Total
298 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-5523 | 1 Vmware | 1 Vcloud Director | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
VMware vCloud Director for Service Providers 9.5.x prior to 9.5.0.3 update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Provider Portals by impersonating a currently logged in session. | |||||
CVE-2019-5406 | 1 Hp | 1 3par Storeserv Management Console | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
A remote session reuse vulnerability was discovered in HPE 3PAR StoreServ Management and Core Software Media version(s): prior to 3.5.0.1. | |||||
CVE-2019-5400 | 1 Hp | 2 3par Service Processor, 3par Service Processor Firmware | 2024-11-21 | 6.5 MEDIUM | 6.3 MEDIUM |
A remote session reuse vulnerability was discovered in HPE 3PAR Service Processor version(s): prior to 5.0.5.1. | |||||
CVE-2019-4617 | 2 Ibm, Linux | 2 Cloud Automation Manager, Linux Kernel | 2024-11-21 | 3.6 LOW | 4.4 MEDIUM |
IBM Cloud Automation Manager 3.2.1.0 does not renew a session variable after a successful authentication which could lead to session fixation/hijacking vulnerability. This could force a user to utilize a cookie that may be known to an attacker. IBM X-Force ID: 168645. | |||||
CVE-2019-4591 | 1 Ibm | 1 Maximo Asset Management | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
IBM Maximo Asset Management 7.6.0 and 7.6.1 does not invalidate session after logout which could allow a local user to impersonate another user on the system. IBM X-Force ID: 167451. | |||||
CVE-2019-4563 | 1 Ibm | 1 Security Directory Server | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
IBM Security Directory Server 6.4.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 166624. | |||||
CVE-2019-4439 | 1 Ibm | 1 Cloud Private | 2024-11-21 | 4.6 MEDIUM | 5.3 MEDIUM |
IBM Cloud Private 3.1.0, 3.1.1, and 3.1.2 does not invalidate session after logout which could allow a local user to impersonate another user on the system. IBM X-Force ID: 162949. | |||||
CVE-2019-4304 | 1 Ibm | 1 Websphere Application Server | 2024-11-21 | 6.5 MEDIUM | 6.3 MEDIUM |
IBM WebSphere Application Server - Liberty could allow a remote attacker to bypass security restrictions caused by improper session validation. IBM X-Force ID: 160950. | |||||
CVE-2019-4227 | 1 Ibm | 1 Mq | 2024-11-21 | 7.5 HIGH | 7.3 HIGH |
IBM MQ 8.0.0.4 - 8.0.0.12, 9.0.0.0 - 9.0.0.6, 9.1.0.0 - 9.1.0.2, and 9.1.0 - 9.1.2 AMQP Listeners could allow an unauthorized user to conduct a session fixation attack due to clients not being disconnected as they should. IBM X-Force ID: 159352. | |||||
CVE-2019-4152 | 1 Ibm | 1 Security Access Manager | 2024-11-21 | 3.6 LOW | 4.4 MEDIUM |
IBM Security Access Manager 9.0.1 through 9.0.6 does not invalidate session tokens in a timely manner. The lack of proper session expiration may allow attackers with local access to login into a closed browser session. IBM X-Force ID: 158515. | |||||
CVE-2019-3784 | 1 Cloudfoundry | 1 Stratos | 2024-11-21 | 4.0 MEDIUM | 8.2 HIGH |
Cloud Foundry Stratos, versions prior to 2.3.0, contains an insecure session that can be spoofed. When deployed on cloud foundry with multiple instances using the default embedded SQLite database, a remote authenticated malicious user can switch sessions to another user with the same session id. | |||||
CVE-2019-1807 | 1 Cisco | 1 Umbrella | 2024-11-21 | 6.8 MEDIUM | 7.6 HIGH |
A vulnerability in the session management functionality of the web UI for the Cisco Umbrella Dashboard could allow an authenticated, remote attacker to access the Dashboard via an active, user session. The vulnerability exists due to the affected application not invalidating an existing session when a user authenticates to the application and changes the users credentials via another authenticated session. An attacker could exploit this vulnerability by using a separate, authenticated, active session to connect to the application through the web UI. A successful exploit could allow the attacker to maintain access to the dashboard via an authenticated user's browser session. Cisco has addressed this vulnerability in the Cisco Umbrella Dashboard. No user action is required. | |||||
CVE-2019-19610 | 1 Halvotec | 1 Raquest | 2024-11-21 | 5.8 MEDIUM | 5.4 MEDIUM |
An issue was discovered in Halvotec RaQuest 10.23.10801.0. It allows session fixation. Fixed in Release 24.2020.20608.0. | |||||
CVE-2019-18946 | 1 Microfocus | 1 Solutions Business Manager | 2024-11-21 | 3.8 LOW | 4.8 MEDIUM |
Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are vulnerable to session fixation. | |||||
CVE-2019-18573 | 1 Dell | 1 Rsa Identity Governance And Lifecycle | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim’s session and perform arbitrary actions with privileges of the user within the compromised session. | |||||
CVE-2019-18418 | 1 Clonos | 1 Clonos | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
clonos.php in ClonOS WEB control panel 19.09 allows remote attackers to gain full access via change password requests because there is no session management. | |||||
CVE-2019-17563 | 5 Apache, Canonical, Debian and 2 more | 11 Tomcat, Ubuntu Linux, Debian Linux and 8 more | 2024-11-21 | 5.1 MEDIUM | 7.5 HIGH |
When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability. | |||||
CVE-2019-17062 | 1 Oxid-esales | 1 Eshop | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered in OXID eShop 6.x before 6.0.6 and 6.1.x before 6.1.5, OXID eShop Enterprise Edition Version 5.2.x-5.3.x, OXID eShop Professional Edition Version 4.9.x-4.10.x and OXID eShop Community Edition Version: 4.9.x-4.10.x. By using a specially crafted URL, users with administrative rights could unintentionally grant unauthorized users access to the admin panel via session fixation. | |||||
CVE-2019-15849 | 1 Eq-3 | 2 Homematic Ccu3, Homematic Ccu3 Firmware | 2024-11-21 | 4.9 MEDIUM | 7.3 HIGH |
eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromise the system. | |||||
CVE-2019-15612 | 1 Nextcloud | 1 Nextcloud Server | 2024-11-21 | 3.2 LOW | 5.9 MEDIUM |
A bug in Nextcloud Server 15.0.2 causes pending 2FA logins to not be correctly expired when the password of the user is reset. |