Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bestpractical rt 4.0.3 vulnerabilities and exploits
(subscribe to this query)
9.1
CVSSv3
CVE-2022-25800
Best Practical RT for Incident Response (RTIR) prior to 4.0.3 and 5.x prior to 5.0.3 allows SSRF via the whois lookup tool.
Bestpractical Request Tracker For Incident Response
9.1
CVSSv3
CVE-2022-25801
Best Practical RT for Incident Response (RTIR) prior to 4.0.3 and 5.x prior to 5.0.3 allows SSRF via Scripted Action tools.
Bestpractical Request Tracker For Incident Response
6.1
CVSSv3
CVE-2016-6127
Cross-site scripting (XSS) vulnerability in Request Tracker (RT) 4.x prior to 4.0.25, 4.2.x prior to 4.2.14, and 4.4.x prior to 4.4.2, when the AlwaysDownloadAttachments config setting is not in use, allows remote malicious users to inject arbitrary web script or HTML via a file ...
Bestpractical Request Tracker 4.0.7
Bestpractical Request Tracker 4.0.8
Bestpractical Request Tracker 4.0.9
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.0.23
Bestpractical Request Tracker 4.0.24
Bestpractical Request Tracker 4.2.0
Bestpractical Request Tracker 4.2.1
Bestpractical Request Tracker 4.4.0
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.15
Bestpractical Request Tracker 4.0.16
Bestpractical Request Tracker 4.0.17
Bestpractical Request Tracker 4.0.18
Bestpractical Request Tracker 4.2.7
Bestpractical Request Tracker 4.2.8
Bestpractical Request Tracker 4.2.9
Bestpractical Request Tracker 4.2.10
Bestpractical Request Tracker 4.0.3
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.0.12
8.8
CVSSv3
CVE-2017-5943
Request Tracker (RT) 4.x prior to 4.0.25, 4.2.x prior to 4.2.14, and 4.4.x prior to 4.4.2 allows remote malicious users to obtain sensitive information about cross-site request forgery (CSRF) verification tokens via a crafted URL.
Bestpractical Request Tracker 4.0.9
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.0.11
Bestpractical Request Tracker 4.0.12
Bestpractical Request Tracker 4.2.0
Bestpractical Request Tracker 4.2.1
Bestpractical Request Tracker 4.2.2
Bestpractical Request Tracker 4.2.3
Bestpractical Request Tracker 4.2.4
Bestpractical Request Tracker 4.0.6
Bestpractical Request Tracker 4.0.8
Bestpractical Request Tracker 4.0.13
Bestpractical Request Tracker 4.0.15
Bestpractical Request Tracker 4.0.22
Bestpractical Request Tracker 4.0.24
Bestpractical Request Tracker 4.2.6
Bestpractical Request Tracker 4.2.8
Bestpractical Request Tracker 4.2.13
Bestpractical Request Tracker 4.4.0
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.2
8.8
CVSSv3
CVE-2017-5944
The dashboard subscription interface in Request Tracker (RT) 4.x prior to 4.0.25, 4.2.x prior to 4.2.14, and 4.4.x prior to 4.4.2 might allow remote authenticated users with certain privileges to execute arbitrary code via a crafted saved search name.
Bestpractical Request Tracker 4.0.3
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.0.12
Bestpractical Request Tracker 4.0.14
Bestpractical Request Tracker 4.0.19
Bestpractical Request Tracker 4.0.21
Bestpractical Request Tracker 4.2.3
Bestpractical Request Tracker 4.2.5
Bestpractical Request Tracker 4.2.12
Bestpractical Request Tracker 4.4.1
Bestpractical Request Tracker 4.0.7
Bestpractical Request Tracker 4.0.8
Bestpractical Request Tracker 4.0.9
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.0.23
Bestpractical Request Tracker 4.0.24
Bestpractical Request Tracker 4.2.0
Bestpractical Request Tracker 4.2.1
Bestpractical Request Tracker 4.2.2
Bestpractical Request Tracker 4.4.0
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.1
5.9
CVSSv3
CVE-2017-5361
Request Tracker (RT) 4.x prior to 4.0.25, 4.2.x prior to 4.2.14, and 4.4.x prior to 4.4.2 does not use a constant-time comparison algorithm for secrets, which makes it easier for remote malicious users to obtain sensitive user password information via a timing side-channel attack...
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.0.7
Bestpractical Request Tracker 4.0.14
Bestpractical Request Tracker 4.0.16
Bestpractical Request Tracker 4.0.21
Bestpractical Request Tracker 4.0.23
Bestpractical Request Tracker 4.2.5
Bestpractical Request Tracker 4.2.7
Bestpractical Request Tracker 4.4.1
Bestpractical Request Tracker 4.0.9
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.0.11
Bestpractical Request Tracker 4.0.12
Bestpractical Request Tracker 4.2.0
Bestpractical Request Tracker 4.2.1
Bestpractical Request Tracker 4.2.2
Bestpractical Request Tracker 4.2.3
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.2
Bestpractical Request Tracker 4.0.3
Bestpractical Request Tracker 4.0.17
NA
CVE-2014-9472
The email gateway in RT (aka Request Tracker) 3.0.0 up to and including 4.x prior to 4.0.23 and 4.2.x prior to 4.2.10 allows remote malicious users to cause a denial of service (CPU and disk consumption) via a crafted email.
Debian Debian Linux 7.0
Fedoraproject Fedora 22
Fedoraproject Fedora 21
Bestpractical Request Tracker 3.8.16
Bestpractical Request Tracker 3.8.17
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.14
Bestpractical Request Tracker 4.0.15
Bestpractical Request Tracker 4.0.16
Bestpractical Request Tracker 4.0.17
Bestpractical Request Tracker 4.0.18
Bestpractical Request Tracker 4.2.8
Bestpractical Request Tracker 4.2.9
Bestpractical Request Tracker 3.6.10
Bestpractical Request Tracker 3.8.3
Bestpractical Request Tracker 3.8.13
Bestpractical Request Tracker 3.8.15
Bestpractical Request Tracker 4.0.2
Bestpractical Request Tracker 4.0.4
Bestpractical Request Tracker 4.0.11
Bestpractical Request Tracker 4.0.13
NA
CVE-2015-1165
RT (aka Request Tracker) 3.8.8 up to and including 4.x prior to 4.0.23 and 4.2.x prior to 4.2.10 allows remote malicious users to obtain sensitive RSS feed URLs and ticket data via unspecified vectors.
Debian Debian Linux 7.0
Fedoraproject Fedora 21
Fedoraproject Fedora 22
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.2
Bestpractical Request Tracker 4.0.3
Bestpractical Request Tracker 4.0.4
Bestpractical Request Tracker 4.0.18
Bestpractical Request Tracker 4.0.19
Bestpractical Request Tracker 3.8.11
Bestpractical Request Tracker 3.8.12
Bestpractical Request Tracker 3.8.13
Bestpractical Request Tracker 3.8.14
Bestpractical Request Tracker 4.0.9
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.0.11
Bestpractical Request Tracker 4.0.12
Bestpractical Request Tracker 4.0.13
Bestpractical Request Tracker 4.2.3
Bestpractical Request Tracker 4.2.4
Bestpractical Request Tracker 4.2.5
Bestpractical Request Tracker 4.2.6
NA
CVE-2013-3737
The MobileUI (aka RT-Extension-MobileUI) extension prior to 1.04 in Request Tracker (RT) 4.0.0 prior to 4.0.13, when using the file-based session store (Apache::Session::File) and certain authentication extensions, allows remote malicious users to reuse unauthorized sessions and ...
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.6
Bestpractical Request Tracker 4.0.7
Bestpractical Request Tracker 4.0.8
Bestpractical Request Tracker 4.0.9
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.2
Bestpractical Request Tracker 4.0.4
Bestpractical Request Tracker 4.0.11
Bestpractical Request Tracker 4.0.3
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.0.12
NA
CVE-2013-3736
Cross-site scripting (XSS) vulnerability in the MobileUI (aka RT-Extension-MobileUI) extension prior to 1.04 in Request Tracker (RT) 4.0.0 prior to 4.0.13 allows remote malicious users to inject arbitrary web script or HTML via the name of an attached file.
Bestpractical Request Tracker 4.0.11
Bestpractical Request Tracker 4.0.12
Bestpractical Request Tracker 4.0.8
Bestpractical Request Tracker 4.0.9
Bestpractical Rt-extension-mobileui
Bestpractical Request Tracker 4.0.0
Bestpractical Request Tracker 4.0.4
Bestpractical Request Tracker 4.0.5
Bestpractical Request Tracker 4.0.2
Bestpractical Request Tracker 4.0.3
Bestpractical Request Tracker 4.0.1
Bestpractical Request Tracker 4.0.10
Bestpractical Request Tracker 4.0.6
Bestpractical Request Tracker 4.0.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »