Page 2 of 6 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list. OpenConnect anterior v2.26 coloca el valor de la cookie WebVPN en la salida de depuración,lo que puede permitir a atacantes remotos obtener información sensible por lectura de esta salida, como quedó demotrados en la salida posteada en la lista pública de correo openconnect-devel. • http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051620.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051637.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051640.html http://secunia.com/advisories/42381 http://www.infradead.org/openconnect.html http://www.securityfocus.com/bid/44111 http://www.vupen.com/english/advisories/2010/3078 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •