Логотип exploitDog
bind:CVE-2013-4964
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-4964

Количество 4

Количество 4

ubuntu логотип

CVE-2013-4964

больше 12 лет назад

Puppet Enterprise before 3.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2013-4964

больше 12 лет назад

Puppet Enterprise before 3.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2013-4964

больше 12 лет назад

Puppet Enterprise before 3.0.1 does not set the secure flag for the se ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-w6pc-jf6c-2mr8

больше 3 лет назад

Puppet Enterprise before 3.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2013-4964

Puppet Enterprise before 3.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 5
0%
Низкий
больше 12 лет назад
nvd логотип
CVE-2013-4964

Puppet Enterprise before 3.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 5
0%
Низкий
больше 12 лет назад
debian логотип
CVE-2013-4964

Puppet Enterprise before 3.0.1 does not set the secure flag for the se ...

CVSS2: 5
0%
Низкий
больше 12 лет назад
github логотип
GHSA-w6pc-jf6c-2mr8

Puppet Enterprise before 3.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу