5
CVE-2013-0529
- EPSS 0.23%
- Published 21.06.2013 14:55:01
- Last modified 11.04.2025 00:51:21
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
The Browser in IBM Sterling Connect:Direct 1.4 before 1.4.0.11 and 1.5 through 1.5.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ Sterling Connect Direct User Interface Version1.4.0.0
Ibm ≫ Sterling Connect Direct User Interface Version1.4.0.2
Ibm ≫ Sterling Connect Direct User Interface Version1.4.0.3
Ibm ≫ Sterling Connect Direct User Interface Version1.4.0.6
Ibm ≫ Sterling Connect Direct User Interface Version1.4.0.7
Ibm ≫ Sterling Connect Direct User Interface Version1.4.0.10
Ibm ≫ Sterling Connect Direct User Interface Version1.5.0.0
Ibm ≫ Sterling Connect Direct User Interface Version1.5.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.23% | 0.433 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|