Page 2 of 18 results (0.015 seconds)

CVSS: 7.5EPSS: 0%CPEs: 47EXPL: 0

19 Apr 2011 — Directory traversal vulnerability in Best Practical Solutions RT 3.2.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allows remote attackers to read arbitrary files via a crafted HTTP request. Vulnerabilidad de salto de directorio en Best Practical Solutions RT v2.0.0 hasta v3.6.10, v3.8.0 hasta v3.8.9, y v4.0.0rc hasta 4.0.0rc7 permite a atacantes remotos leer ficheros arbitrarios mediante una petición HTTP manipulada. • http://blog.bestpractical.com/2011/04/security-vulnerabilities-in-rt.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 79EXPL: 0

19 Apr 2011 — Multiple cross-site scripting (XSS) vulnerabilities in Best Practical Solutions RT 2.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Best Practical Solutions RT v2.0.0 hasta v3.6.10, v3.8.0 hasta v3.8.9, y v4.0.0rc hasta 4.0.0rc7, permite a atacantes remotos inyectar script de su elección o HTML a través des... • http://blog.bestpractical.com/2011/04/security-vulnerabilities-in-rt.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.4EPSS: 0%CPEs: 76EXPL: 0

28 Feb 2011 — Best Practical Solutions RT before 3.8.9 does not perform certain redirect actions upon a login, which allows physically proximate attackers to obtain credentials by resubmitting the login form via the back button of a web browser on an unattended workstation after an RT logout. Best Practical Solutions RT anterior a v3.8.9 no desarrolla ciertas redirecciones en el login, lo que permite a atacantes próximos físicamente obtener credenciales reenviando el formulario de registro a través del botón back en un b... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614575 • CWE-255: Credentials Management Errors •

CVSS: 6.5EPSS: 0%CPEs: 76EXPL: 0

28 Feb 2011 — Scrips_Overlay.pm in Best Practical Solutions RT before 3.8.9 does not properly restrict access to a TicketObj in a Scrip after a CurrentUser change, which allows remote authenticated users to obtain sensitive information via unspecified vectors, as demonstrated by custom-field value information, related to SQL logging. Scrips_Overlay.pm en Best Practical Solutions RT anterior a v3.8.9 no restringe el acceso adecuadamente a TicketObj en un Scrip después de un cambio en CurrentUser, lo que permite a usuarios... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614576 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 150EXPL: 0

24 Jan 2010 — Best Practical Solutions RT 3.x before 3.8.9rc2 and 4.x before 4.0.0rc4 uses the MD5 algorithm for password hashes, which makes it easier for context-dependent attackers to determine cleartext passwords via a brute-force attack on the database. Best Practical Solutions RT v3.x anterior a v3.8.9rc2 y v4.x, utiliza el algoritmo MD5 para los hashes de contraseñas, lo que hace que sea más fácil para los atacantes dependientes del contexto determinar las contraseñas sin cifrar a través de un ataque de fuerza bru... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610850 • CWE-310: Cryptographic Issues •

CVSS: 9.8EPSS: 0%CPEs: 40EXPL: 0

02 Dec 2009 — Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages "HTTP access to the RT server," a related issue to CVE-2009-3585. Vulnerabilidad de fijación de sesión en /Elements/SetupSessionCookie en Best Practical Solutions RT v3.0.0 a la v3.6.9 y v3.8.x a la v3.8.5, permite a atacantes remotos secuestrar sesiones ... • http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 0%CPEs: 40EXPL: 0

02 Dec 2009 — Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages a second web server within the same domain. Vulnerabilidad de permanencia de sesión en html/Elements/SetupSessionCookie en Best Practical Solutions RT desde v3.0.0 hasta v3.6.9 y desde v3.8.x hasta v3.8.5 permite a atacantes remotos secuestrar sesiones we... • http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch • CWE-287: Improper Authentication •

CVSS: 6.5EPSS: 0%CPEs: 32EXPL: 0

06 Aug 2008 — Unspecified vulnerability in Best Practical Solutions RT 3.0.0 through 3.6.6 allows remote authenticated users to cause a denial of service (CPU or memory consumption) via unspecified vectors related to the Devel::StackTrace module for Perl. Vulnerabilidad no especificada en Best Practical Solutions RT 3.0.0 hasta 3.6.6 permite a usuarios remotos autenticados provocar una denegación de servicio (agotamiento de CPU o memoria) a través de vectores no especificados relacionados con el módulo Devel::StackTrace ... • http://lists.bestpractical.com/pipermail/rt-announce/2008-June/000158.html •