Dojo Toolkit, as used in the Web client in IBM Rational ClearQuest 7.1.1.x before 7.1.1.4 and 7.1.2.x before 7.1.2.1, allows remote attackers to read cookies by navigating to a Dojo file, related to an "open direct" issue.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 01:21
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () ftp://public.dhe.ibm.com/software/rational/clearquest/7.1.1/7.1.1.4-RATL-RCQ/7.1.1.4-RATL-RCQ.ux.readme - | |
| References | () http://secunia.com/advisories/42624 - Vendor Advisory | |
| References | () http://www-01.ibm.com/support/docview.wss?uid=swg1PM15146 - | 
Information
                Published : 2010-12-29 18:00
Updated : 2025-04-11 00:51
NVD link : CVE-2010-4600
Mitre link : CVE-2010-4600
CVE.ORG link : CVE-2010-4600
JSON object : View
Products Affected
                ibm
- rational_clearquest
 
dojofoundation
- dojo_toolkit
 
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
