Show filters
65 Total Results
Displaying 41-50 of 65
Sort by:
Attacker Value
Unknown

CVE-2020-5894

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
On versions 3.0.0-3.3.0, the NGINX Controller webserver does not invalidate the server-side session token after users log out.
Attacker Value
Unknown

CVE-2020-12467

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
Subrion CMS 4.2.1 allows session fixation via an alphanumeric value in a session cookie.
Attacker Value
Unknown

CVE-2020-1762

Disclosure Date: April 27, 2020 (last updated February 21, 2025)
An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration.
Attacker Value
Unknown

CVE-2020-6824

Disclosure Date: April 24, 2020 (last updated February 21, 2025)
Initially, a user opens a Private Browsing Window and generates a password for a site, then closes the Private Browsing Window but leaves Firefox open. Subsequently, if the user had opened a new Private Browsing Window, revisited the same site, and generated a new password - the generated passwords would have been identical, rather than independent. This vulnerability affects Firefox < 75.
Attacker Value
Unknown

CVE-2020-11729

Disclosure Date: April 15, 2020 (last updated February 21, 2025)
An issue was discovered in DAViCal Andrew's Web Libraries (AWL) through 0.60. Long-term session cookies, uses to provide long-term session continuity, are not generated securely, enabling a brute-force attack that may be successful.
Attacker Value
Unknown

CVE-2020-11728

Disclosure Date: April 15, 2020 (last updated February 21, 2025)
An issue was discovered in DAViCal Andrew's Web Libraries (AWL) through 0.60. Session management does not use a sufficiently hard-to-guess session key. Anyone who can guess the microsecond time (and the incrementing session_id) can impersonate a session.
Attacker Value
Unknown

CVE-2020-8826

Disclosure Date: April 08, 2020 (last updated February 21, 2025)
As of v1.5.0, the Argo web interface authentication system issued immutable tokens. Authentication tokens, once issued, were usable forever without expiration—there was no refresh or forced re-authentication.
Attacker Value
Unknown

CVE-2020-5550

Disclosure Date: April 08, 2020 (last updated February 21, 2025)
Session fixation vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier allows remote attackers to impersonate a registered user and log in the management console, that may result in information alteration/disclosure via unspecified vectors.
Attacker Value
Unknown

CVE-2020-4291

Disclosure Date: April 07, 2020 (last updated February 21, 2025)
IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, and 1.0.5 could disclose sensitive information to an unauthorized user due to insufficient timeout functionality in the Web UI. IBM X-Force ID: 176334.
Attacker Value
Unknown

CVE-2020-5290

Disclosure Date: April 01, 2020 (last updated February 21, 2025)
In RedpwnCTF before version 2.3, there is a session fixation vulnerability in exploitable through the `#token=$ssid` hash when making a request to the `/verify` endpoint. An attacker team could potentially steal flags by, for example, exploiting a stored XSS payload in a CTF challenge so that victim teams who solve the challenge are unknowingly (and against their will) signed into the attacker team&#39;s account. Then, the attacker can gain points / value off the backs of the victims. This is patched in version 2.3.