14 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Disclosure via fake or spoofed RT email headers in an email message or a mail-gateway REST API call. Best Practical Request Tracker (RT) anterior a 4.4.7 y 5.x anterior a 5.0.5 permite la divulgación de información a través de encabezados de correo electrónico RT falsos o falsificados en un mensaje de correo electrónico o una llamada API REST de puerta de enlace de correo. • https://docs.bestpractical.com/release-notes/rt/4.4.7 https://docs.bestpractical.com/release-notes/rt/5.0.5 https://docs.bestpractical.com/release-notes/rt/index.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Exposure in responses to mail-gateway REST API calls. Best Practical Request Tracker (RT) anterior a 4.4.7 y 5.x anterior a 5.0.5 permite la exposición de información en respuestas a llamadas API REST de puerta de enlace de correo. • https://docs.bestpractical.com/release-notes/rt/4.4.7 https://docs.bestpractical.com/release-notes/rt/5.0.5 https://docs.bestpractical.com/release-notes/rt/index.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Best Practical Request Tracker (RT) before 5.0.3 has an Open Redirect via a ticket search. Best Practical Request Tracker (RT) versiones anteriores a 5.0.3, presenta un Redireccionamiento Abierto por medio de una búsqueda de tickets • https://docs.bestpractical.com/release-notes/rt/5.0.3 https://docs.bestpractical.com/release-notes/rt/index.html • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

Best Practical Request Tracker (RT) before 4.4.6 and 5.x before 5.0.3 allows XSS via a crafted content type for an attachment. Best Practical Request Tracker (RT) versiones anteriores a 4.4.6 y versiones 5.x anteriores a 5.0.3 permite un ataque de tipo XSS por medio de un tipo de contenido diseñado para un adjunto • https://docs.bestpractical.com/release-notes/rt/4.4.6 https://docs.bestpractical.com/release-notes/rt/5.0.3 https://docs.bestpractical.com/release-notes/rt/index.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the cryptography interface in Request Tracker (RT) before 4.2.12 allows remote attackers to inject arbitrary web script or HTML via a crafted public key. Vulnerabilidad de XSS en el interfaz de criptografía en Request Tracker (RT) en versiones anteriores a 4.2.12, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de una clave pública manipulada. • http://blog.bestpractical.com/2015/08/security-vulnerabilities-in-rt.html http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164607.html http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165124.html http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165163.html http://www.debian.org/security/2015/dsa-3335 https://bestpractical.com/release-notes/rt/4.2.12 https://github.com/bestpractical/rt/commit/36a461947b00b105336adb4997d • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •