CVE-2012-4730
11.11.2012, 13:00
Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote authenticated users with ModifySelf or AdminUser privileges to inject arbitrary email headers and conduct phishing attacks or obtain sensitive information via unknown vectors.Enginsight
| Vendor | Product | Version |
|---|---|---|
| bestpractical | rt | 3.8.0 |
| bestpractical | rt | 3.8.0:preflight1 |
| bestpractical | rt | 3.8.0:rc1 |
| bestpractical | rt | 3.8.0:rc2 |
| bestpractical | rt | 3.8.0:rc3 |
| bestpractical | rt | 3.8.1 |
| bestpractical | rt | 3.8.1:preflight0 |
| bestpractical | rt | 3.8.1:rc1 |
| bestpractical | rt | 3.8.1:rc2 |
| bestpractical | rt | 3.8.1:rc3 |
| bestpractical | rt | 3.8.1:rc4 |
| bestpractical | rt | 3.8.1:rc5 |
| bestpractical | rt | 3.8.2 |
| bestpractical | rt | 3.8.2:rc1 |
| bestpractical | rt | 3.8.2:rc2 |
| bestpractical | rt | 3.8.3 |
| bestpractical | rt | 3.8.3:rc1 |
| bestpractical | rt | 3.8.3:rc2 |
| bestpractical | rt | 3.8.4 |
| bestpractical | rt | 3.8.4:rc1 |
| bestpractical | rt | 3.8.5 |
| bestpractical | rt | 3.8.6 |
| bestpractical | rt | 3.8.6:rc1 |
| bestpractical | rt | 3.8.7 |
| bestpractical | rt | 3.8.7:rc1 |
| bestpractical | rt | 3.8.8 |
| bestpractical | rt | 3.8.8:rc2 |
| bestpractical | rt | 3.8.8:rc3 |
| bestpractical | rt | 3.8.8:rc4 |
| bestpractical | rt | 3.8.9 |
| bestpractical | rt | 3.8.9:rc1 |
| bestpractical | rt | 3.8.9:rc2 |
| bestpractical | rt | 3.8.9:rc3 |
| bestpractical | rt | 3.8.10 |
| bestpractical | rt | 3.8.10:rc1 |
| bestpractical | rt | 3.8.11 |
| bestpractical | rt | 3.8.11:rc1 |
| bestpractical | rt | 3.8.11:rc2 |
| bestpractical | rt | 3.8.12 |
| bestpractical | rt | 3.8.13:rc1 |
| bestpractical | rt | 3.8.13:rc2 |
| bestpractical | rt | 3.8.14:rc1 |
| bestpractical | rt | 4.0.0 |
| bestpractical | rt | 4.0.0:rc1 |
| bestpractical | rt | 4.0.0:rc2 |
| bestpractical | rt | 4.0.0:rc3 |
| bestpractical | rt | 4.0.0:rc4 |
| bestpractical | rt | 4.0.0:rc5 |
| bestpractical | rt | 4.0.0:rc6 |
| bestpractical | rt | 4.0.0:rc7 |
| bestpractical | rt | 4.0.0:rc8 |
| bestpractical | rt | 4.0.1 |
| bestpractical | rt | 4.0.1:rc1 |
| bestpractical | rt | 4.0.1:rc2 |
| bestpractical | rt | 4.0.2 |
| bestpractical | rt | 4.0.2:rc1 |
| bestpractical | rt | 4.0.2:rc2 |
| bestpractical | rt | 4.0.3 |
| bestpractical | rt | 4.0.3:rc1 |
| bestpractical | rt | 4.0.3:rc2 |
| bestpractical | rt | 4.0.4 |
| bestpractical | rt | 4.0.5 |
| bestpractical | rt | 4.0.5:rc1 |
| bestpractical | rt | 4.0.6 |
| bestpractical | rt | 4.0.7:rc1 |
| bestpractical | rt | 4.0.8:rc1 |
| bestpractical | rt | 4.0.8:rc2 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| request-tracker3.8 |
| ||||||||||||||||||||||||||||
| request-tracker4 |
|
Common Weakness Enumeration