Vulnerability Details CVE-2012-6580
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, does not ensure that the UI labels unencrypted messages as unencrypted, which might make it easier for remote attackers to spoof details of a message's origin or interfere with encryption-policy auditing via an e-mail message to a queue's address.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 33.9%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2012-6580
-
cpe:2.3:a:bestpractical:request_tracker:3.8.10
-
cpe:2.3:a:bestpractical:request_tracker:3.8.11
-
cpe:2.3:a:bestpractical:request_tracker:3.8.12
-
cpe:2.3:a:bestpractical:request_tracker:3.8.13
-
cpe:2.3:a:bestpractical:request_tracker:3.8.14
-
cpe:2.3:a:bestpractical:request_tracker:3.8.3
-
cpe:2.3:a:bestpractical:request_tracker:3.8.4
-
cpe:2.3:a:bestpractical:request_tracker:3.8.7
-
cpe:2.3:a:bestpractical:request_tracker:3.8.9
-
cpe:2.3:a:bestpractical:request_tracker:4.0.0
-
cpe:2.3:a:bestpractical:request_tracker:4.0.1
-
cpe:2.3:a:bestpractical:request_tracker:4.0.2
-
cpe:2.3:a:bestpractical:request_tracker:4.0.3
-
cpe:2.3:a:bestpractical:request_tracker:4.0.4
-
cpe:2.3:a:bestpractical:request_tracker:4.0.5
-
cpe:2.3:a:bestpractical:request_tracker:4.0.6
-
cpe:2.3:a:bestpractical:request_tracker:4.0.7