Show filters
65 Total Results
Displaying 31-40 of 65
Sort by:
Attacker Value
Unknown
CVE-2020-4527
Disclosure Date: July 17, 2020 (last updated February 21, 2025)
IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information, caused by the failure to set the Secure flag for the session cookie in TLS mode. By intercepting its transmission within an HTTP session, an attacker could exploit this vulnerability to capture the cookie and obtain sensitive information. IBM X-Force ID: 182631.
0
Attacker Value
Unknown
CVE-2020-6290
Disclosure Date: July 14, 2020 (last updated February 21, 2025)
SAP Disclosure Management, version 10.1, is vulnerable to Session Fixation attacks wherein the attacker tricks the user into using a specific session ID.
0
Attacker Value
Unknown
CVE-2019-4591
Disclosure Date: July 10, 2020 (last updated February 21, 2025)
IBM Maximo Asset Management 7.6.0 and 7.6.1 does not invalidate session after logout which could allow a local user to impersonate another user on the system. IBM X-Force ID: 167451.
0
Attacker Value
Unknown
CVE-2020-5596
Disclosure Date: July 07, 2020 (last updated February 21, 2025)
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) does not properly manage sessions, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.
0
Attacker Value
Unknown
CVE-2020-15018
Disclosure Date: June 24, 2020 (last updated February 21, 2025)
playSMS through 1.4.3 is vulnerable to session fixation.
0
Attacker Value
Unknown
CVE-2020-4229
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
IBM Worklight/MobileFoundation 8.0.0.0 does not properly invalidate session cookies when a user logs out of a session, which could allow another user to gain unauthorized access to a user's session. IBM X-Force ID: 175211.
0
Attacker Value
Unknown
CVE-2020-13229
Disclosure Date: June 02, 2020 (last updated February 21, 2025)
An issue was discovered in Sysax Multi Server 6.90. A session can be hijacked if one observes the sid value in any /scgi URI, because it is an authentication token.
0
Attacker Value
Unknown
CVE-2020-8434
Disclosure Date: May 19, 2020 (last updated February 21, 2025)
Jenzabar JICS (aka Internet Campus Solution) before 9.0.1 Patch 3, 9.1 before 9.1.2 Patch 2, and 9.2 before 9.2.2 Patch 8 has session cookies that are a deterministic function of the username. There is a hard-coded password to supply a PBKDF feeding into AES to encrypt a username and base64 encode it to a client-side cookie for persistent session authentication. By knowing the key and algorithm, an attacker can select any username, encrypt it, base64 encode it, and save it in their browser with the correct JICSLoginCookie cookie format to impersonate any real user in the JICS database without the need for authenticating (or verifying with MFA if implemented).
0
Attacker Value
Unknown
CVE-2020-12258
Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to session fixation because session expiry and randomization are mishandled. The application can reuse a session via PHPSESSID. Also, an attacker can exploit this vulnerability in conjunction with CVE-2020-12256 or CVE-2020-12259.
0
Attacker Value
Unknown
CVE-2020-1993
Disclosure Date: May 13, 2020 (last updated February 21, 2025)
The GlobalProtect Portal feature in PAN-OS does not set a new session identifier after a successful user login, which allows session fixation attacks, if an attacker is able to control a user's session ID. This issue affects: All PAN-OS 7.1 and 8.0 versions; PAN-OS 8.1 versions earlier than 8.1.14; PAN-OS 9.0 versions earlier than 9.0.8.
0