First published: Fri Apr 22 2011(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Best Practical Solutions RT 2.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bestpractical Rt | =3.0.4 | |
Bestpractical Rt | =2.0.7 | |
Bestpractical Rt | =3.0.8 | |
Bestpractical Rt | =2.0.6 | |
Bestpractical Rt | =3.4.5 | |
Bestpractical Rt | =3.0.2 | |
Bestpractical Rt | =2.0.14 | |
Bestpractical Rt | =3.6.7 | |
Bestpractical Rt | =3.6.2 | |
Bestpractical Rt | =3.2.2 | |
Bestpractical Rt | =3.6.3 | |
Bestpractical Rt | =3.0.11 | |
Bestpractical Rt | =2.0.15 | |
Bestpractical Rt | =3.6.0 | |
Bestpractical Rt | =2.0.5.3 | |
Bestpractical Rt | =3.4.0 | |
Bestpractical Rt | =2.0.8.2 | |
Bestpractical Rt | =2.0.13 | |
Bestpractical Rt | =3.0.10 | |
Bestpractical Rt | =2.0.11 | |
Bestpractical Rt | =2.0.0 | |
Bestpractical Rt | =3.6.10 | |
Bestpractical Rt | =2.0.1 | |
Bestpractical Rt | =3.2.3 | |
Bestpractical Rt | =2.0.2 | |
Bestpractical Rt | =3.0.5 | |
Bestpractical Rt | =3.2.0 | |
Bestpractical Rt | =3.0.0 | |
Bestpractical Rt | =3.4.6 | |
Bestpractical Rt | =3.0.3 | |
Bestpractical Rt | =3.4.3 | |
Bestpractical Rt | =2.0.8 | |
Bestpractical Rt | =3.6.9 | |
Bestpractical Rt | =3.6.6 | |
Bestpractical Rt | =2.0.5 | |
Bestpractical Rt | =3.6.5 | |
Bestpractical Rt | =3.0.1 | |
Bestpractical Rt | =3.2.1 | |
Bestpractical Rt | =2.0.5.1 | |
Bestpractical Rt | =3.4.4 | |
Bestpractical Rt | =3.6.8 | |
Bestpractical Rt | =3.0.6 | |
Bestpractical Rt | =3.0.7 | |
Bestpractical Rt | =3.0.7.1 | |
Bestpractical Rt | =3.0.12 | |
Bestpractical Rt | =3.0.9 | |
Bestpractical Rt | =3.6.1 | |
Bestpractical Rt | =3.4.1 | |
Bestpractical Rt | =3.6.4 | |
Bestpractical Rt | =2.0.4 | |
Bestpractical Rt | =2.0.9 | |
Bestpractical Rt | =2.0.3 | |
Bestpractical Rt | =2.0.12 | |
Bestpractical Rt | =3.4.2 | |
Bestpractical Rt | =3.8.7 | |
Bestpractical Rt | =3.8.9-rc2 | |
Bestpractical Rt | =3.8.8-rc2 | |
Bestpractical Rt | =3.8.9-rc1 | |
Bestpractical Rt | =3.8.2 | |
Bestpractical Rt | =3.8.8-rc4 | |
Bestpractical Rt | =3.8.0 | |
Bestpractical Rt | =3.8.9 | |
Bestpractical Rt | =3.8.8-rc3 | |
Bestpractical Rt | =3.8.9-rc3 | |
Bestpractical Rt | =3.8.5 | |
Bestpractical Rt | =3.8.6-rc1 | |
Bestpractical Rt | =3.8.8 | |
Bestpractical Rt | =3.8.3 | |
Bestpractical Rt | =3.8.6 | |
Bestpractical Rt | =3.8.1 | |
Bestpractical Rt | =3.8.4 | |
Bestpractical Rt | =3.8.7-rc1 | |
Bestpractical Rt | =4.0.0-rc4 | |
Bestpractical Rt | =4.0.0-rc7 | |
Bestpractical Rt | =4.0.0-rc3 | |
Bestpractical Rt | =4.0.0-rc6 | |
Bestpractical Rt | =4.0.0-rc5 | |
Bestpractical Rt | =4.0.0-rc2 | |
Bestpractical Rt | =4.0.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.