Логотип exploitDog
bind:CVE-2015-3155
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-3155

Количество 4

Количество 4

redhat логотип

CVE-2015-3155

больше 10 лет назад

Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2015-3155

около 10 лет назад

Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2015-3155

около 10 лет назад

Foreman before 1.8.1 does not set the secure flag for the _session_id ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-286g-52x6-9289

больше 3 лет назад

Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2015-3155

Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 2.6
1%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-3155

Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVSS2: 5
1%
Низкий
около 10 лет назад
debian логотип
CVE-2015-3155

Foreman before 1.8.1 does not set the secure flag for the _session_id ...

CVSS2: 5
1%
Низкий
около 10 лет назад
github логотип
GHSA-286g-52x6-9289

Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу