Описание
Hastymail2 before RC 8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*
EPSS
Процентиль: 48%
0.0025
Низкий
5 Medium
CVSS2
Дефекты
CWE-16
Связанные уязвимости
debian
около 15 лет назад
Hastymail2 before RC 8 does not set the secure flag for the session co ...
github
почти 4 года назад
Hastymail2 before RC 8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
EPSS
Процентиль: 48%
0.0025
Низкий
5 Medium
CVSS2
Дефекты
CWE-16