Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sitracker support incident tracker vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2019-20221
In Support Incident Tracker (SiT!) 3.67, Load Plugins input in the config.php page is affected by XSS. The XSS payload is, for example, executed on the about.php page.
Sitracker Support Incident Tracker 3.67
4.3
CVSSv2
CVE-2019-20222
In Support Incident Tracker (SiT!) 3.67, the Short Application Name and Application Name inputs in the config.php page are affected by XSS.
Sitracker Support Incident Tracker 3.67
4.3
CVSSv2
CVE-2019-20223
In Support Incident Tracker (SiT!) 3.67, the id parameter is affected by XSS on all endpoints that use this parameter, a related issue to CVE-2012-2235.
Sitracker Support Incident Tracker 3.67
6.8
CVSSv2
CVE-2011-5068
Multiple cross-site request forgery (CSRF) vulnerabilities in Support Incident Tracker (aka SiT!) 3.65 allow remote malicious users to hijack the authentication of user for requests that delete a user via user_delete.php and other unspecified programs.
Sitracker Support Incident Tracker 3.65
6
CVSSv2
CVE-2011-3833
Unrestricted file upload vulnerability in ftp_upload_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to execute arbitrary PHP code by uploading a PHP file, then accessing it via a direct request to the file in an unspecified directory.
Sitracker Support Incident Tracker 3.65
1 EDB exploit
4
CVSSv2
CVE-2011-3829
ftp_upload_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to obtain sensitive information via the file name, which reveals the installation path in an error message.
Sitracker Support Incident Tracker 3.65
1 EDB exploit
7.5
CVSSv2
CVE-2011-3831
SQL injection vulnerability in incident_attachments.php in Support Incident Tracker (aka SiT!) 3.65 allows remote malicious users to execute arbitrary SQL commands via an uploaded file with a crafted file name.
Sitracker Support Incident Tracker 3.65
6.5
CVSSv2
CVE-2011-3832
Eval injection vulnerability in config.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated administrators to execute arbitrary PHP code via the application_name parameter in a save action.
Sitracker Support Incident Tracker 3.65
4
CVSSv2
CVE-2011-5067
move_uploaded_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to obtain sensitive information via the file name, which reveals the installation path in an error message.
Sitracker Support Incident Tracker 3.65
6
CVSSv2
CVE-2011-5069
Unrestricted file upload vulnerability in incident_attachments.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in unspe...
Sitracker Support Incident Tracker 3.65
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »