Best Practical Solutions RT 3.6.0 through 3.6.10 and 3.8.0 through 3.8.8 allows remote attackers to trick users into sending credentials to an arbitrary server via unspecified vectors.
2011-04-22T10:55:02.530
2025-04-11T00:51:21.963
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | bestpractical | rt | 3.6.0 | Yes |
Application | bestpractical | rt | 3.6.1 | Yes |
Application | bestpractical | rt | 3.6.2 | Yes |
Application | bestpractical | rt | 3.6.3 | Yes |
Application | bestpractical | rt | 3.6.4 | Yes |
Application | bestpractical | rt | 3.6.5 | Yes |
Application | bestpractical | rt | 3.6.6 | Yes |
Application | bestpractical | rt | 3.6.7 | Yes |
Application | bestpractical | rt | 3.6.8 | Yes |
Application | bestpractical | rt | 3.6.9 | Yes |
Application | bestpractical | rt | 3.6.10 | Yes |
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.2 | Yes |
Application | bestpractical | rt | 3.8.3 | Yes |
Application | bestpractical | rt | 3.8.4 | Yes |
Application | bestpractical | rt | 3.8.5 | Yes |
Application | bestpractical | rt | 3.8.6 | Yes |
Application | bestpractical | rt | 3.8.6 | Yes |
Application | bestpractical | rt | 3.8.7 | Yes |
Application | bestpractical | rt | 3.8.7 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |