Логотип exploitDog
bind:CVE-2009-3584
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2009-3584

Количество 4

Количество 4

ubuntu логотип

CVE-2009-3584

около 16 лет назад

SQL-Ledger 2.8.24 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2009-3584

около 16 лет назад

SQL-Ledger 2.8.24 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2009-3584

около 16 лет назад

SQL-Ledger 2.8.24 does not set the secure flag for the session cookie ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-3wq7-2q97-v54v

почти 4 года назад

SQL-Ledger 2.8.24 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2009-3584

SQL-Ledger 2.8.24 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 5
0%
Низкий
около 16 лет назад
nvd логотип
CVE-2009-3584

SQL-Ledger 2.8.24 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 5
0%
Низкий
около 16 лет назад
debian логотип
CVE-2009-3584

SQL-Ledger 2.8.24 does not set the secure flag for the session cookie ...

CVSS2: 5
0%
Низкий
около 16 лет назад
github логотип
GHSA-3wq7-2q97-v54v

SQL-Ledger 2.8.24 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу