Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13 does not properly restrict access to private callback components, which allows remote attackers to have an unspecified impact via a direct request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rt | Bestpractical | 4.0.12 | 4.0.12 |
Rt | Bestpractical | 4.0.0 | 4.0.0 |
Rt | Bestpractical | 4.0.9 | 4.0.9 |
Rt | Bestpractical | 4.0.11 | 4.0.11 |
Rt | Bestpractical | 4.0.3 | 4.0.3 |
Rt | Bestpractical | 4.0.0 | 4.0.0 |
Rt | Bestpractical | 4.0.8 | 4.0.8 |
Rt | Bestpractical | 4.0.1 | 4.0.1 |
Rt | Bestpractical | 4.0.0 | 4.0.0 |
Rt | Bestpractical | 4.0.0 | 4.0.0 |
Rt | Bestpractical | 4.0.0 | 4.0.0 |
Rt | Bestpractical | 4.0.3 | 4.0.3 |
Rt | Bestpractical | 4.0.6 | 4.0.6 |
Rt | Bestpractical | 4.0.1 | 4.0.1 |
Rt | Bestpractical | 4.0.0 | 4.0.0 |
Rt | Bestpractical | 4.0.2 | 4.0.2 |
Rt | Bestpractical | 4.0.8 | 4.0.8 |
Rt | Bestpractical | 4.0.4 | 4.0.4 |
Rt | Bestpractical | 4.0.0 | 4.0.0 |
Rt | Bestpractical | 4.0.0 | 4.0.0 |
Rt | Bestpractical | 4.0.7 | 4.0.7 |
Rt | Bestpractical | 4.0.2 | 4.0.2 |
Rt | Bestpractical | 4.0.0 | 4.0.0 |
Rt | Bestpractical | 4.0.10 | 4.0.10 |
Rt | Bestpractical | 4.0.3 | 4.0.3 |
Rt | Bestpractical | 4.0.8 | 4.0.8 |
Rt | Bestpractical | 4.0.2 | 4.0.2 |
Rt | Bestpractical | 4.0.1 | 4.0.1 |
Rt | Bestpractical | 4.0.7 | 4.0.7 |
Rt | Bestpractical | 4.0.5 | 4.0.5 |
Rt | Bestpractical | 4.0.5 | 4.0.5 |