Dojo Toolkit, as used in the Web client in IBM Rational ClearQuest 7.1.1.x before 7.1.1.4 and 7.1.2.x before 7.1.2.1, allows remote attackers to read cookies by navigating to a Dojo file, related to an "open direct" issue.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:21
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://public.dhe.ibm.com/software/rational/clearquest/7.1.1/7.1.1.4-RATL-RCQ/7.1.1.4-RATL-RCQ.ux.readme - | |
References | () http://secunia.com/advisories/42624 - Vendor Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1PM15146 - |
Information
Published : 2010-12-29 18:00
Updated : 2024-11-21 01:21
NVD link : CVE-2010-4600
Mitre link : CVE-2010-4600
CVE.ORG link : CVE-2010-4600
JSON object : View
Products Affected
ibm
- rational_clearquest
dojofoundation
- dojo_toolkit
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor