Описание
The Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.1.2 (включая)
Одно из
cpe:2.3:a:novell:data_synchronizer:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:data_synchronizer:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:data_synchronizer:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:novell:data_synchronizer:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:novell:mobility_pack:*:*:*:*:*:*:*:*
cpe:2.3:a:novell:mobility_pack:1.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:mobility_pack:1.1:*:*:*:*:*:*:*
cpe:2.3:a:novell:mobility_pack:1.1.1:*:*:*:*:*:*:*
EPSS
Процентиль: 72%
0.00739
Низкий
4.3 Medium
CVSS2
Дефекты
CWE-79
Связанные уязвимости
github
больше 3 лет назад
The Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.
EPSS
Процентиль: 72%
0.00739
Низкий
4.3 Medium
CVSS2
Дефекты
CWE-79