Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bestpractical request tracker vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-25803
Best Practical Request Tracker (RT) prior to 5.0.3 has an Open Redirect via a ticket search.
Bestpractical Request Tracker
NA
CVE-2022-25800
Best Practical RT for Incident Response (RTIR) prior to 4.0.3 and 5.x prior to 5.0.3 allows SSRF via the whois lookup tool.
Bestpractical Request Tracker For Incident Response
NA
CVE-2022-25801
Best Practical RT for Incident Response (RTIR) prior to 4.0.3 and 5.x prior to 5.0.3 allows SSRF via Scripted Action tools.
Bestpractical Request Tracker For Incident Response
5
CVSSv2
CVE-2021-38562
Best Practical Request Tracker (RT) 4.2 prior to 4.2.17, 4.4 prior to 4.4.5, and 5.0 prior to 5.0.2 allows sensitive information disclosure via a timing attack against lib/RT/REST2/Middleware/Auth.pm.
Bestpractical Request Tracker
Fedoraproject Fedora 35
Debian Debian Linux 9.0
5
CVSSv2
CVE-2018-18898
The email-ingestion feature in Best Practical Request Tracker 4.1.13 up to and including 4.4 allows denial of service by remote attackers via an algorithmic complexity attack on email address parsing.
Bestpractical Request Tracker
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
Debian Debian Linux 8.0
Debian Debian Linux 10.0
5
CVSSv2
CVE-2012-4884
Argument injection vulnerability in Request Tracker (RT) 3.8.x prior to 3.8.15 and 4.0.x prior to 4.0.8 allows remote malicious users to create arbitrary files via unspecified vectors related to the GnuPG client.
Bestpractical Rt 3.8.1
Bestpractical Rt 3.8.0
Bestpractical Rt 3.8.4
Bestpractical Rt 3.8.2
Bestpractical Rt 3.8.8
Bestpractical Rt 3.8.14
Bestpractical Rt 3.8.6
Bestpractical Rt 3.8.9
Bestpractical Rt 3.8.5
Bestpractical Rt 3.8.3
Bestpractical Rt 3.8.11
Bestpractical Rt 3.8.12
Bestpractical Rt 3.8.10
Bestpractical Rt 3.8.7
Bestpractical Rt 3.8.13
Bestpractical Rt 4.0.2
Bestpractical Rt 4.0.4
Bestpractical Rt 4.0.8
Bestpractical Rt 4.0.7
Bestpractical Rt 4.0.0
Bestpractical Rt 4.0.3
Bestpractical Rt 4.0.1
3.5
CVSSv2
CVE-2012-4730
Request Tracker (RT) 3.8.x prior to 3.8.15 and 4.0.x prior to 4.0.8 allows remote authenticated users with ModifySelf or AdminUser privileges to inject arbitrary email headers and conduct phishing attacks or obtain sensitive information via unknown vectors.
Bestpractical Rt 3.8.5
Bestpractical Rt 3.8.1
Bestpractical Rt 3.8.12
Bestpractical Rt 3.8.10
Bestpractical Rt 3.8.7
Bestpractical Rt 3.8.8
Bestpractical Rt 3.8.0
Bestpractical Rt 3.8.11
Bestpractical Rt 3.8.6
Bestpractical Rt 4.0.8
Bestpractical Rt 4.0.0
Bestpractical Rt 4.0.7
Bestpractical Rt 4.0.3
Bestpractical Rt 3.8.3
Bestpractical Rt 3.8.4
Bestpractical Rt 3.8.13
Bestpractical Rt 3.8.2
Bestpractical Rt 3.8.9
Bestpractical Rt 4.0.4
Bestpractical Rt 4.0.5
Bestpractical Rt 4.0.1
Bestpractical Rt 4.0.2
5
CVSSv2
CVE-2012-4734
Request Tracker (RT) 3.8.x prior to 3.8.15 and 4.0.x prior to 4.0.8 allows remote malicious users to conduct a "confused deputy" attack to bypass the CSRF warning protection mechanism and cause victims to "modify arbitrary state" via unknown vectors related to...
Bestpractical Rt 3.8.9
Bestpractical Rt 3.8.0
Bestpractical Rt 3.8.1
Bestpractical Rt 3.8.4
Bestpractical Rt 3.8.7
Bestpractical Rt 3.8.8
Bestpractical Rt 3.8.2
Bestpractical Rt 3.8.6
Bestpractical Rt 3.8.10
Bestpractical Rt 4.0.4
Bestpractical Rt 4.0.5
Bestpractical Rt 4.0.0
Bestpractical Rt 4.0.7
Bestpractical Rt 4.0.1
Bestpractical Rt 3.8.14
Bestpractical Rt 3.8.11
Bestpractical Rt 4.0.3
Bestpractical Rt 3.8.3
Bestpractical Rt 3.8.13
Bestpractical Rt 4.0.6
Bestpractical Rt 4.0.2
Bestpractical Rt 3.8.5
6.5
CVSSv2
CVE-2011-4460
SQL injection vulnerability in Best Practical Solutions RT 2.x and 3.x prior to 3.8.12 and 4.x prior to 4.0.6 allows remote authenticated users to execute arbitrary SQL commands by leveraging access to a privileged account.
Bestpractical Rt 2.0.5.1
Bestpractical Rt 2.0.5.3
Bestpractical Rt 2.0.1
Bestpractical Rt 2.0.2
Bestpractical Rt 3.6.2
Bestpractical Rt 3.6.0
Bestpractical Rt 3.5.3
Bestpractical Rt 3.4.0
Bestpractical Rt 3.4.6
Bestpractical Rt 3.2.1
Bestpractical Rt 3.2.0
Bestpractical Rt 3.4.5
Bestpractical Rt 3.4.2
Bestpractical Rt 3.1.4
Bestpractical Rt 3.1.3
Bestpractical Rt 3.1.15
Bestpractical Rt 3.1.16
Bestpractical Rt 3.0.6
Bestpractical Rt 3.0.7
Bestpractical Rt 3.0.10
Bestpractical Rt 3.0.9
Bestpractical Rt 3.0.7.1
6.8
CVSSv2
CVE-2011-2085
Multiple cross-site request forgery (CSRF) vulnerabilities in Best Practical Solutions RT prior to 3.8.12 and 4.x prior to 4.0.6 allow remote malicious users to hijack the authentication of arbitrary users.
Bestpractical Rt 3.8.7
Bestpractical Rt 3.5.5
Bestpractical Rt 3.0.4
Bestpractical Rt 3.2.1
Bestpractical Rt 2.0.7
Bestpractical Rt 3.6.0
Bestpractical Rt 3.8.9
Bestpractical Rt 3.4.0
Bestpractical Rt 3.0.8
Bestpractical Rt 3.4.2
Bestpractical Rt 3.6.4
Bestpractical Rt 3.8.8
Bestpractical Rt 3.2.0
Bestpractical Rt 3.1.2
Bestpractical Rt 3.6.6
Bestpractical Rt 2.0.6
Bestpractical Rt 3.4.5
Bestpractical Rt 3.0.2
Bestpractical Rt 2.0.14
Bestpractical Rt 3.5.4
Bestpractical Rt 3.6.7
Bestpractical Rt 3.0.10
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »