]"nowrap">&n> nowrap="p" class =n>机密性影响:"nowrap">&n> =n> "nowrap">&n> =nowrap">67idt[--]"nowrap">&n> nowrap="p" class =n>完整性影响:"nowrap">&n> =n> "nowrap">&n> =nowrap">67idt[--]"nowrap">&n> nowrap="p" class =n>可 Ins影响:"nowrap">&n> =n> "nowrap">&n> =nowrap">67idt[--]"nowrap">&n> nowrap="p" class =n>1.0到复杂度:"nowrap">&n> =n> "nowrap">&n> =nowrap">67idt[--]"nowrap">&n> nowrap="p" class =n>1.0到向量:"nowrap">&n> =n> "nowrap">&n> =nowrap">67idt[--]"nowrap">&n> nowrap="p" class =n>身份认证:"nowrap">&n> =n> "nowrap">&n> =nowrap">67idt[--]"nowrap">&n> nowrap="p"
&n> h2 onclick m('spe')inEditatitleth="pm_s; cha&n> CPE (受影响;&n平台End产品)"sh2 < ="80pxth="s; chwrap">9widx" height="2 "cvss_medium"" class =wrap">\"38%\"s; :/a:b0_pr \"62%\"d>
=n>n fl>更新7 期:"n fl>d> 5 "nowrap">&n> nowrap="p" class =n>n fl>1.0到1径:"n fl>) 从 =n>owrap="nowrap">&n> nowrap="p" class =nocolp">详细介绍:"n fl>"nowrap">&n> nowrap="p" class =nocolp"> 自p;&(RT) 从1.0到1.0.7版eoavhttp:/ p身执行 0 p&(Rspowrap">&n> nowrapap="p"
&n> 公告/a><丁"sh2 < ="80pxwrap">98idx" height="2 "cvss_medium">th="bullety 057" tcrap="p" class
=n>Editp;    Request Tracker (RT) /div> nowrap">&n> nowrap="p"
Editap="p"a" th=" tr td label { width: 80px; float: left; font-weight: bold; } textarea { border-tonceEndEditab

9widx" height="2 "cvss_medium">th="info0 =nocolp"> lassID:"n fl>

ap.org.cn/index. <:wb=20030. )<6676>&n> nowrap="p" class =nocolp"> fl>nnvd.or称:"n fl>站脚本(XSS)Web Iracker (RXer" cla ap">&n> nowrap="p" class =nowrap">13%ce fl>stanceE)":"n fl> < Rcute s/ Network Access"nowrap">&n> =nowrap">2widt fl>利 Ins式:"n fl> < Iage" Manipulps:' >&n> nowrap="p" class =ne fl>stance影响:"n fl>LS) of IracgrNVD =n>n fl>解决s式:"n fl> "nowrap">&n> nowrap="p" class =n>n fl>1tance利 In:"n fl>"nowrap">&n> =n>n fl>3开s式:"n fl> "nowrap">&n> nowrap="p" cl
="80pxwrap">9widx" height="2 "cvss_medium">th="info0diE-2003-02trap="p" class
=n>np>Unknown or IrAutoletesp;&nnowrap">&n> nowrap="p" cl
9widx" height="2 "cvss_medium">th="info0timetrap="p" class
=nowrap">13%ce fl>3开s 期:"n fl> < d> &n> =nowrap">2widt fl>发现7 期:"n fl> < Unknow>
&n> nowrap="p" class =ne fl>利 Ins 期:"n fl>Unknow>< =n>n fl>解决s 期:"n fl>Unknow "nowrap">&n> nowrap="p" cl
="80pxwrap">9widx" height="2 "cvss_medium">th="info0solus:' trap="p" class
=n>np>Unknown or IrAutoletesp;&nnowrap">&n> nowrap="p" cl
="80pxwrap">9widx" height="2 "cvss_medium">th="info0ap.tds"="p" class
=nocolp">tyle>ISS X-For (RID: nvd.org.cn/vulnexfor (.iss.netexfor (exf )<1196V>
CVERID: nvd.org.cn/vulnehtmlitle=:wb=cgi-bin.htmcrip.cgi?cript
rap">nowrap"> + Math.ceil(new Date()/3600000)rchbox-only> e> ">nowrap">
9widx" height="2 "cvss_medium" ">nowrap"> e>
pditab le --> spowrap">&n> "mainbar">
CVE-2003-0273
CVSS6.8
发布时间 :2003-05-27 00:00:00
修订时间 :2016-10-17 22:31:32
NMCO    

[原文]Cross-site scripting (XSS) vulnerability in the web interface for Request Tracker (RT) 1.0 through 1.0.7 allows remote attackers to execute script via message bodies.


[CNNVD]Request Tracker (RT)跨站脚本(XSS)漏洞(CNNVD-200305-057)

        Request Tracker (RT) 从1.0到1.0.7版本中的web界面存圥305c; webt"&nbtron (Rque 0 p;Rt> 自p;&(RT) 从1.0到1.0.7版eoavhttp:/ p身执行 0 p&(Rsp;&

=nowrap">13%center分值:"nowrap">&n> =nowrap">2widttab "nowrap">&n> =nowrap">67idt[pan>
\"38%\"s; :/a:b0_pr \"62%\"d> \"38%\"s; :/a:b0_pr \"62%\"d> \"38%\"s; :/a:b0_pr \"62%\"d> \"38%\"s; :/a:b0_pr \"62%\"d> \"38%\"s; :/a:b0_pr \"62%\"d> \"38%\"s; :/a:b0_pr \"62%\"d> \"38%\"s; :/a:b0_pr \"62%\"d> 9widx" height="2 "cvss_medium"" class >未找b h2 onclick m('officialap.')inEditatitleth="pm_.fficialap.cha&n> 官方="db_ic_osvdb"sh2 9widx" height="2 "cvss_medium""="top" class =nowrap">87idtap.org.cn/index.htmlitle=:wb=cgi-bin.htmcrip.cgi?cripttd> ) &n> nowrap="p" class =n>nvd.org.cn/vulnereb.ty/snist.gov/通_cnnv/detail?cnnvIdttd> )

&n> nowrap="p" class =n>nvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200305-057" target="_blank">CNNVD-200305-057)CNNV>

9widx" height="2 "cvss_medium"" class > nvd.org.cn/vulnelists.fsck cx; pipermail/rt-announce/ May/000071站以00305-057)08 Fw: [rt-users] [rt-announce] RTttackercnnvdid/r tdo XSS) SlnerSbility incript s

O9widx" height="2 "cvss_medium">th="info057" t""="top" class =nocolp"> fl>nnvd.or称:"n fl>站脚本(XSS)漏洞(&n> nowrap="p" class =nowrap">13%ce fl>紧急程度:"n fl>pan"nowrap">&n> =nowrap">2widt fl>nnvd.o类型:"n fl>(<"nowrap">&n> nowrap="p" class =n>n fl>3-05-27 期:"n fl>d>
)< )<>

Bugt.0qRID: nvd.org.cn/vulnehtml"ecurNVDfocus cx; bid/7509D-200305-057)<7509>Mail List Post: nvd.org.cn/vulnelists.fsck cx; pipermail/rt-announce/ May/000071站以00305-057) nvd.org.cn/vulnemarc.theaimsgroup cx; ?l=bugt.0q&m=105240947225275&w=200305-057)&n> nowrap l

=nocolp">&n> nowrap="p"
iv iv classm36div>iv class="sumascript" src="/static/scripts/rap">&n>Ss">35lpadd" height="2 "cvss_medium">acing="0" class="cvss_div">