CVE-2011-1687
22.04.2011, 10:55
Best Practical Solutions RT 3.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allows remote authenticated users to obtain sensitive information by using the search interface, as demonstrated by retrieving encrypted passwords.Enginsight
| Vendor | Product | Version |
|---|---|---|
| bestpractical | rt | 3.0.0 |
| bestpractical | rt | 3.0.1 |
| bestpractical | rt | 3.0.2 |
| bestpractical | rt | 3.0.3 |
| bestpractical | rt | 3.0.4 |
| bestpractical | rt | 3.0.5 |
| bestpractical | rt | 3.0.6 |
| bestpractical | rt | 3.0.7 |
| bestpractical | rt | 3.0.7.1 |
| bestpractical | rt | 3.0.8 |
| bestpractical | rt | 3.0.9 |
| bestpractical | rt | 3.0.10 |
| bestpractical | rt | 3.0.11 |
| bestpractical | rt | 3.0.12 |
| bestpractical | rt | 3.2.0 |
| bestpractical | rt | 3.2.1 |
| bestpractical | rt | 3.2.2 |
| bestpractical | rt | 3.2.3 |
| bestpractical | rt | 3.4.0 |
| bestpractical | rt | 3.4.1 |
| bestpractical | rt | 3.4.2 |
| bestpractical | rt | 3.4.3 |
| bestpractical | rt | 3.4.4 |
| bestpractical | rt | 3.4.5 |
| bestpractical | rt | 3.4.6 |
| bestpractical | rt | 3.6.0 |
| bestpractical | rt | 3.6.1 |
| bestpractical | rt | 3.6.2 |
| bestpractical | rt | 3.6.3 |
| bestpractical | rt | 3.6.4 |
| bestpractical | rt | 3.6.5 |
| bestpractical | rt | 3.6.6 |
| bestpractical | rt | 3.6.7 |
| bestpractical | rt | 3.6.8 |
| bestpractical | rt | 3.6.9 |
| bestpractical | rt | 3.6.10 |
| bestpractical | rt | 3.8.0 |
| bestpractical | rt | 3.8.1 |
| bestpractical | rt | 3.8.2 |
| bestpractical | rt | 3.8.3 |
| bestpractical | rt | 3.8.4 |
| bestpractical | rt | 3.8.5 |
| bestpractical | rt | 3.8.6 |
| bestpractical | rt | 3.8.6:rc1 |
| bestpractical | rt | 3.8.7 |
| bestpractical | rt | 3.8.7:rc1 |
| bestpractical | rt | 3.8.8 |
| bestpractical | rt | 3.8.8:rc2 |
| bestpractical | rt | 3.8.8:rc3 |
| bestpractical | rt | 3.8.8:rc4 |
| bestpractical | rt | 3.8.9 |
| bestpractical | rt | 3.8.9:rc1 |
| bestpractical | rt | 3.8.9:rc2 |
| bestpractical | rt | 3.8.9:rc3 |
| bestpractical | rt | 4.0.0:rc1 |
| bestpractical | rt | 4.0.0:rc2 |
| bestpractical | rt | 4.0.0:rc3 |
| bestpractical | rt | 4.0.0:rc4 |
| bestpractical | rt | 4.0.0:rc5 |
| bestpractical | rt | 4.0.0:rc6 |
| bestpractical | rt | 4.0.0:rc7 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| request-tracker3.6 |
| ||||||||||||||||||||
| request-tracker3.8 |
|
Common Weakness Enumeration
References