CVE-2012-4730
EUVD-2012-465511.11.2012, 13:00
Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote authenticated users with ModifySelf or AdminUser privileges to inject arbitrary email headers and conduct phishing attacks or obtain sensitive information via unknown vectors.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| bestpractical | rt | 3.8.0 |
| bestpractical | rt | 3.8.0:preflight1 |
| bestpractical | rt | 3.8.0:rc1 |
| bestpractical | rt | 3.8.0:rc2 |
| bestpractical | rt | 3.8.0:rc3 |
| bestpractical | rt | 3.8.1 |
| bestpractical | rt | 3.8.1:preflight0 |
| bestpractical | rt | 3.8.1:rc1 |
| bestpractical | rt | 3.8.1:rc2 |
| bestpractical | rt | 3.8.1:rc3 |
| bestpractical | rt | 3.8.1:rc4 |
| bestpractical | rt | 3.8.1:rc5 |
| bestpractical | rt | 3.8.2 |
| bestpractical | rt | 3.8.2:rc1 |
| bestpractical | rt | 3.8.2:rc2 |
| bestpractical | rt | 3.8.3 |
| bestpractical | rt | 3.8.3:rc1 |
| bestpractical | rt | 3.8.3:rc2 |
| bestpractical | rt | 3.8.4 |
| bestpractical | rt | 3.8.4:rc1 |
| bestpractical | rt | 3.8.5 |
| bestpractical | rt | 3.8.6 |
| bestpractical | rt | 3.8.6:rc1 |
| bestpractical | rt | 3.8.7 |
| bestpractical | rt | 3.8.7:rc1 |
| bestpractical | rt | 3.8.8 |
| bestpractical | rt | 3.8.8:rc2 |
| bestpractical | rt | 3.8.8:rc3 |
| bestpractical | rt | 3.8.8:rc4 |
| bestpractical | rt | 3.8.9 |
| bestpractical | rt | 3.8.9:rc1 |
| bestpractical | rt | 3.8.9:rc2 |
| bestpractical | rt | 3.8.9:rc3 |
| bestpractical | rt | 3.8.10 |
| bestpractical | rt | 3.8.10:rc1 |
| bestpractical | rt | 3.8.11 |
| bestpractical | rt | 3.8.11:rc1 |
| bestpractical | rt | 3.8.11:rc2 |
| bestpractical | rt | 3.8.12 |
| bestpractical | rt | 3.8.13:rc1 |
| bestpractical | rt | 3.8.13:rc2 |
| bestpractical | rt | 3.8.14:rc1 |
| bestpractical | rt | 4.0.0 |
| bestpractical | rt | 4.0.0:rc1 |
| bestpractical | rt | 4.0.0:rc2 |
| bestpractical | rt | 4.0.0:rc3 |
| bestpractical | rt | 4.0.0:rc4 |
| bestpractical | rt | 4.0.0:rc5 |
| bestpractical | rt | 4.0.0:rc6 |
| bestpractical | rt | 4.0.0:rc7 |
| bestpractical | rt | 4.0.0:rc8 |
| bestpractical | rt | 4.0.1 |
| bestpractical | rt | 4.0.1:rc1 |
| bestpractical | rt | 4.0.1:rc2 |
| bestpractical | rt | 4.0.2 |
| bestpractical | rt | 4.0.2:rc1 |
| bestpractical | rt | 4.0.2:rc2 |
| bestpractical | rt | 4.0.3 |
| bestpractical | rt | 4.0.3:rc1 |
| bestpractical | rt | 4.0.3:rc2 |
| bestpractical | rt | 4.0.4 |
| bestpractical | rt | 4.0.5 |
| bestpractical | rt | 4.0.5:rc1 |
| bestpractical | rt | 4.0.6 |
| bestpractical | rt | 4.0.7:rc1 |
| bestpractical | rt | 4.0.8:rc1 |
| bestpractical | rt | 4.0.8:rc2 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| request-tracker3.8 |
| ||||||||||||||||||||||||||||
| request-tracker4 |
|
Common Weakness Enumeration