Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
request tracker vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2020-15810
An issue exists in Squid prior to 4.13 and 5.x prior to 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security a...
Squid-cache Squid
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Leap 15.1
Opensuse Leap 15.2
4
CVSSv2
CVE-2020-15811
An issue exists in Squid prior to 4.13 and 5.x prior to 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security a...
Squid-cache Squid
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Leap 15.1
Opensuse Leap 15.2
NA
CVE-2022-32214
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).
Llhttp Llhttp
Nodejs Node.js
Debian Debian Linux 11.0
Stormshield Stormshield Management Center
6.5
CVSSv2
CVE-2020-11100
In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 up to and including 2.x prior to 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.
Haproxy Haproxy
Debian Debian Linux 10.0
Redhat Openshift Container Platform 3.11
Redhat Openshift Container Platform 4.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Opensuse Leap 15.1
6
CVSSv2
CVE-2012-4733
Request Tracker (RT) 4.x prior to 4.0.13 does not properly enforce the DeleteTicket and "custom lifecycle transition" permission, which allows remote authenticated users with the ModifyTicket permission to delete tickets via unspecified vectors.
Bestpractical Rt 4.0.1
Bestpractical Rt 4.0.10
Bestpractical Rt 4.0.0
Bestpractical Rt 4.0.2
Bestpractical Rt 4.0.3
Bestpractical Rt 4.0.12
Bestpractical Rt 4.0.11
4.3
CVSSv2
CVE-2013-3372
Request Tracker (RT) 3.8.x prior to 3.8.17 and 4.0.x prior to 4.0.13 allows remote malicious users to inject multiple Content-Disposition HTTP headers and possibly conduct cross-site scripting (XSS) attacks via unspecified vectors.
Bestpractical Rt 4.0.10
Bestpractical Rt 4.0.9
Bestpractical Rt 4.0.0
Bestpractical Rt 4.0.2
Bestpractical Rt 4.0.3
Bestpractical Rt 4.0.4
Bestpractical Rt 4.0.12
Bestpractical Rt 4.0.1
Bestpractical Rt 4.0.5
Bestpractical Rt 4.0.6
Bestpractical Rt 4.0.7
Bestpractical Rt 4.0.8
Bestpractical Rt 4.0.11
Bestpractical Rt 3.8.0
Bestpractical Rt 3.8.1
Bestpractical Rt 3.8.13
Bestpractical Rt 3.8.14
Bestpractical Rt 3.8.7
Bestpractical Rt 3.8.8
Bestpractical Rt 3.8.16
Bestpractical Rt 3.8.11
Bestpractical Rt 3.8.12
3.3
CVSSv2
CVE-2013-3368
bin/rt in Request Tracker (RT) 3.8.x prior to 3.8.17 and 4.0.x prior to 4.0.13 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with predictable name.
Bestpractical Rt 4.0.12
Bestpractical Rt 4.0.0
Bestpractical Rt 4.0.1
Bestpractical Rt 4.0.2
Bestpractical Rt 4.0.5
Bestpractical Rt 4.0.6
Bestpractical Rt 4.0.7
Bestpractical Rt 4.0.8
Bestpractical Rt 4.0.11
Bestpractical Rt 4.0.10
Bestpractical Rt 4.0.9
Bestpractical Rt 4.0.3
Bestpractical Rt 4.0.4
Bestpractical Rt 3.8.16
Bestpractical Rt 3.8.0
Bestpractical Rt 3.8.1
Bestpractical Rt 3.8.11
Bestpractical Rt 3.8.12
Bestpractical Rt 3.8.2
Bestpractical Rt 3.8.4
Bestpractical Rt 3.8.6
Bestpractical Rt 3.8.8
5
CVSSv2
CVE-2004-2029
The Util_DecodeHTTPAuth function in BNBT BitTorrent Tracker Beta 7.5 Release 2 and previous versions allows remote malicious users to cause a denial of service (crash) via a Basic Authorization HTTP request with a "A==" value.
Trevor Hogan Bnbt 7.5 Beta Release2
1 EDB exploit
4.3
CVSSv2
CVE-2013-3371
Cross-site scripting (XSS) vulnerability in Request Tracker (RT) 3.8.3 up to and including 3.8.16 and 4.0.x prior to 4.0.13 allows remote malicious users to inject arbitrary web script or HTML via the filename of an attachment.
Bestpractical Rt 3.8.0
Bestpractical Rt 3.8.1
Bestpractical Rt 3.8.11
Bestpractical Rt 3.8.15
Bestpractical Rt 3.8.2
Bestpractical Rt 3.8.4
Bestpractical Rt 3.8.5
Bestpractical Rt 3.8.6
Bestpractical Rt 3.8.8
Bestpractical Rt 3.8.9
Bestpractical Rt 3.8.13
Bestpractical Rt 3.8.10
Bestpractical Rt 3.8.3
Bestpractical Rt 3.8.14
Bestpractical Rt 3.8.7
Bestpractical Rt 3.8.16
Bestpractical Rt 3.8.12
Bestpractical Rt 4.0.10
Bestpractical Rt 4.0.0
Bestpractical Rt 4.0.1
Bestpractical Rt 4.0.2
Bestpractical Rt 4.0.3
5
CVSSv2
CVE-2013-3373
CRLF injection vulnerability in Request Tracker (RT) 3.8.x prior to 3.8.17 and 4.0.x prior to 4.0.13 allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a MIME header.
Bestpractical Rt 4.0.0
Bestpractical Rt 4.0.1
Bestpractical Rt 4.0.3
Bestpractical Rt 4.0.4
Bestpractical Rt 4.0.8
Bestpractical Rt 4.0.12
Bestpractical Rt 4.0.11
Bestpractical Rt 4.0.10
Bestpractical Rt 4.0.2
Bestpractical Rt 4.0.5
Bestpractical Rt 4.0.6
Bestpractical Rt 4.0.7
Bestpractical Rt 4.0.9
Bestpractical Rt 3.8.0
Bestpractical Rt 3.8.1
Bestpractical Rt 3.8.10
Bestpractical Rt 3.8.11
Bestpractical Rt 3.8.14
Bestpractical Rt 3.8.15
Bestpractical Rt 3.8.3
Bestpractical Rt 3.8.4
Bestpractical Rt 3.8.8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »