ID |
CVE-2009-5051
|
Summary |
Hastymail2 before RC 8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*
-
cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*
-
cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*
-
cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*
-
cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*
-
cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*
-
cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*
-
cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*
-
cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*
-
cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 17-08-2017 - 01:31) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-16 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
NONE |
NONE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
refmap
via4
|
|
Last major update |
17-08-2017 - 01:31 |
Published |
18-01-2011 - 18:03 |
Last modified |
17-08-2017 - 01:31 |