Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
request project request vulnerabilities and exploits
(subscribe to this query)
632
VMScore
CVE-2017-16026
Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request >=2.2.6 <2.47.0 || >2.51.0 <=2.67.0.
Request Project Request
NA
CVE-2023-28155
The Request package up to and including 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by t...
Request Project Request
1 Github repository
383
VMScore
CVE-2019-1010206
OSS Http Request (Apache Cordova Plugin) 6 is affected by: Missing SSL certificate validation. The impact is: certificate spoofing. The component is: use this library when https communication. The attack vector is: certificate spoofing.
Http Request Project Http Request 6.0
445
VMScore
CVE-2022-0654
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry before 7.0.0.
Node-request-retry Project Node-request-retry
1 Github repository
445
VMScore
CVE-2015-1165
RT (aka Request Tracker) 3.8.8 up to and including 4.x prior to 4.0.23 and 4.2.x prior to 4.2.10 allows remote malicious users to obtain sensitive RSS feed URLs and ticket data via unspecified vectors.
Fedoraproject Fedora 22
Debian Debian Linux 7.0
Fedoraproject Fedora 21
Bestpractical Request Tracker 4.2.3
Bestpractical Request Tracker 4.2.6
Bestpractical Request Tracker 4.0.18
Bestpractical Request Tracker 3.8.15
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.6
Bestpractical Request Tracker 4.0.7
Bestpractical Request Tracker 4.0.17
Bestpractical Request Tracker 4.0.21
Bestpractical Request Tracker 4.0.22
Bestpractical Request Tracker 3.8.16
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.2.2
Bestpractical Request Tracker 4.0.15
Bestpractical Request Tracker 4.2.7
Bestpractical Request Tracker 4.2.0
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.2
Bestpractical Request Tracker 4.0.10
605
VMScore
CVE-2017-5943
Request Tracker (RT) 4.x prior to 4.0.25, 4.2.x prior to 4.2.14, and 4.4.x prior to 4.4.2 allows remote malicious users to obtain sensitive information about cross-site request forgery (CSRF) verification tokens via a crafted URL.
Bestpractical Request Tracker 4.2.3
Bestpractical Request Tracker 4.2.6
Bestpractical Request Tracker 4.0.18
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.6
Bestpractical Request Tracker 4.2.12
Bestpractical Request Tracker 4.0.7
Bestpractical Request Tracker 4.0.17
Bestpractical Request Tracker 4.0.21
Bestpractical Request Tracker 4.0.22
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.2.2
Bestpractical Request Tracker 4.0.15
Bestpractical Request Tracker 4.2.7
Bestpractical Request Tracker 4.2.0
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.2
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.2.10
Bestpractical Request Tracker 4.0.9
Bestpractical Request Tracker 4.0.14
Bestpractical Request Tracker 4.0.4
578
VMScore
CVE-2017-5944
The dashboard subscription interface in Request Tracker (RT) 4.x prior to 4.0.25, 4.2.x prior to 4.2.14, and 4.4.x prior to 4.4.2 might allow remote authenticated users with certain privileges to execute arbitrary code via a crafted saved search name.
Bestpractical Request Tracker 4.2.3
Bestpractical Request Tracker 4.2.6
Bestpractical Request Tracker 4.0.18
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.6
Bestpractical Request Tracker 4.2.12
Bestpractical Request Tracker 4.0.7
Bestpractical Request Tracker 4.0.17
Bestpractical Request Tracker 4.0.21
Bestpractical Request Tracker 4.0.22
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.2.2
Bestpractical Request Tracker 4.0.15
Bestpractical Request Tracker 4.2.7
Bestpractical Request Tracker 4.2.0
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.2
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.2.10
Bestpractical Request Tracker 4.0.9
Bestpractical Request Tracker 4.0.14
Bestpractical Request Tracker 4.0.4
383
VMScore
CVE-2016-6127
Cross-site scripting (XSS) vulnerability in Request Tracker (RT) 4.x prior to 4.0.25, 4.2.x prior to 4.2.14, and 4.4.x prior to 4.4.2, when the AlwaysDownloadAttachments config setting is not in use, allows remote malicious users to inject arbitrary web script or HTML via a file ...
Bestpractical Request Tracker 4.2.3
Bestpractical Request Tracker 4.2.6
Bestpractical Request Tracker 4.0.18
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.6
Bestpractical Request Tracker 4.2.12
Bestpractical Request Tracker 4.0.7
Bestpractical Request Tracker 4.0.17
Bestpractical Request Tracker 4.0.21
Bestpractical Request Tracker 4.0.22
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.2.2
Bestpractical Request Tracker 4.0.15
Bestpractical Request Tracker 4.2.7
Bestpractical Request Tracker 4.2.0
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.2
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.2.10
Bestpractical Request Tracker 4.0.9
Bestpractical Request Tracker 4.0.14
Bestpractical Request Tracker 4.0.4
383
VMScore
CVE-2017-5361
Request Tracker (RT) 4.x prior to 4.0.25, 4.2.x prior to 4.2.14, and 4.4.x prior to 4.4.2 does not use a constant-time comparison algorithm for secrets, which makes it easier for remote malicious users to obtain sensitive user password information via a timing side-channel attack...
Bestpractical Request Tracker 4.2.3
Bestpractical Request Tracker 4.2.6
Bestpractical Request Tracker 4.0.18
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.6
Bestpractical Request Tracker 4.2.12
Bestpractical Request Tracker 4.0.7
Bestpractical Request Tracker 4.0.17
Bestpractical Request Tracker 4.0.21
Bestpractical Request Tracker 4.0.22
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.2.2
Bestpractical Request Tracker 4.0.15
Bestpractical Request Tracker 4.2.7
Bestpractical Request Tracker 4.2.0
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.2
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.2.10
Bestpractical Request Tracker 4.0.9
Bestpractical Request Tracker 4.0.14
Bestpractical Request Tracker 4.0.4
632
VMScore
CVE-2014-9472
The email gateway in RT (aka Request Tracker) 3.0.0 up to and including 4.x prior to 4.0.23 and 4.2.x prior to 4.2.10 allows remote malicious users to cause a denial of service (CPU and disk consumption) via a crafted email.
Debian Debian Linux 7.0
Fedoraproject Fedora 22
Fedoraproject Fedora 21
Bestpractical Request Tracker 4.2.3
Bestpractical Request Tracker 4.2.6
Bestpractical Request Tracker 4.0.18
Bestpractical Request Tracker 3.8.15
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.6
Bestpractical Request Tracker 4.0.7
Bestpractical Request Tracker 4.0.17
Bestpractical Request Tracker 4.0.21
Bestpractical Request Tracker 4.0.22
Bestpractical Request Tracker 3.8.16
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.2.2
Bestpractical Request Tracker 3.8.7
Bestpractical Request Tracker 4.0.15
Bestpractical Request Tracker 4.2.7
Bestpractical Request Tracker 4.2.0
Bestpractical Request Tracker 3.6.8
Bestpractical Request Tracker 4.0.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »