![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-9472 – Debian Security Advisory 3176-1
https://notcve.org/view.php?id=CVE-2014-9472
27 Feb 2015 — The email gateway in RT (aka Request Tracker) 3.0.0 through 4.x before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted email. email gateway en RT (también conocido como Request Tracker) 3.0.0 hasta 4.x anterior a 4.0.23 y 4.2.x anterior a 4.2.10 permite a atacantes remotos causar una denegación de servicio (consumo de CPU y disco) a través de un email manipulado. Multiple vulnerabilities have been discovered in Request Tracker, an ... • http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-1165 – Debian Security Advisory 3176-1
https://notcve.org/view.php?id=CVE-2015-1165
27 Feb 2015 — RT (aka Request Tracker) 3.8.8 through 4.x before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to obtain sensitive RSS feed URLs and ticket data via unspecified vectors. RT (también conocido como Request Tracker) 3.8.8 hasta 4.x anterior a 4.0.23 y 4.2.x anterior a 4.2.10 permite a atacantes remotos obtener URLs de alimentación RSS y datos de tickets sensibles a través de vectores no especificados. Multiple vulnerabilities have been discovered in Request Tracker, an extensible trouble-ticket track... • http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-1464 – Debian Security Advisory 3176-1
https://notcve.org/view.php?id=CVE-2015-1464
27 Feb 2015 — RT (aka Request Tracker) before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to hijack sessions via an RSS feed URL. RT (también conocido como Request Tracker) anterior a 4.0.23 y 4.2.x anterior a 4.2.10 permite a atacantes remotos secuestrar sesiones a través de una URL de alimentación RSS. Multiple vulnerabilities have been discovered in Request Tracker, an extensible trouble-ticket tracking system. • http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html • CWE-284: Improper Access Control •