CVE-2011-1690
22.04.2011, 10:55
Best Practical Solutions RT 3.6.0 through 3.6.10 and 3.8.0 through 3.8.8 allows remote attackers to trick users into sending credentials to an arbitrary server via unspecified vectors.Enginsight
Vendor | Product | Version |
---|---|---|
bestpractical | rt | 3.6.0 |
bestpractical | rt | 3.6.1 |
bestpractical | rt | 3.6.2 |
bestpractical | rt | 3.6.3 |
bestpractical | rt | 3.6.4 |
bestpractical | rt | 3.6.5 |
bestpractical | rt | 3.6.6 |
bestpractical | rt | 3.6.7 |
bestpractical | rt | 3.6.8 |
bestpractical | rt | 3.6.9 |
bestpractical | rt | 3.6.10 |
bestpractical | rt | 3.8.0 |
bestpractical | rt | 3.8.1 |
bestpractical | rt | 3.8.2 |
bestpractical | rt | 3.8.3 |
bestpractical | rt | 3.8.4 |
bestpractical | rt | 3.8.5 |
bestpractical | rt | 3.8.6 |
bestpractical | rt | 3.8.6:rc1 |
bestpractical | rt | 3.8.7 |
bestpractical | rt | 3.8.7:rc1 |
bestpractical | rt | 3.8.8 |
bestpractical | rt | 3.8.8:rc2 |
bestpractical | rt | 3.8.8:rc3 |
bestpractical | rt | 3.8.8:rc4 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
request-tracker3.6 |
| ||||||||||||||||||||
request-tracker3.8 |
|
Common Weakness Enumeration
References