CVE-2008-1475
24.03.2008, 22:44
The xml-rpc server in Roundup 1.4.4 does not check property permissions, which allows attackers to bypass restrictions and edit or read restricted properties via the (1) list, (2) display, and (3) set methods.Enginsight
Vendor | Product | Version |
---|---|---|
roundup-tracker | roundup | 𝑥 ≤ 1.4.3 |
roundup-tracker | roundup | 0.1.0 |
roundup-tracker | roundup | 0.1.1 |
roundup-tracker | roundup | 0.1.2 |
roundup-tracker | roundup | 0.1.3 |
roundup-tracker | roundup | 0.2.0 |
roundup-tracker | roundup | 0.2.1 |
roundup-tracker | roundup | 0.2.2 |
roundup-tracker | roundup | 0.2.3 |
roundup-tracker | roundup | 0.2.4 |
roundup-tracker | roundup | 0.2.5 |
roundup-tracker | roundup | 0.2.6 |
roundup-tracker | roundup | 0.2.7 |
roundup-tracker | roundup | 0.2.8 |
roundup-tracker | roundup | 0.3.0 |
roundup-tracker | roundup | 0.3.0:pre1 |
roundup-tracker | roundup | 0.3.0:pre2 |
roundup-tracker | roundup | 0.3.0:pre3 |
roundup-tracker | roundup | 0.4.0 |
roundup-tracker | roundup | 0.4.0:b1 |
roundup-tracker | roundup | 0.4.0:b2 |
roundup-tracker | roundup | 0.4.1 |
roundup-tracker | roundup | 0.4.2 |
roundup-tracker | roundup | 0.4.2:pr1 |
roundup-tracker | roundup | 0.5 |
roundup-tracker | roundup | 0.5.0 |
roundup-tracker | roundup | 0.5.0:beta1 |
roundup-tracker | roundup | 0.5.0:beta2 |
roundup-tracker | roundup | 0.5.0:pr1 |
roundup-tracker | roundup | 0.5.1 |
roundup-tracker | roundup | 0.5.2 |
roundup-tracker | roundup | 0.5.3 |
roundup-tracker | roundup | 0.5.4 |
roundup-tracker | roundup | 0.5.5 |
roundup-tracker | roundup | 0.5.6 |
roundup-tracker | roundup | 0.5.7 |
roundup-tracker | roundup | 0.5.8:stable |
roundup-tracker | roundup | 0.5.9 |
roundup-tracker | roundup | 0.6.0 |
roundup-tracker | roundup | 0.6.0:b1 |
roundup-tracker | roundup | 0.6.0:b2 |
roundup-tracker | roundup | 0.6.0:b3 |
roundup-tracker | roundup | 0.6.0:b4 |
roundup-tracker | roundup | 0.6.1 |
roundup-tracker | roundup | 0.6.2 |
roundup-tracker | roundup | 0.6.3 |
roundup-tracker | roundup | 0.6.4 |
roundup-tracker | roundup | 0.6.5 |
roundup-tracker | roundup | 0.6.6 |
roundup-tracker | roundup | 0.6.7 |
roundup-tracker | roundup | 0.6.8 |
roundup-tracker | roundup | 0.6.9 |
roundup-tracker | roundup | 0.6.10 |
roundup-tracker | roundup | 0.6.11 |
roundup-tracker | roundup | 0.7.0 |
roundup-tracker | roundup | 0.7.0:b1 |
roundup-tracker | roundup | 0.7.0:b2 |
roundup-tracker | roundup | 0.7.0:b3 |
roundup-tracker | roundup | 0.7.1 |
roundup-tracker | roundup | 0.7.2 |
roundup-tracker | roundup | 0.7.3 |
roundup-tracker | roundup | 0.7.4 |
roundup-tracker | roundup | 0.7.5 |
roundup-tracker | roundup | 0.7.6 |
roundup-tracker | roundup | 0.7.7 |
roundup-tracker | roundup | 0.7.8 |
roundup-tracker | roundup | 0.7.9 |
roundup-tracker | roundup | 0.7.10 |
roundup-tracker | roundup | 0.7.11 |
roundup-tracker | roundup | 0.7.12 |
roundup-tracker | roundup | 0.8.0 |
roundup-tracker | roundup | 0.8.0:b1 |
roundup-tracker | roundup | 0.8.0:b2 |
roundup-tracker | roundup | 0.8.1 |
roundup-tracker | roundup | 0.8.2 |
roundup-tracker | roundup | 0.8.3 |
roundup-tracker | roundup | 0.8.4 |
roundup-tracker | roundup | 0.8.5 |
roundup-tracker | roundup | 0.8.6 |
roundup-tracker | roundup | 0.9.0:b1 |
roundup-tracker | roundup | 1.0 |
roundup-tracker | roundup | 1.0.1 |
roundup-tracker | roundup | 1.1.0 |
roundup-tracker | roundup | 1.1.1 |
roundup-tracker | roundup | 1.1.2 |
roundup-tracker | roundup | 1.2.0 |
roundup-tracker | roundup | 1.2.1 |
roundup-tracker | roundup | 1.3.0 |
roundup-tracker | roundup | 1.3.1 |
roundup-tracker | roundup | 1.3.2 |
roundup-tracker | roundup | 1.3.3 |
roundup-tracker | roundup | 1.4.0 |
roundup-tracker | roundup | 1.4.1 |
roundup-tracker | roundup | 1.4.2 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References