First published: Tue Aug 09 2011(Updated: )
The Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 does not properly restrict caching of HTTPS responses, which makes it easier for remote attackers to obtain sensitive information by leveraging an unattended workstation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Mobility Pack | =1.1 | |
Novell Data Synchronizer | =1.1.2 | |
Novell Data Synchronizer | =1.1.0 | |
Novell Data Synchronizer | =1.1.1 | |
Novell Mobility Pack | =1.1.2 | |
Novell Data Synchronizer | =1.0.0 | |
Novell Mobility Pack | =1.0 | |
Novell Mobility Pack | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.