CVE-2011-0009
25.01.2011, 19:00
Best Practical Solutions RT 3.x before 3.8.9rc2 and 4.x before 4.0.0rc4 uses the MD5 algorithm for password hashes, which makes it easier for context-dependent attackers to determine cleartext passwords via a brute-force attack on the database.Enginsight
Vendor | Product | Version |
---|---|---|
bestpractical | rt | 𝑥 ≤ 3.8.9 |
bestpractical | rt | 3.0.0 |
bestpractical | rt | 3.0.1 |
bestpractical | rt | 3.0.2 |
bestpractical | rt | 3.0.3 |
bestpractical | rt | 3.0.4 |
bestpractical | rt | 3.0.5 |
bestpractical | rt | 3.0.6 |
bestpractical | rt | 3.0.7 |
bestpractical | rt | 3.0.7.1 |
bestpractical | rt | 3.0.8 |
bestpractical | rt | 3.0.9 |
bestpractical | rt | 3.0.10 |
bestpractical | rt | 3.0.10:pre1 |
bestpractical | rt | 3.0.10:pre2 |
bestpractical | rt | 3.0.10:rc1 |
bestpractical | rt | 3.0.11 |
bestpractical | rt | 3.0.11:rc2 |
bestpractical | rt | 3.0.11:rc3 |
bestpractical | rt | 3.0.11:rc4 |
bestpractical | rt | 3.0.12 |
bestpractical | rt | 3.1.2 |
bestpractical | rt | 3.1.3 |
bestpractical | rt | 3.1.4 |
bestpractical | rt | 3.1.5 |
bestpractical | rt | 3.1.6 |
bestpractical | rt | 3.1.7 |
bestpractical | rt | 3.1.8 |
bestpractical | rt | 3.1.10 |
bestpractical | rt | 3.1.11 |
bestpractical | rt | 3.1.12 |
bestpractical | rt | 3.1.13 |
bestpractical | rt | 3.1.14 |
bestpractical | rt | 3.1.15 |
bestpractical | rt | 3.1.16 |
bestpractical | rt | 3.1.17 |
bestpractical | rt | 3.2.0 |
bestpractical | rt | 3.2.0:rc1 |
bestpractical | rt | 3.2.0:rc2 |
bestpractical | rt | 3.2.0:rc3 |
bestpractical | rt | 3.2.0:rc4 |
bestpractical | rt | 3.2.1 |
bestpractical | rt | 3.2.1:rc1 |
bestpractical | rt | 3.2.1:rc2 |
bestpractical | rt | 3.2.1:rc3 |
bestpractical | rt | 3.2.1:rc4 |
bestpractical | rt | 3.2.2 |
bestpractical | rt | 3.2.2:rc1 |
bestpractical | rt | 3.2.3 |
bestpractical | rt | 3.2.3:rc1 |
bestpractical | rt | 3.2.3:rc2 |
bestpractical | rt | 3.4.0 |
bestpractical | rt | 3.4.0:rc1 |
bestpractical | rt | 3.4.0:rc2 |
bestpractical | rt | 3.4.0:rc3 |
bestpractical | rt | 3.4.0:rc4 |
bestpractical | rt | 3.4.0:rc5 |
bestpractical | rt | 3.4.0:rc6 |
bestpractical | rt | 3.4.1 |
bestpractical | rt | 3.4.2 |
bestpractical | rt | 3.4.2:rc1 |
bestpractical | rt | 3.4.2:rc2 |
bestpractical | rt | 3.4.3 |
bestpractical | rt | 3.4.3:rc1 |
bestpractical | rt | 3.4.3:rc2 |
bestpractical | rt | 3.4.4 |
bestpractical | rt | 3.4.4:pre1 |
bestpractical | rt | 3.4.4:pre2 |
bestpractical | rt | 3.4.4:pre3 |
bestpractical | rt | 3.4.5 |
bestpractical | rt | 3.4.5:pre1 |
bestpractical | rt | 3.4.5:rc1 |
bestpractical | rt | 3.4.5:rc2 |
bestpractical | rt | 3.4.6 |
bestpractical | rt | 3.4.6:rc1 |
bestpractical | rt | 3.4.6:rc2 |
bestpractical | rt | 3.4.7:rc1 |
bestpractical | rt | 3.5.1 |
bestpractical | rt | 3.5.2 |
bestpractical | rt | 3.5.3 |
bestpractical | rt | 3.5.4 |
bestpractical | rt | 3.5.5 |
bestpractical | rt | 3.5.6 |
bestpractical | rt | 3.5.7 |
bestpractical | rt | 3.6.0 |
bestpractical | rt | 3.6.0:pre0 |
bestpractical | rt | 3.6.0:pre1 |
bestpractical | rt | 3.6.0:rc1 |
bestpractical | rt | 3.6.0:rc2 |
bestpractical | rt | 3.6.0:rc3 |
bestpractical | rt | 3.6.1 |
bestpractical | rt | 3.6.1:pre2 |
bestpractical | rt | 3.6.1:rc1 |
bestpractical | rt | 3.6.1:rc2 |
bestpractical | rt | 3.6.2 |
bestpractical | rt | 3.6.2:rc1 |
bestpractical | rt | 3.6.2:rc3 |
bestpractical | rt | 3.6.2:rc4 |
bestpractical | rt | 3.6.2:rc5 |
bestpractical | rt | 3.6.3 |
bestpractical | rt | 3.6.3:rc1 |
bestpractical | rt | 3.6.3:rc2 |
bestpractical | rt | 3.6.3:rc3 |
bestpractical | rt | 3.6.3:rc4 |
bestpractical | rt | 3.6.4 |
bestpractical | rt | 3.6.4:rc1 |
bestpractical | rt | 3.6.4:rc2 |
bestpractical | rt | 3.6.5 |
bestpractical | rt | 3.6.5:rc1 |
bestpractical | rt | 3.6.5:rc2 |
bestpractical | rt | 3.6.6 |
bestpractical | rt | 3.6.6:rc1 |
bestpractical | rt | 3.6.6:rc2 |
bestpractical | rt | 3.6.6:rc3 |
bestpractical | rt | 3.6.7 |
bestpractical | rt | 3.6.8 |
bestpractical | rt | 3.6.9 |
bestpractical | rt | 3.7.1 |
bestpractical | rt | 3.7.5 |
bestpractical | rt | 3.7.80 |
bestpractical | rt | 3.7.85 |
bestpractical | rt | 3.7.86 |
bestpractical | rt | 3.8.0 |
bestpractical | rt | 3.8.0:rc1 |
bestpractical | rt | 3.8.0:rc2 |
bestpractical | rt | 3.8.0:rc3 |
bestpractical | rt | 3.8.1 |
bestpractical | rt | 3.8.1:rc1 |
bestpractical | rt | 3.8.1:rc2 |
bestpractical | rt | 3.8.1:rc3 |
bestpractical | rt | 3.8.1:rc4 |
bestpractical | rt | 3.8.1:rc5 |
bestpractical | rt | 3.8.2 |
bestpractical | rt | 3.8.2:rc1 |
bestpractical | rt | 3.8.2:rc2 |
bestpractical | rt | 3.8.3 |
bestpractical | rt | 3.8.3:rc1 |
bestpractical | rt | 3.8.3:rc2 |
bestpractical | rt | 3.8.4 |
bestpractical | rt | 3.8.4:rc1 |
bestpractical | rt | 3.8.5 |
bestpractical | rt | 3.8.6 |
bestpractical | rt | 3.8.6:rc1 |
bestpractical | rt | 3.8.7:rc1 |
bestpractical | rt | 3.8.8:rc2 |
bestpractical | rt | 3.8.8:rc3 |
bestpractical | rt | 3.8.8:rc4 |
bestpractical | rt | 4.0.0:rc1 |
bestpractical | rt | 4.0.0:rc2 |
bestpractical | rt | 4.0.0:rc3 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
request-tracker3.4 |
| ||||||||||||||||||||
request-tracker3.6 |
| ||||||||||||||||||||
request-tracker3.8 |
|
Common Weakness Enumeration
References