Lucene search

K
nvd[email protected]NVD:CVE-2012-6581
HistoryJul 24, 2013 - 12:01 p.m.

CVE-2012-6581

2013-07-2412:01:45
CWE-264
web.nvd.nist.gov
1

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.3

Confidence

Low

EPSS

0.001

Percentile

51.5%

Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to bypass intended restrictions on reading keys in the product’s keyring, and trigger outbound e-mail messages signed by an arbitrary stored secret key, by leveraging a UI e-mail signing privilege.

Affected configurations

Nvd
Node
bestpracticalrequest_trackerMatch3.8.3
OR
bestpracticalrequest_trackerMatch3.8.4
OR
bestpracticalrequest_trackerMatch3.8.7
OR
bestpracticalrequest_trackerMatch3.8.9
OR
bestpracticalrequest_trackerMatch3.8.10
OR
bestpracticalrequest_trackerMatch3.8.11
OR
bestpracticalrequest_trackerMatch3.8.12
OR
bestpracticalrequest_trackerMatch3.8.13
OR
bestpracticalrequest_trackerMatch3.8.14
Node
bestpracticalrequest_trackerMatch4.0.0
OR
bestpracticalrequest_trackerMatch4.0.1
OR
bestpracticalrequest_trackerMatch4.0.2
OR
bestpracticalrequest_trackerMatch4.0.3
OR
bestpracticalrequest_trackerMatch4.0.4
OR
bestpracticalrequest_trackerMatch4.0.5
OR
bestpracticalrequest_trackerMatch4.0.6
OR
bestpracticalrequest_trackerMatch4.0.7
VendorProductVersionCPE
bestpracticalrequest_tracker3.8.3cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.4cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.7cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.9cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.10cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.11cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.12cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.13cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.14cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
bestpracticalrequest_tracker4.0.0cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 171

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.3

Confidence

Low

EPSS

0.001

Percentile

51.5%