{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T12:38:32.444","vulnerabilities":[{"cve":{"id":"CVE-2008-3502","sourceIdentifier":"cve@mitre.org","published":"2008-08-06T18:41:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Best Practical Solutions RT 3.0.0 through 3.6.6 allows remote authenticated users to cause a denial of service (CPU or memory consumption) via unspecified vectors related to the Devel::StackTrace module for Perl."},{"lang":"es","value":"Vulnerabilidad no especificada en Best Practical Solutions RT 3.0.0 hasta 3.6.6 permite a usuarios remotos autenticados provocar una denegación de servicio (agotamiento de CPU o memoria) a través de vectores no especificados relacionados con el módulo Devel::StackTrace de Perl."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"F451959A-5305-4210-977B-6B396BC0A4F7"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"BA418CF5-49D6-4E0E-A1B5-8CB23752989D"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"8E238F87-8D8C-4E62-A8F0-3DB9EFDB8328"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.3:*:*:*:*:*:*:*","matchCriteriaId":"3FD8A7EF-5DB8-40C6-9124-A97A23B3EA02"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.4:*:*:*:*:*:*:*","matchCriteriaId":"2AD553B8-8495-47E5-A543-4DC963B3511A"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.5:*:*:*:*:*:*:*","matchCriteriaId":"28ADB191-4787-4FDB-B70A-F4C8BDF0F4B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.6:*:*:*:*:*:*:*","matchCriteriaId":"2772389A-9BCD-4B13-88C8-75BC64E40AF7"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.7:*:*:*:*:*:*:*","matchCriteriaId":"B1F9D05F-C86D-40D8-A7D9-5448918B72DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.7.1:*:*:*:*:*:*:*","matchCriteriaId":"311485DA-5381-4EAD-AF58-B8C67373413A"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.8:*:*:*:*:*:*:*","matchCriteriaId":"2EAF6671-8C77-448B-BF29-E2CF51176CC6"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.9:*:*:*:*:*:*:*","matchCriteriaId":"B55D762D-A723-435C-8D80-F7230F1648D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.10:*:*:*:*:*:*:*","matchCriteriaId":"4CC63EDC-541E-445D-8B72-799E4184B7EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.11:*:*:*:*:*:*:*","matchCriteriaId":"D5E6196E-4A90-4F64-BA99-A8E04A09D5ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.0.12:*:*:*:*:*:*:*","matchCriteriaId":"91D7CE86-3FCD-472E-BF01-31FFB36701BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.2.0:*:*:*:*:*:*:*","matchCriteriaId":"70B3F0B2-8C70-4046-AAA0-FBD344FE4DBD"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FCD0173D-F699-4864-8856-D1792BDA0F84"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.2.2:*:*:*:*:*:*:*","matchCriteriaId":"19CC2E53-5DE8-4A31-9B8A-79335DFBAFEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"404AFC5C-20B4-41E5-ACDE-56626D68AFEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.4.0:*:*:*:*:*:*:*","matchCriteriaId":"F37D1380-965B-40E0-8A20-61FEA072B8D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.4.1:*:*:*:*:*:*:*","matchCriteriaId":"E101B0FE-499F-44D8-8B68-BB7FEE40D2B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.4.2:*:*:*:*:*:*:*","matchCriteriaId":"747D8CD1-EE12-48A4-A795-88BC66A8DA33"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.4.3:*:*:*:*:*:*:*","matchCriteriaId":"5FDE201D-F31A-4738-B9AB-7BB11417990E"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.4.4:*:*:*:*:*:*:*","matchCriteriaId":"4D6ED4EC-F860-47BD-B699-551FB5DBF039"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.4.5:*:*:*:*:*:*:*","matchCriteriaId":"E3398823-1813-4D7B-9EC9-74222A240051"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.4.6:*:*:*:*:*:*:*","matchCriteriaId":"F98B7895-BDB3-477C-8B34-88BD3E02EAFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.6.0:*:*:*:*:*:*:*","matchCriteriaId":"1512169D-DCEF-4964-B05A-3DF19CDE8F57"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.6.1:*:*:*:*:*:*:*","matchCriteriaId":"B427F5D4-ACD6-46E5-B94F-CA30330C6492"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.6.2:*:*:*:*:*:*:*","matchCriteriaId":"E9B38C33-D680-4285-A849-E6CDA9F4802F"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.6.3:*:*:*:*:*:*:*","matchCriteriaId":"646CFD82-15FE-48E4-83C9-E3E037E9F928"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.6.4:*:*:*:*:*:*:*","matchCriteriaId":"57404A14-6E1C-4F3B-8120-75F1073A3E18"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.6.5:*:*:*:*:*:*:*","matchCriteriaId":"3F40ED56-CDAC-40BB-A026-5D6A09DCB72C"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:rt:3.6.6:*:*:*:*:*:*:*","matchCriteriaId":"33C325D9-CB88-430F-B1AE-3544C7176398"}]}]}],"references":[{"url":"http://lists.bestpractical.com/pipermail/rt-announce/2008-June/000158.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/30830","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/29925","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43337","source":"cve@mitre.org"},{"url":"http://lists.bestpractical.com/pipermail/rt-announce/2008-June/000158.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/30830","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/29925","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43337","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}