Best Practical Solutions RT 3.6.0 through 3.6.10 and 3.8.0 through 3.8.8 allows remote attackers to trick users into sending credentials to an arbitrary server via unspecified vectors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rt | Bestpractical | 3.6.0 (including) | 3.6.0 (including) |
Rt | Bestpractical | 3.6.1 (including) | 3.6.1 (including) |
Rt | Bestpractical | 3.6.2 (including) | 3.6.2 (including) |
Rt | Bestpractical | 3.6.3 (including) | 3.6.3 (including) |
Rt | Bestpractical | 3.6.4 (including) | 3.6.4 (including) |
Rt | Bestpractical | 3.6.5 (including) | 3.6.5 (including) |
Rt | Bestpractical | 3.6.6 (including) | 3.6.6 (including) |
Rt | Bestpractical | 3.6.7 (including) | 3.6.7 (including) |
Rt | Bestpractical | 3.6.8 (including) | 3.6.8 (including) |
Rt | Bestpractical | 3.6.9 (including) | 3.6.9 (including) |
Rt | Bestpractical | 3.6.10 (including) | 3.6.10 (including) |
Request-tracker3.6 | Ubuntu | hardy | * |
Request-tracker3.6 | Ubuntu | karmic | * |
Request-tracker3.6 | Ubuntu | upstream | * |
Request-tracker3.8 | Ubuntu | karmic | * |
Request-tracker3.8 | Ubuntu | lucid | * |
Request-tracker3.8 | Ubuntu | maverick | * |
Request-tracker3.8 | Ubuntu | natty | * |
Request-tracker3.8 | Ubuntu | upstream | * |