[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-1690

Date: (C)2011-04-22   (M)2017-08-18
 
CVSS Score: 4.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: NONE











Best Practical Solutions RT 3.6.0 through 3.6.10 and 3.8.0 through 3.8.8 allows remote attackers to trick users into sending credentials to an arbitrary server via unspecified vectors.

Reference:
SECUNIA-44189
BID-47383
ADV-2011-1071
DSA-2220
http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000189.html
http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000188.html
http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000187.html
http://blog.bestpractical.com/2011/04/security-vulnerabilities-in-rt.html
https://bugzilla.redhat.com/show_bug.cgi?id=696795
rt-unspecified-sec-bypass(66794)

CPE    25
cpe:/a:bestpractical:rt:3.8.6:rc1
cpe:/a:bestpractical:rt:3.6.10
cpe:/a:bestpractical:rt:3.6.2
cpe:/a:bestpractical:rt:3.8.0
...
CWE    1
CWE-255
OVAL    1
oval:org.secpod.oval:def:600543

© 2013 SecPod Technologies