4.3

CVE-2012-6578

Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics.

Data is provided by the National Vulnerability Database (NVD)
BestpracticalRequest Tracker Version3.8.3
BestpracticalRequest Tracker Version3.8.4
BestpracticalRequest Tracker Version3.8.7
BestpracticalRequest Tracker Version3.8.9
BestpracticalRequest Tracker Version3.8.10
BestpracticalRequest Tracker Version3.8.11
BestpracticalRequest Tracker Version3.8.12
BestpracticalRequest Tracker Version3.8.13
BestpracticalRequest Tracker Version3.8.14
BestpracticalRequest Tracker Version4.0.0
BestpracticalRequest Tracker Version4.0.1
BestpracticalRequest Tracker Version4.0.2
BestpracticalRequest Tracker Version4.0.3
BestpracticalRequest Tracker Version4.0.4
BestpracticalRequest Tracker Version4.0.5
BestpracticalRequest Tracker Version4.0.6
BestpracticalRequest Tracker Version4.0.7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.26% 0.462
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N