CVE-2012-4730
11.11.2012, 13:00
Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote authenticated users with ModifySelf or AdminUser privileges to inject arbitrary email headers and conduct phishing attacks or obtain sensitive information via unknown vectors.Enginsight
Vendor | Product | Version |
---|---|---|
bestpractical | rt | 3.8.0 |
bestpractical | rt | 3.8.0:preflight1 |
bestpractical | rt | 3.8.0:rc1 |
bestpractical | rt | 3.8.0:rc2 |
bestpractical | rt | 3.8.0:rc3 |
bestpractical | rt | 3.8.1 |
bestpractical | rt | 3.8.1:preflight0 |
bestpractical | rt | 3.8.1:rc1 |
bestpractical | rt | 3.8.1:rc2 |
bestpractical | rt | 3.8.1:rc3 |
bestpractical | rt | 3.8.1:rc4 |
bestpractical | rt | 3.8.1:rc5 |
bestpractical | rt | 3.8.2 |
bestpractical | rt | 3.8.2:rc1 |
bestpractical | rt | 3.8.2:rc2 |
bestpractical | rt | 3.8.3 |
bestpractical | rt | 3.8.3:rc1 |
bestpractical | rt | 3.8.3:rc2 |
bestpractical | rt | 3.8.4 |
bestpractical | rt | 3.8.4:rc1 |
bestpractical | rt | 3.8.5 |
bestpractical | rt | 3.8.6 |
bestpractical | rt | 3.8.6:rc1 |
bestpractical | rt | 3.8.7 |
bestpractical | rt | 3.8.7:rc1 |
bestpractical | rt | 3.8.8 |
bestpractical | rt | 3.8.8:rc2 |
bestpractical | rt | 3.8.8:rc3 |
bestpractical | rt | 3.8.8:rc4 |
bestpractical | rt | 3.8.9 |
bestpractical | rt | 3.8.9:rc1 |
bestpractical | rt | 3.8.9:rc2 |
bestpractical | rt | 3.8.9:rc3 |
bestpractical | rt | 3.8.10 |
bestpractical | rt | 3.8.10:rc1 |
bestpractical | rt | 3.8.11 |
bestpractical | rt | 3.8.11:rc1 |
bestpractical | rt | 3.8.11:rc2 |
bestpractical | rt | 3.8.12 |
bestpractical | rt | 3.8.13:rc1 |
bestpractical | rt | 3.8.13:rc2 |
bestpractical | rt | 3.8.14:rc1 |
bestpractical | rt | 4.0.0 |
bestpractical | rt | 4.0.0:rc1 |
bestpractical | rt | 4.0.0:rc2 |
bestpractical | rt | 4.0.0:rc3 |
bestpractical | rt | 4.0.0:rc4 |
bestpractical | rt | 4.0.0:rc5 |
bestpractical | rt | 4.0.0:rc6 |
bestpractical | rt | 4.0.0:rc7 |
bestpractical | rt | 4.0.0:rc8 |
bestpractical | rt | 4.0.1 |
bestpractical | rt | 4.0.1:rc1 |
bestpractical | rt | 4.0.1:rc2 |
bestpractical | rt | 4.0.2 |
bestpractical | rt | 4.0.2:rc1 |
bestpractical | rt | 4.0.2:rc2 |
bestpractical | rt | 4.0.3 |
bestpractical | rt | 4.0.3:rc1 |
bestpractical | rt | 4.0.3:rc2 |
bestpractical | rt | 4.0.4 |
bestpractical | rt | 4.0.5 |
bestpractical | rt | 4.0.5:rc1 |
bestpractical | rt | 4.0.6 |
bestpractical | rt | 4.0.7:rc1 |
bestpractical | rt | 4.0.8:rc1 |
bestpractical | rt | 4.0.8:rc2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
request-tracker3.8 |
| ||||||||||||||||||||||||||||
request-tracker4 |
|
Common Weakness Enumeration