Total
287 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-6434 | 1 Broadcom | 1 Fabric Operating System | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
A vulnerability in the web management interface of Brocade Fabric OS versions before 8.2.1, 8.1.2f, 8.0.2f, 7.4.2d could allow attackers to intercept or manipulate a user's session ID. | |||||
CVE-2018-16463 | 1 Nextcloud | 1 Nextcloud Server | 2024-02-28 | 3.6 LOW | 3.1 LOW |
A bug causing session fixation in Nextcloud Server prior to 14.0.0, 13.0.3 and 12.0.8 could potentially allow an attacker to obtain access to password protected shares. | |||||
CVE-2018-17902 | 1 Yokogawa | 8 Fcj, Fcj Firmware, Fcn-100 and 5 more | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The application utilizes multiple methods of session management which could result in a denial of service to the remote management functions. | |||||
CVE-2018-5385 | 1 Navarino | 1 Infinity | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
Navarino Infinity is prone to session fixation attacks. The server accepts the session ID as a GET parameter which can lead to bypassing the two factor authentication in some installations. This could lead to phishing attacks that can bypass the two factor authentication that is present in some installations. | |||||
CVE-2018-1485 | 1 Ibm | 1 Bigfix Platform | 2024-02-28 | 4.0 MEDIUM | 4.3 MEDIUM |
IBM BigFix Platform 9.2.0 through 9.2.14 and 9.5 through 9.5.9 does not renew a session variable after a successful authentication which could lead to session fixation/hijacking vulnerability. This could force a user to utilize a cookie that may be known to an attacker. IBM X-Force ID: 140970. | |||||
CVE-2016-9574 | 1 Mozilla | 1 Network Security Services | 2024-02-28 | 4.3 MEDIUM | 5.9 MEDIUM |
nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA. | |||||
CVE-2018-18926 | 1 Gitea | 1 Gitea | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
Gitea before 1.5.4 allows remote code execution because it does not properly validate session IDs. This is related to session ID handling in the go-macaron/session code for Macaron. | |||||
CVE-2019-0102 | 1 Intel | 1 Data Center Manager | 2024-02-28 | 5.8 MEDIUM | 8.8 HIGH |
Insufficient session authentication in web server for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access. | |||||
CVE-2018-1804 | 1 Ibm | 1 Security Access Manager | 2024-02-28 | 4.3 MEDIUM | 3.7 LOW |
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 does not set the secure attribute on authorization tokens or session cookies. This could allow an attacker to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 149703. | |||||
CVE-2018-14387 | 1 Wondercms | 1 Wondercms | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered in WonderCMS before 2.5.2. An attacker can create a new session on a web application and record the associated session identifier. The attacker then causes the victim to authenticate against the server using the same session identifier. The attacker can access the user's account through the active session. The Session Fixation attack fixes a session on the victim's browser, so the attack starts before the user logs in. | |||||
CVE-2018-18925 | 1 Gogs | 1 Gogs | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
Gogs 0.11.66 allows remote code execution because it does not properly validate session IDs, as demonstrated by a ".." session-file forgery in the file session provider in file.go. This is related to session ID handling in the go-macaron/session code for Macaron. | |||||
CVE-2018-1127 | 1 Redhat | 1 Gluster Storage | 2024-02-28 | 6.8 MEDIUM | 8.1 HIGH |
Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user. | |||||
CVE-2018-1948 | 1 Ibm | 1 Security Identity Governance And Intelligence | 2024-02-28 | 4.3 MEDIUM | 4.3 MEDIUM |
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 153428. | |||||
CVE-2019-7747 | 1 Dbninja | 1 Dbninja | 2024-02-28 | 6.8 MEDIUM | 9.6 CRITICAL |
DbNinja 3.2.7 allows session fixation via the data.php sessid parameter. | |||||
CVE-2018-19443 | 1 Tryton | 1 Tryton | 2024-02-28 | 4.3 MEDIUM | 5.9 MEDIUM |
The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle. | |||||
CVE-2018-1000409 | 1 Jenkins | 1 Jenkins | 2024-02-28 | 5.8 MEDIUM | 5.4 MEDIUM |
A session fixation vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that prevented Jenkins from invalidating the existing session and creating a new one when a user signed up for a new user account. | |||||
CVE-2019-1003019 | 1 Jenkins | 1 Github Oauth | 2024-02-28 | 4.3 MEDIUM | 5.9 MEDIUM |
An session fixation vulnerability exists in Jenkins GitHub Authentication Plugin 0.29 and earlier in GithubSecurityRealm.java that allows unauthorized attackers to impersonate another user if they can control the pre-authentication session. | |||||
CVE-2016-6545 | 1 Ieasytec | 1 Itrackeasy | 2024-02-28 | 5.0 MEDIUM | 9.8 CRITICAL |
Session cookies are not used for maintaining valid sessions in iTrack Easy. The user's password is passed as a POST parameter over HTTPS using a base64 encoded passwd field on every request. In this implementation, sessions can only be terminated when the user changes the associated password. | |||||
CVE-2018-1484 | 1 Ibm | 1 Bigfix Platform | 2024-02-28 | 4.3 MEDIUM | 3.7 LOW |
IBM BigFix Platform 9.2.0 through 9.2.14 and 9.5 through 9.5.9 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 140969. | |||||
CVE-2018-1480 | 1 Ibm | 1 Bigfix Platform | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
IBM BigFix Platform 9.2.0 through 9.2.14 and 9.5 through 9.5.9 does not set the 'HttpOnly' attribute on authorization tokens or session cookies. If a Cross-Site Scripting vulnerability also existed attackers may be able to get the cookie values via malicious JavaScript and then hijack the user session. IBM X-Force ID: 140762. |