Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2021-42115
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
Missing HTTPOnly flag in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 allows an unauthenticated remote attacker to escalate privileges from unauthenticated to authenticated user via stealing and injecting the session- independent and static cookie UID.
0
Attacker Value
Unknown
CVE-2021-39210
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, the cookie used to store the autologin cookie (when a user uses the "remember me" feature) is accessible by scripts. A malicious plugin that could steal this cookie would be able to use it to autologin. This issue is fixed in version 9.5.6. As a workaround, one may avoid using the "remember me" feature.
0
Attacker Value
Unknown
CVE-2021-3706
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
adminlte is vulnerable to Sensitive Cookie Without 'HttpOnly' Flag
0
Attacker Value
Unknown
CVE-2021-34563
Disclosure Date: August 16, 2021 (last updated February 23, 2025)
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.
0
Attacker Value
Unknown
CVE-2020-27658
Disclosure Date: October 29, 2020 (last updated February 22, 2025)
Synology Router Manager (SRM) before 1.2.4-8081 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
0
Attacker Value
Unknown
CVE-2020-6267
Disclosure Date: July 14, 2020 (last updated February 21, 2025)
Some sensitive cookies in SAP Disclosure Management, version 10.1, are missing HttpOnly flag, leading to sensitive cookie without Http Only flag.
0