Total
15 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-29930 | 1 Jetbrains | 1 Ktor | 2022-11-28 | 4.0 MEDIUM | 4.9 MEDIUM |
SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1. | |||||
CVE-2022-38180 | 1 Jetbrains | 1 Ktor | 2022-08-16 | N/A | 6.5 MEDIUM |
In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases | |||||
CVE-2022-38179 | 1 Jetbrains | 1 Ktor | 2022-08-16 | N/A | 6.1 MEDIUM |
JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack | |||||
CVE-2022-29035 | 1 Jetbrains | 1 Ktor | 2022-04-15 | 4.0 MEDIUM | 2.7 LOW |
In JetBrains Ktor Native before version 2.0.0 random values used for nonce generation weren't using SecureRandom implementations | |||||
CVE-2021-43203 | 1 Jetbrains | 1 Ktor | 2021-11-10 | 5.0 MEDIUM | 7.5 HIGH |
In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly. | |||||
CVE-2021-25761 | 1 Jetbrains | 1 Ktor | 2021-02-08 | 5.0 MEDIUM | 5.3 MEDIUM |
In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible. | |||||
CVE-2021-25762 | 1 Jetbrains | 1 Ktor | 2021-02-08 | 5.0 MEDIUM | 5.3 MEDIUM |
In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible. | |||||
CVE-2021-25763 | 1 Jetbrains | 1 Ktor | 2021-02-05 | 5.0 MEDIUM | 5.3 MEDIUM |
In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default. | |||||
CVE-2020-26129 | 1 Jetbrains | 1 Ktor | 2020-12-01 | 6.4 MEDIUM | 6.5 MEDIUM |
In JetBrains Ktor before 1.4.1, HTTP request smuggling was possible. | |||||
CVE-2019-12736 | 1 Jetbrains | 1 Ktor | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
JetBrains Ktor framework before 1.2.0-rc does not sanitize the username provided by the user for the LDAP protocol, leading to command injection. | |||||
CVE-2019-10102 | 1 Jetbrains | 2 Kotlin, Ktor | 2020-08-24 | 6.8 MEDIUM | 8.1 HIGH |
JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30. | |||||
CVE-2019-19389 | 1 Jetbrains | 1 Ktor | 2020-08-24 | 3.5 LOW | 5.4 MEDIUM |
JetBrains Ktor framework before version 1.2.6 was vulnerable to HTTP Response Splitting. | |||||
CVE-2020-5207 | 1 Jetbrains | 1 Ktor | 2020-02-04 | 5.0 MEDIUM | 7.5 HIGH |
In Ktor before 1.3.0, request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle \n as a headers separator. | |||||
CVE-2019-19703 | 1 Jetbrains | 1 Ktor | 2019-12-13 | 5.8 MEDIUM | 6.1 MEDIUM |
In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location. | |||||
CVE-2019-12737 | 1 Jetbrains | 1 Ktor | 2019-10-08 | 5.0 MEDIUM | 5.3 MEDIUM |
UserHashedTableAuth in JetBrains Ktor framework before 1.2.0-rc uses a One-Way Hash with a Predictable Salt for storing user credentials. |