4.3
CVE-2012-6578
- EPSS 0.26%
- Veröffentlicht 24.07.2013 12:01:45
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Bestpractical ≫ Request Tracker Version3.8.3
Bestpractical ≫ Request Tracker Version3.8.4
Bestpractical ≫ Request Tracker Version3.8.7
Bestpractical ≫ Request Tracker Version3.8.9
Bestpractical ≫ Request Tracker Version3.8.10
Bestpractical ≫ Request Tracker Version3.8.11
Bestpractical ≫ Request Tracker Version3.8.12
Bestpractical ≫ Request Tracker Version3.8.13
Bestpractical ≫ Request Tracker Version3.8.14
Bestpractical ≫ Request Tracker Version4.0.0
Bestpractical ≫ Request Tracker Version4.0.1
Bestpractical ≫ Request Tracker Version4.0.2
Bestpractical ≫ Request Tracker Version4.0.3
Bestpractical ≫ Request Tracker Version4.0.4
Bestpractical ≫ Request Tracker Version4.0.5
Bestpractical ≫ Request Tracker Version4.0.6
Bestpractical ≫ Request Tracker Version4.0.7
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.26% | 0.462 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|