request-tracker4 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the request-tracker4 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2025-61873

<4.4.4+dfsg-2+deb11u5
  • L
Use of a Broken or Risky Cryptographic Algorithm

<4.4.4+dfsg-2+deb11u4
  • M
Cross-site Scripting (XSS)

<4.4.4+dfsg-2+deb11u4
  • L
Information Exposure

<4.4.4+dfsg-2+deb11u4
  • H
CVE-2023-41260

<4.4.4+dfsg-2+deb11u3
  • H
CVE-2023-41259

<4.4.4+dfsg-2+deb11u3
  • M
Cross-site Scripting (XSS)

<4.4.4+dfsg-2+deb11u2
  • H
Information Exposure

<4.4.4+dfsg-2+deb11u1
  • H
Improper Input Validation

<4.4.1-4
  • H
Cross-site Request Forgery (CSRF)

<4.4.1-4
  • M
CVE-2017-5361

<4.4.1-4
  • M
Cross-site Scripting (XSS)

<4.4.1-4
  • M
Cross-site Scripting (XSS)

<4.2.11-2
  • M
Cross-site Scripting (XSS)

<4.2.11-2
  • M
Improper Access Control

<4.2.8-3
  • M
Information Exposure

<4.2.8-3
  • M
Resource Management Errors

<4.2.8-3
  • M
Credentials Management

<4.0.12-2
  • M
Cross-site Scripting (XSS)

<4.0.12-2
  • M
Arbitrary Code Injection

<4.0.12-2
  • L
Cross-site Scripting (XSS)

<4.0.12-2
  • M
Link Following

<4.0.12-2
  • M
CVE-2013-3374

<4.0.12-2
  • M
CVE-2013-3369

<4.0.12-2
  • M
Cross-site Scripting (XSS)

<4.0.12-2
  • M
Access Restriction Bypass

<4.0.12-2
  • M
Cryptographic Issues

<4.0.7-2
  • M
Cryptographic Issues

<4.0.7-2
  • M
Access Restriction Bypass

<4.0.7-2
  • M
Cryptographic Issues

<4.0.7-2
  • L
Access Restriction Bypass

<4.0.7-2
  • M
Access Restriction Bypass

<4.0.7-2
  • M
Cross-site Request Forgery (CSRF)

<4.0.7-2
  • M
Access Restriction Bypass

<4.0.7-2
  • M
Arbitrary Code Injection

<4.0.7-2
  • M
Cross-site Scripting (XSS)

<4.0.6-1
  • M
Cross-site Scripting (XSS)

<4.0.6-1
  • L
Access Restriction Bypass

<4.0.5-3
  • M
Arbitrary Code Injection

<4.0.5-3
  • M
SQL Injection

<4.0.5-3
  • M
Cross-site Request Forgery (CSRF)

<4.0.5-3
  • M
Information Exposure

<4.0.5-3
  • M
Credentials Management

<4.0.5-3
  • M
Cross-site Scripting (XSS)

<4.0.5-3