6.8
CVSSv2

CVE-2011-2085

Published: 04/06/2012 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple cross-site request forgery (CSRF) vulnerabilities in Best Practical Solutions RT prior to 3.8.12 and 4.x prior to 4.0.6 allow remote malicious users to hijack the authentication of arbitrary users.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bestpractical rt 3.8.7

bestpractical rt 3.5.5

bestpractical rt 3.0.4

bestpractical rt 3.2.1

bestpractical rt 2.0.7

bestpractical rt 3.6.0

bestpractical rt 3.8.9

bestpractical rt 3.4.0

bestpractical rt 3.0.8

bestpractical rt 3.4.2

bestpractical rt 3.6.4

bestpractical rt 3.8.8

bestpractical rt 3.2.0

bestpractical rt 3.1.2

bestpractical rt 3.6.6

bestpractical rt 2.0.6

bestpractical rt 3.4.5

bestpractical rt 3.0.2

bestpractical rt 2.0.14

bestpractical rt 3.5.4

bestpractical rt 3.6.7

bestpractical rt 3.0.10

bestpractical rt 3.6.2

bestpractical rt 3.2.2

bestpractical rt 3.6.3

bestpractical rt 3.1.6

bestpractical rt 3.0.11

bestpractical rt 3.8.2

bestpractical rt 3.1.11

bestpractical rt 3.1.10

bestpractical rt 3.6.5

bestpractical rt 2.0.15

bestpractical rt 2.0.5.3

bestpractical rt 1.0.7

bestpractical rt 1.0.1

bestpractical rt 3.8.0

bestpractical rt 3.8.1

bestpractical rt 3.8.10

bestpractical rt 1.0.5

bestpractical rt 3.1.7

bestpractical rt 3.4.4

bestpractical rt 2.0.8.2

bestpractical rt 3.8.3

bestpractical rt 3.1.13

bestpractical rt 3.4.7

bestpractical rt 2.0.13

bestpractical rt 2.0.11

bestpractical rt 2.0.0

bestpractical rt 3.6.10

bestpractical rt 2.0.1

bestpractical rt 3.1.16

bestpractical rt 3.2.3

bestpractical rt 3.5.3

bestpractical rt 2.0.2

bestpractical rt 3.0.5

bestpractical rt 3.0.0

bestpractical rt 3.4.6

bestpractical rt 3.0.3

bestpractical rt 3.4.3

bestpractical rt 2.0.8

bestpractical rt 3.6.9

bestpractical rt 2.0.5

bestpractical rt 3.6.1

bestpractical rt 1.0.2

bestpractical rt 1.0.0

bestpractical rt 3.8.4

bestpractical rt

bestpractical rt 3.0.1

bestpractical rt 3.8.5

bestpractical rt 2.0.5.1

bestpractical rt 3.5.6

bestpractical rt 3.6.8

bestpractical rt 1.0.4

bestpractical rt 3.0.6

bestpractical rt 3.1.8

bestpractical rt 3.8.6

bestpractical rt 3.1.12

bestpractical rt 3.1.5

bestpractical rt 3.1.17

bestpractical rt 3.0.7

bestpractical rt 3.7.86

bestpractical rt 3.0.7.1

bestpractical rt 3.7.80

bestpractical rt 3.1.15

bestpractical rt 3.0.12

bestpractical rt 3.0.9

bestpractical rt 3.7.1

bestpractical rt 3.1.3

bestpractical rt 3.4.1

bestpractical rt 2.0.4

bestpractical rt 3.5.7

bestpractical rt 1.0.6

bestpractical rt 2.0.9

bestpractical rt 3.7.5

bestpractical rt 1.0.3

bestpractical rt 3.7.85

bestpractical rt 2.0.3

bestpractical rt 3.5.2

bestpractical rt 2.0.12

bestpractical rt 3.1.4

bestpractical rt 3.1.14

bestpractical rt 3.5.1

bestpractical rt 4.0.0

bestpractical rt 4.0.3

bestpractical rt 4.0.1

bestpractical rt 4.0.4

bestpractical rt 3.8.12

bestpractical rt 4.0.2

bestpractical rt 4.0.5

Vendor Advisories

Several vulnerabilities were discovered in Request Tracker, an issue tracking system: CVE-2011-2082 The vulnerable-passwords scripts introduced for CVE-2011-0009 failed to correct the password hashes of disabled users CVE-2011-2083 Several cross-site scripting issues have been discovered CVE-2011-2084 Password hashes could be ...