CVE-2009-5051

Hastymail2 before RC 8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*
cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*

History

No history.

Information

Published : 2011-01-18 18:03

Updated : 2023-12-10 11:03


NVD link : CVE-2009-5051

Mitre link : CVE-2009-5051

CVE.ORG link : CVE-2009-5051


JSON object : View

Products Affected

hastymail

  • hastymail2
CWE
CWE-16

Configuration