Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-3663

Опубликовано: 24 сент. 2008
Источник: debian
EPSS Низкий

Описание

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
squirrelmailfixed2:1.4.15-3package
squirrelmailno-dsaetchpackage

Примечания

  • only relevant for installations that are also offered over http

  • which isn't normally a good idea anyway. Fixing in stable will

  • change behaviour so not really suited for DSA.

EPSS

Процентиль: 79%
0.01255
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

redhat
больше 17 лет назад

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

nvd
больше 17 лет назад

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

github
почти 4 года назад

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

oracle-oval
около 17 лет назад

ELSA-2009-0010: squirrelmail security update (MODERATE)

EPSS

Процентиль: 79%
0.01255
Низкий