{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T20:45:09.831161300Z","vulnerabilities":[{"cve":{"id":"CVE-2016-6127","sourceIdentifier":"cve@mitre.org","published":"2017-07-03T16:29:00.417","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2, when the AlwaysDownloadAttachments config setting is not in use, allows remote attackers to inject arbitrary web script or HTML via a file upload with an unspecified content type."},{"lang":"es","value":"Vulnerabilidad Cross-site Scripting (XSS) en Request Tracker (RT) 4.x anterior a 4.0.25, 4.2.x anterior 4.2.14 y 4.4.x anterior a la 4.4.2, cuando la configuración AlwaysDownloadAttachments no esta en uso, permite a un atacante remoto inyectar un script aleatorio en la web o código HTML mediante la subida de un archivo de contenido inespecífico."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"44234832-170D-43E0-9643-19CE57378721"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"38CFCCD6-6C5D-41CD-B7FB-D925A46E615C"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"814172FB-6F34-4356-8105-70AEBE0B6F6B"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"D282AC9F-E087-4D8D-B467-1D9480B3ABDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*","matchCriteriaId":"42F21EB3-8CE6-4F87-A5DE-A01AA32B943F"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*","matchCriteriaId":"5EDB4AD7-96B5-4D72-8C51-23D744D10C46"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*","matchCriteriaId":"0096B700-17B5-4158-A736-ECFDF9E9935B"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*","matchCriteriaId":"A0AF4515-6DB1-406A-878C-6DB32D021BA0"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*","matchCriteriaId":"54781FF6-D6DC-40A0-BE84-4D0FA3321280"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.9:*:*:*:*:*:*:*","matchCriteriaId":"B8555184-9645-4A86-A342-DB2716FA4502"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.10:*:*:*:*:*:*:*","matchCriteriaId":"DBB4167E-E120-49E5-B41C-2ED61CEB3CB9"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.11:*:*:*:*:*:*:*","matchCriteriaId":"A908C589-C929-4DDB-AA04-428604BD13B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.12:*:*:*:*:*:*:*","matchCriteriaId":"B97DF0A9-2C43-41FF-B0A0-D57E4D9F5451"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.13:*:*:*:*:*:*:*","matchCriteriaId":"73AE7380-BD83-4CBD-B800-4ED1C9F2114B"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.14:*:*:*:*:*:*:*","matchCriteriaId":"A90AB565-C945-480C-A159-F0D157920C1B"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.15:*:*:*:*:*:*:*","matchCriteriaId":"AC4316AA-3412-4CE8-9757-B5A9875E5113"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.16:*:*:*:*:*:*:*","matchCriteriaId":"048340BE-7179-4DCD-9A7A-B0C91C384E3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.17:*:*:*:*:*:*:*","matchCriteriaId":"1DB14ADD-F24C-4122-9EDE-FCB0E7E53065"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.18:*:*:*:*:*:*:*","matchCriteriaId":"725F177A-347F-46FB-88BE-3EE8CD340A0A"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.19:*:*:*:*:*:*:*","matchCriteriaId":"711FB4EF-6E49-408B-A73D-5AF0E5281919"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.20:*:*:*:*:*:*:*","matchCriteriaId":"D2E54887-C460-4778-B570-8A86B51A7DBB"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.21:*:*:*:*:*:*:*","matchCriteriaId":"E19B8ABA-806D-404B-8303-A487D2276B19"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.22:*:*:*:*:*:*:*","matchCriteriaId":"10368C1D-3D9C-4AC8-83B7-3C17F544F533"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.23:*:*:*:*:*:*:*","matchCriteriaId":"B4054F0C-ED26-4B96-AF48-7F012DFF6836"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.0.24:*:*:*:*:*:*:*","matchCriteriaId":"3F262EE4-AF42-406C-9C56-4D0149954509"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.0:*:*:*:*:*:*:*","matchCriteriaId":"016A9A48-9F12-4842-862F-4A192DA0D924"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"0D148F2A-F6B1-432A-9743-35BC43E86B40"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.2:*:*:*:*:*:*:*","matchCriteriaId":"2445145B-A162-484D-ABDF-053C20FD7E96"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.3:*:*:*:*:*:*:*","matchCriteriaId":"15EE6E16-375A-42B0-AE3C-E1FB95E9F466"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.4:*:*:*:*:*:*:*","matchCriteriaId":"83BF8033-9E4D-4B8B-B9E4-E992FE848F4E"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.5:*:*:*:*:*:*:*","matchCriteriaId":"6C68D322-E453-48D5-A5FB-39C744D90858"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.6:*:*:*:*:*:*:*","matchCriteriaId":"3881CA9B-5358-4808-9041-DE3E2FC8927F"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.7:*:*:*:*:*:*:*","matchCriteriaId":"A95CE3FD-5311-4644-8417-A74FF6B88458"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.8:*:*:*:*:*:*:*","matchCriteriaId":"E1DD1F04-3D0E-4210-8039-073B28ECCD85"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.9:*:*:*:*:*:*:*","matchCriteriaId":"26235782-E3A1-4D71-9E82-87DAC822D79D"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.10:*:*:*:*:*:*:*","matchCriteriaId":"944E381D-8133-40D8-AE36-DB200E1B2E94"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.11:*:*:*:*:*:*:*","matchCriteriaId":"4A6DAD64-37C7-4446-89EF-2F0B06C10050"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.12:*:*:*:*:*:*:*","matchCriteriaId":"54510C9E-1C10-4624-8915-1548AB858C76"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.2.13:*:*:*:*:*:*:*","matchCriteriaId":"B5F2E28D-8798-4E1C-806C-5785E571E40A"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.4.0:*:*:*:*:*:*:*","matchCriteriaId":"C38CD098-4B4C-4942-98C3-381795ECFFD6"},{"vulnerable":true,"criteria":"cpe:2.3:a:bestpractical:request_tracker:4.4.1:*:*:*:*:*:*:*","matchCriteriaId":"78B2EEBC-1695-42B9-85BA-581BA93125FB"}]}]}],"references":[{"url":"http://www.debian.org/security/2017/dsa-3882","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/99375","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.debian.org/security/2017/dsa-3882","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/99375","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}