor prior to 2.3.1 headers containing authentication data could be added to the exception's message
Jetbrains Ktor
5
CVSSv2
CVE-2020-5207
In Ktor prior to 1.3.0, request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle \n as a headers separator.
Jetbrains Ktor
NA
CVE-2023-45612
In JetBrains Ktor prior to 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE
Jetbrains Ktor
NA
CVE-2023-45613
In JetBrains Ktor prior to 2.3.5 server certificates were not verified
Jetbrains Ktor
5
CVSSv2
CVE-2021-43203
In JetBrains Ktor prior to 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly.
Jetbrains Ktor
3.5
CVSSv2
CVE-2019-19389
JetBrains Ktor framework before version 1.2.6 was vulnerable to HTTP Response Splitting.
Jetbrains Ktor
NA
CVE-2022-48476
In JetBrains Ktor prior to 2.3.0 path traversal in the `resolveResource` method was possible
Jetbrains Ktor
NA
CVE-2022-38179
JetBrains Ktor prior to 2.1.0 was vulnerable to the Reflect File Download attack
Jetbrains Ktor
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »