Логотип exploitDog
bind:CVE-2009-5014
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2009-5014

Количество 4

Количество 4

ubuntu логотип

CVE-2009-5014

около 15 лет назад

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2009-5014

около 15 лет назад

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2009-5014

около 15 лет назад

The default quickstart configuration of TurboGears2 (aka tg2) before 2 ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-px96-54jm-q7g6

больше 3 лет назад

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2009-5014

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

CVSS2: 7.5
0%
Низкий
около 15 лет назад
nvd логотип
CVE-2009-5014

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

CVSS2: 7.5
0%
Низкий
около 15 лет назад
debian логотип
CVE-2009-5014

The default quickstart configuration of TurboGears2 (aka tg2) before 2 ...

CVSS2: 7.5
0%
Низкий
около 15 лет назад
github логотип
GHSA-px96-54jm-q7g6

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу