Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote authenticated users with ModifySelf or AdminUser privileges to inject arbitrary email headers and conduct phishing attacks or obtain sensitive information via unknown vectors.
2012-11-11T13:00:59.197
2025-04-11T00:51:21.963
Deferred
CVSSv2: 3.5 (LOW)
AV:N/AC:M/Au:S/C:P/I:N/A:N
6.8
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.2 | Yes |
Application | bestpractical | rt | 3.8.2 | Yes |
Application | bestpractical | rt | 3.8.2 | Yes |
Application | bestpractical | rt | 3.8.3 | Yes |
Application | bestpractical | rt | 3.8.3 | Yes |
Application | bestpractical | rt | 3.8.3 | Yes |
Application | bestpractical | rt | 3.8.4 | Yes |
Application | bestpractical | rt | 3.8.4 | Yes |
Application | bestpractical | rt | 3.8.5 | Yes |
Application | bestpractical | rt | 3.8.6 | Yes |
Application | bestpractical | rt | 3.8.6 | Yes |
Application | bestpractical | rt | 3.8.7 | Yes |
Application | bestpractical | rt | 3.8.7 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.9 | Yes |
Application | bestpractical | rt | 3.8.9 | Yes |
Application | bestpractical | rt | 3.8.9 | Yes |
Application | bestpractical | rt | 3.8.9 | Yes |
Application | bestpractical | rt | 3.8.10 | Yes |
Application | bestpractical | rt | 3.8.10 | Yes |
Application | bestpractical | rt | 3.8.11 | Yes |
Application | bestpractical | rt | 3.8.11 | Yes |
Application | bestpractical | rt | 3.8.11 | Yes |
Application | bestpractical | rt | 3.8.12 | Yes |
Application | bestpractical | rt | 3.8.13 | Yes |
Application | bestpractical | rt | 3.8.13 | Yes |
Application | bestpractical | rt | 3.8.14 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.1 | Yes |
Application | bestpractical | rt | 4.0.1 | Yes |
Application | bestpractical | rt | 4.0.1 | Yes |
Application | bestpractical | rt | 4.0.2 | Yes |
Application | bestpractical | rt | 4.0.2 | Yes |
Application | bestpractical | rt | 4.0.2 | Yes |
Application | bestpractical | rt | 4.0.3 | Yes |
Application | bestpractical | rt | 4.0.3 | Yes |
Application | bestpractical | rt | 4.0.3 | Yes |
Application | bestpractical | rt | 4.0.4 | Yes |
Application | bestpractical | rt | 4.0.5 | Yes |
Application | bestpractical | rt | 4.0.5 | Yes |
Application | bestpractical | rt | 4.0.6 | Yes |
Application | bestpractical | rt | 4.0.7 | Yes |
Application | bestpractical | rt | 4.0.8 | Yes |
Application | bestpractical | rt | 4.0.8 | Yes |