Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-px96-54jm-q7g6

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

EPSS

Процентиль: 53%
0.00304
Низкий

Связанные уязвимости

ubuntu
около 15 лет назад

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

nvd
около 15 лет назад

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

debian
около 15 лет назад

The default quickstart configuration of TurboGears2 (aka tg2) before 2 ...

EPSS

Процентиль: 53%
0.00304
Низкий