CVE-2013-3370
23.08.2013, 16:55
Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13 does not properly restrict access to private callback components, which allows remote attackers to have an unspecified impact via a direct request.Enginsight
Vendor | Product | Version |
---|---|---|
bestpractical | rt | 4.0.0 |
bestpractical | rt | 4.0.0:rc1 |
bestpractical | rt | 4.0.0:rc2 |
bestpractical | rt | 4.0.0:rc3 |
bestpractical | rt | 4.0.0:rc4 |
bestpractical | rt | 4.0.0:rc5 |
bestpractical | rt | 4.0.0:rc6 |
bestpractical | rt | 4.0.0:rc7 |
bestpractical | rt | 4.0.0:rc8 |
bestpractical | rt | 4.0.1 |
bestpractical | rt | 4.0.1:rc1 |
bestpractical | rt | 4.0.1:rc2 |
bestpractical | rt | 4.0.2 |
bestpractical | rt | 4.0.2:rc1 |
bestpractical | rt | 4.0.2:rc2 |
bestpractical | rt | 4.0.3 |
bestpractical | rt | 4.0.3:rc1 |
bestpractical | rt | 4.0.3:rc2 |
bestpractical | rt | 4.0.4 |
bestpractical | rt | 4.0.5 |
bestpractical | rt | 4.0.5:rc1 |
bestpractical | rt | 4.0.6 |
bestpractical | rt | 4.0.7 |
bestpractical | rt | 4.0.7:rc1 |
bestpractical | rt | 4.0.8 |
bestpractical | rt | 4.0.8:rc1 |
bestpractical | rt | 4.0.8:rc2 |
bestpractical | rt | 4.0.9 |
bestpractical | rt | 4.0.10 |
bestpractical | rt | 4.0.11 |
bestpractical | rt | 4.0.12 |
bestpractical | rt | 3.8.0 |
bestpractical | rt | 3.8.0:preflight1 |
bestpractical | rt | 3.8.0:rc1 |
bestpractical | rt | 3.8.0:rc2 |
bestpractical | rt | 3.8.0:rc3 |
bestpractical | rt | 3.8.1 |
bestpractical | rt | 3.8.1:preflight0 |
bestpractical | rt | 3.8.1:rc1 |
bestpractical | rt | 3.8.1:rc2 |
bestpractical | rt | 3.8.1:rc3 |
bestpractical | rt | 3.8.1:rc4 |
bestpractical | rt | 3.8.1:rc5 |
bestpractical | rt | 3.8.2 |
bestpractical | rt | 3.8.2:rc1 |
bestpractical | rt | 3.8.2:rc2 |
bestpractical | rt | 3.8.3 |
bestpractical | rt | 3.8.3:rc1 |
bestpractical | rt | 3.8.3:rc2 |
bestpractical | rt | 3.8.4 |
bestpractical | rt | 3.8.4:rc1 |
bestpractical | rt | 3.8.5 |
bestpractical | rt | 3.8.6 |
bestpractical | rt | 3.8.6:rc1 |
bestpractical | rt | 3.8.7 |
bestpractical | rt | 3.8.7:rc1 |
bestpractical | rt | 3.8.8 |
bestpractical | rt | 3.8.8:rc2 |
bestpractical | rt | 3.8.8:rc3 |
bestpractical | rt | 3.8.8:rc4 |
bestpractical | rt | 3.8.9 |
bestpractical | rt | 3.8.9:rc1 |
bestpractical | rt | 3.8.9:rc2 |
bestpractical | rt | 3.8.9:rc3 |
bestpractical | rt | 3.8.10 |
bestpractical | rt | 3.8.10:rc1 |
bestpractical | rt | 3.8.11 |
bestpractical | rt | 3.8.11:rc1 |
bestpractical | rt | 3.8.11:rc2 |
bestpractical | rt | 3.8.12 |
bestpractical | rt | 3.8.13 |
bestpractical | rt | 3.8.13:rc1 |
bestpractical | rt | 3.8.13:rc2 |
bestpractical | rt | 3.8.14 |
bestpractical | rt | 3.8.14:rc1 |
bestpractical | rt | 3.8.15 |
bestpractical | rt | 3.8.16 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
request-tracker3.8 |
| ||||||||||||||||||||||||
request-tracker4 |
|
Common Weakness Enumeration
References