Lucene search

K
BestpracticalRequest Tracker

4 matches found

CVE
CVE
added 2013/07/24 12:1 p.m.41 views

CVE-2012-6578

Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics.

4.3CVSS6.7AI score0.00258EPSS
CVE
CVE
added 2013/07/24 12:1 p.m.37 views

CVE-2012-6581

Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to bypass intended restrictions on reading keys in the product's keyring, and trigger outbound e-mail messages signed by an arbitrary stored secret key, by leveraging a UI e-mail s...

4.3CVSS6.4AI score0.00395EPSS
CVE
CVE
added 2013/07/24 12:1 p.m.35 views

CVE-2012-6580

Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, does not ensure that the UI labels unencrypted messages as unencrypted, which might make it easier for remote attackers to spoof details of a message's origin or interfere with encryption-policy auditing ...

4.3CVSS6.5AI score0.00131EPSS
CVE
CVE
added 2013/07/24 12:1 p.m.34 views

CVE-2012-6579

Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to configure encryption or signing for certain outbound e-mail, and possibly cause a denial of service (loss of e-mail readability), via an e-mail message to a queue's address.

6.4CVSS6.7AI score0.00247EPSS