CVE-2011-1688
22.04.2011, 10:55
Directory traversal vulnerability in Best Practical Solutions RT 3.2.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allows remote attackers to read arbitrary files via a crafted HTTP request.
Vendor | Product | Version |
---|---|---|
bestpractical | rt | 3.2.0 |
bestpractical | rt | 3.2.1 |
bestpractical | rt | 3.2.2 |
bestpractical | rt | 3.2.3 |
bestpractical | rt | 3.4.0 |
bestpractical | rt | 3.4.1 |
bestpractical | rt | 3.4.2 |
bestpractical | rt | 3.4.3 |
bestpractical | rt | 3.4.4 |
bestpractical | rt | 3.4.5 |
bestpractical | rt | 3.4.6 |
bestpractical | rt | 3.6.0 |
bestpractical | rt | 3.6.1 |
bestpractical | rt | 3.6.2 |
bestpractical | rt | 3.6.3 |
bestpractical | rt | 3.6.4 |
bestpractical | rt | 3.6.5 |
bestpractical | rt | 3.6.6 |
bestpractical | rt | 3.6.7 |
bestpractical | rt | 3.6.8 |
bestpractical | rt | 3.6.9 |
bestpractical | rt | 3.6.10 |
bestpractical | rt | 3.8.0 |
bestpractical | rt | 3.8.1 |
bestpractical | rt | 3.8.2 |
bestpractical | rt | 3.8.3 |
bestpractical | rt | 3.8.4 |
bestpractical | rt | 3.8.5 |
bestpractical | rt | 3.8.6 |
bestpractical | rt | 3.8.6:rc1 |
bestpractical | rt | 3.8.7 |
bestpractical | rt | 3.8.7:rc1 |
bestpractical | rt | 3.8.8 |
bestpractical | rt | 3.8.8:rc2 |
bestpractical | rt | 3.8.8:rc3 |
bestpractical | rt | 3.8.8:rc4 |
bestpractical | rt | 3.8.9 |
bestpractical | rt | 3.8.9:rc1 |
bestpractical | rt | 3.8.9:rc2 |
bestpractical | rt | 3.8.9:rc3 |
bestpractical | rt | 4.0.0:rc1 |
bestpractical | rt | 4.0.0:rc2 |
bestpractical | rt | 4.0.0:rc3 |
bestpractical | rt | 4.0.0:rc4 |
bestpractical | rt | 4.0.0:rc5 |
bestpractical | rt | 4.0.0:rc6 |
bestpractical | rt | 4.0.0:rc7 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
request-tracker3.6 |
| ||||||||||||||||||||
request-tracker3.8 |
|
References