Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-3663

Опубликовано: 24 сент. 2008
Источник: debian
EPSS Низкий

Описание

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
squirrelmailfixed2:1.4.15-3package
squirrelmailno-dsaetchpackage

Примечания

  • only relevant for installations that are also offered over http

  • which isn't normally a good idea anyway. Fixing in stable will

  • change behaviour so not really suited for DSA.

EPSS

Процентиль: 79%
0.0128
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

redhat
почти 17 лет назад

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

nvd
больше 16 лет назад

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

github
около 3 лет назад

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

oracle-oval
больше 16 лет назад

ELSA-2009-0010: squirrelmail security update (MODERATE)

EPSS

Процентиль: 79%
0.0128
Низкий