Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository pyload/pyload prior to 0.5.0b3.dev32.
References
Link | Resource |
---|---|
https://github.com/pyload/pyload/commit/7b53b8d43c2c072b457dcd19c8a09bcfc3721703 | Patch Third Party Advisory |
https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce | Exploit Patch Third Party Advisory |
Configurations
History
11 Jan 2023, 16:01
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/pyload/pyload/commit/7b53b8d43c2c072b457dcd19c8a09bcfc3721703 - Patch, Third Party Advisory | |
References | (CONFIRM) https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce - Exploit, Patch, Third Party Advisory | |
CWE | CWE-319 | |
First Time |
Pyload pyload
Pyload |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:* |
04 Jan 2023, 22:27
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-04 22:15
Updated : 2023-12-10 14:48
NVD link : CVE-2023-0055
Mitre link : CVE-2023-0055
CVE.ORG link : CVE-2023-0055
JSON object : View
Products Affected
pyload
- pyload