CVE-2011-1687
22.04.2011, 10:55
Best Practical Solutions RT 3.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allows remote authenticated users to obtain sensitive information by using the search interface, as demonstrated by retrieving encrypted passwords.Enginsight
Vendor | Product | Version |
---|---|---|
bestpractical | rt | 3.0.0 |
bestpractical | rt | 3.0.1 |
bestpractical | rt | 3.0.2 |
bestpractical | rt | 3.0.3 |
bestpractical | rt | 3.0.4 |
bestpractical | rt | 3.0.5 |
bestpractical | rt | 3.0.6 |
bestpractical | rt | 3.0.7 |
bestpractical | rt | 3.0.7.1 |
bestpractical | rt | 3.0.8 |
bestpractical | rt | 3.0.9 |
bestpractical | rt | 3.0.10 |
bestpractical | rt | 3.0.11 |
bestpractical | rt | 3.0.12 |
bestpractical | rt | 3.2.0 |
bestpractical | rt | 3.2.1 |
bestpractical | rt | 3.2.2 |
bestpractical | rt | 3.2.3 |
bestpractical | rt | 3.4.0 |
bestpractical | rt | 3.4.1 |
bestpractical | rt | 3.4.2 |
bestpractical | rt | 3.4.3 |
bestpractical | rt | 3.4.4 |
bestpractical | rt | 3.4.5 |
bestpractical | rt | 3.4.6 |
bestpractical | rt | 3.6.0 |
bestpractical | rt | 3.6.1 |
bestpractical | rt | 3.6.2 |
bestpractical | rt | 3.6.3 |
bestpractical | rt | 3.6.4 |
bestpractical | rt | 3.6.5 |
bestpractical | rt | 3.6.6 |
bestpractical | rt | 3.6.7 |
bestpractical | rt | 3.6.8 |
bestpractical | rt | 3.6.9 |
bestpractical | rt | 3.6.10 |
bestpractical | rt | 3.8.0 |
bestpractical | rt | 3.8.1 |
bestpractical | rt | 3.8.2 |
bestpractical | rt | 3.8.3 |
bestpractical | rt | 3.8.4 |
bestpractical | rt | 3.8.5 |
bestpractical | rt | 3.8.6 |
bestpractical | rt | 3.8.6:rc1 |
bestpractical | rt | 3.8.7 |
bestpractical | rt | 3.8.7:rc1 |
bestpractical | rt | 3.8.8 |
bestpractical | rt | 3.8.8:rc2 |
bestpractical | rt | 3.8.8:rc3 |
bestpractical | rt | 3.8.8:rc4 |
bestpractical | rt | 3.8.9 |
bestpractical | rt | 3.8.9:rc1 |
bestpractical | rt | 3.8.9:rc2 |
bestpractical | rt | 3.8.9:rc3 |
bestpractical | rt | 4.0.0:rc1 |
bestpractical | rt | 4.0.0:rc2 |
bestpractical | rt | 4.0.0:rc3 |
bestpractical | rt | 4.0.0:rc4 |
bestpractical | rt | 4.0.0:rc5 |
bestpractical | rt | 4.0.0:rc6 |
bestpractical | rt | 4.0.0:rc7 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
request-tracker3.6 |
| ||||||||||||||||||||
request-tracker3.8 |
|
Common Weakness Enumeration
References