Known Vulnerabilities for Support Incident Tracker by Sitracker

Listed below are 10 of the newest known vulnerabilities associated with "Support Incident Tracker" by "Sitracker".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2019-20223 In Support Incident Tracker (SiT!) 3.67, the id parameter is affected by XSS on all endpoints that use this parameter, a rela... 6.1 - MEDIUM 2020-01-02 2020-01-03
CVE-2019-20222 In Support Incident Tracker (SiT!) 3.67, the Short Application Name and Application Name inputs in the config.php page are af... 6.1 - MEDIUM 2020-01-02 2020-01-03
CVE-2019-20221 In Support Incident Tracker (SiT!) 3.67, Load Plugins input in the config.php page is affected by XSS. The XSS payload is, fo... 6.1 - MEDIUM 2020-01-02 2020-01-03
CVE-2019-20220 In Support Incident Tracker (SiT!) 3.67, the search_id parameter in the search_incidents_advanced.php page is affected by XSS... 6.1 - MEDIUM 2020-01-02 2020-01-03
CVE-2012-2235 Cross-site scripting (XSS) vulnerability in Support Incident Tracker (SiT!) 3.65 and earlier allows remote attackers to injec... 4.3 - MEDIUM 2012-05-27 2012-05-28
CVE-2011-3833 Unrestricted file upload vulnerability in ftp_upload_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authe... 6 - MEDIUM 2012-01-29 2017-08-29
CVE-2011-3832 Eval injection vulnerability in config.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated administra... 6.5 - MEDIUM 2012-01-29 2017-08-29
CVE-2011-3831 SQL injection vulnerability in incident_attachments.php in Support Incident Tracker (aka SiT!) 3.65 allows remote attackers t... 7.5 - HIGH 2012-01-29 2017-08-29
CVE-2011-3830 Cross-site scripting (XSS) vulnerability in search.php in Support Incident Tracker (aka SiT!) 3.65 allows remote attackers to... 4.3 - MEDIUM 2012-01-29 2017-08-29
CVE-2011-3829 ftp_upload_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to obtain sensitive informa... 4 - MEDIUM 2012-01-29 2017-08-29

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationSitrackerSupport Incident Tracker9.8.00AllAllAll
ApplicationSitrackerSupport Incident Tracker8.8.00AllAllAll
ApplicationSitrackerSupport Incident Tracker7.8.00AllAllAll
ApplicationSitrackerSupport Incident Tracker4.8.00AllAllAll
ApplicationSitrackerSupport Incident Tracker31.07.00AllAllAll
ApplicationSitrackerSupport Incident Tracker3.67AllAllAll
ApplicationSitrackerSupport Incident Tracker3.65AllAllAll
ApplicationSitrackerSupport Incident Tracker3.64AllAllAll
ApplicationSitrackerSupport Incident Tracker3.63beta1AllAll
ApplicationSitrackerSupport Incident Tracker3.63AllAllAll
ApplicationSitrackerSupport Incident Tracker3.62AllAllAll
ApplicationSitrackerSupport Incident Tracker3.61AllAllAll
ApplicationSitrackerSupport Incident Tracker3.60AllAllAll
ApplicationSitrackerSupport Incident Tracker3.6AllAllAll
ApplicationSitrackerSupport Incident Tracker3.51AllAllAll
ApplicationSitrackerSupport Incident Tracker3.50AllAllAll
ApplicationSitrackerSupport Incident Tracker3.50beta1AllAll
ApplicationSitrackerSupport Incident Tracker3.45AllAllAll
ApplicationSitrackerSupport Incident Tracker3.45beta1AllAll
ApplicationSitrackerSupport Incident Tracker3.07AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report