2.6
CVE-2012-2731
- EPSS 0.61%
- Veröffentlicht 27.06.2012 00:55:05
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
The Ubercart AJAX Cart 6.x-2.x before 6.x-2.1 for Drupal stores the PHP session id in the JavaScript settings array in page loads, which might allow remote attackers to obtain sensitive information by sniffing or reading the cache of the HTML of a webpage.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatealpha6
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatealpha7
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatealpha8
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta1
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta10
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta11
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta2
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta3
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta4
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta5
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta6
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta7
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta8
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updatebeta9
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updaterc1
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updaterc2
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updaterc3
Richardo Ante ≫ Ubercart Ajax Cart Version6.x-2.0 Updaterc4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.61% | 0.695 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 2.6 | 4.9 | 2.9 |
AV:N/AC:H/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.