Vulnerability Details CVE-2015-1820
REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.04
EPSS Ranking 87.9%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2015-1820
-
cpe:2.3:a:rest-client_project:rest-client:0.1
-
cpe:2.3:a:rest-client_project:rest-client:0.2
-
cpe:2.3:a:rest-client_project:rest-client:0.3
-
cpe:2.3:a:rest-client_project:rest-client:0.4
-
cpe:2.3:a:rest-client_project:rest-client:0.5
-
cpe:2.3:a:rest-client_project:rest-client:0.5.1
-
cpe:2.3:a:rest-client_project:rest-client:0.6
-
cpe:2.3:a:rest-client_project:rest-client:0.6.1
-
cpe:2.3:a:rest-client_project:rest-client:0.6.2
-
cpe:2.3:a:rest-client_project:rest-client:0.7
-
cpe:2.3:a:rest-client_project:rest-client:0.8
-
cpe:2.3:a:rest-client_project:rest-client:0.8.1
-
cpe:2.3:a:rest-client_project:rest-client:0.8.2
-
cpe:2.3:a:rest-client_project:rest-client:0.9
-
cpe:2.3:a:rest-client_project:rest-client:0.9.2
-
cpe:2.3:a:rest-client_project:rest-client:1.0
-
cpe:2.3:a:rest-client_project:rest-client:1.0.1
-
cpe:2.3:a:rest-client_project:rest-client:1.0.2
-
cpe:2.3:a:rest-client_project:rest-client:1.0.3
-
cpe:2.3:a:rest-client_project:rest-client:1.0.4
-
cpe:2.3:a:rest-client_project:rest-client:1.1.0
-
cpe:2.3:a:rest-client_project:rest-client:1.2.0
-
cpe:2.3:a:rest-client_project:rest-client:1.3.0
-
cpe:2.3:a:rest-client_project:rest-client:1.3.1
-
cpe:2.3:a:rest-client_project:rest-client:1.4.0
-
cpe:2.3:a:rest-client_project:rest-client:1.4.1
-
cpe:2.3:a:rest-client_project:rest-client:1.4.2
-
cpe:2.3:a:rest-client_project:rest-client:1.5.0
-
cpe:2.3:a:rest-client_project:rest-client:1.5.1
-
cpe:2.3:a:rest-client_project:rest-client:1.6.0
-
cpe:2.3:a:rest-client_project:rest-client:1.6.1
-
cpe:2.3:a:rest-client_project:rest-client:1.6.10
-
cpe:2.3:a:rest-client_project:rest-client:1.6.11
-
cpe:2.3:a:rest-client_project:rest-client:1.6.12
-
cpe:2.3:a:rest-client_project:rest-client:1.6.13
-
cpe:2.3:a:rest-client_project:rest-client:1.6.14
-
cpe:2.3:a:rest-client_project:rest-client:1.6.2
-
cpe:2.3:a:rest-client_project:rest-client:1.6.3
-
cpe:2.3:a:rest-client_project:rest-client:1.6.5
-
cpe:2.3:a:rest-client_project:rest-client:1.6.6
-
cpe:2.3:a:rest-client_project:rest-client:1.6.7
-
cpe:2.3:a:rest-client_project:rest-client:1.6.8
-
cpe:2.3:a:rest-client_project:rest-client:1.6.9
-
cpe:2.3:a:rest-client_project:rest-client:1.7.0
-
cpe:2.3:a:rest-client_project:rest-client:1.7.1
-
cpe:2.3:a:rest-client_project:rest-client:1.7.2
-
cpe:2.3:a:rest-client_project:rest-client:1.7.3