Filtered by CWE-384
Total 386 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-43398 1 Siemens 4 7kg9501-0aa01-2aa1, 7kg9501-0aa01-2aa1 Firmware, 7kg9501-0aa31-2aa1 and 1 more 2024-11-21 7.5 High
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user's account through the activated session.
CVE-2022-3916 1 Redhat 9 Enterprise Linux, Keycloak, Openshift Container Platform and 6 more 2024-11-21 6.8 Medium
A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.
CVE-2022-38369 1 Apache 1 Iotdb 2024-11-21 8.8 High
Apache IoTDB version 0.13.0 is vulnerable by session id attack. Users should upgrade to version 0.13.1 which addresses this issue.
CVE-2022-38054 1 Apache 1 Airflow 2024-11-21 9.8 Critical
In Apache Airflow versions 2.2.4 through 2.3.3, the `database` webserver session backend was susceptible to session fixation.
CVE-2022-34536 1 Dw 2 Megapix, Megapix Firmware 2024-11-21 7.5 High
Digital Watchdog DW MEGApix IP cameras A7.2.2_20211029 allows attackers to access the core log file and perform session hijacking via a crafted session token.
CVE-2022-34334 1 Ibm 1 Sterling Partner Engagement Manager 2024-11-21 6.5 Medium
IBM Sterling Partner Engagement Manager 2.0 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 229704.
CVE-2022-33927 1 Dell 1 Wyse Management Suite 2024-11-21 5.4 Medium
Dell Wyse Management Suite 3.6.1 and below contains a Session Fixation vulnerability. A unauthenticated attacker could exploit this by taking advantage of a user with multiple active sessions in order to hijack a user's session.
CVE-2022-31798 1 Nortekcontrol 2 Emerge E3, Emerge E3 Firmware 2024-11-21 6.1 Medium
Nortek Linear eMerge E3-Series 0.32-07p devices are vulnerable to /card_scan.php?CardFormatNo= XSS with session fixation (via PHPSESSID) when they are chained together. This would allow an attacker to take over an admin account or a user account.
CVE-2022-2997 1 Snipeitapp 1 Snipe-it 2024-11-21 8.0 High
Session Fixation in GitHub repository snipe/snipe-it prior to 6.0.10.
CVE-2022-2820 1 Namelessmc 1 Nameless 2024-11-21 7 High
Session Fixation in GitHub repository namelessmc/nameless prior to v2.0.2.
CVE-2022-27305 1 Gibbonedu 1 Gibbon 2024-11-21 8.8 High
Gibbon v23 does not generate a new session ID cookie after a user authenticates, making the application vulnerable to session fixation.
CVE-2022-26591 1 Fantec 2 Mwid25-ds, Mwid25-ds Firmware 2024-11-21 7.5 High
FANTEC GmbH MWiD25-DS Firmware v2.000.030 allows unauthenticated attackers to access and download arbitrary files via a crafted GET request.
CVE-2022-25896 2 Passport Project, Redhat 2 Passport, Acm 2024-11-21 4.8 Medium
This affects the package passport before 0.6.0. When a user logs in or logs out, the session is regenerated instead of being closed.
CVE-2022-24444 1 Silverstripe 1 Silverstripe 2024-11-21 6.5 Medium
Silverstripe silverstripe/framework through 4.10 allows Session Fixation.
CVE-2022-22681 1 Synology 1 Photo Station 2024-11-21 8.1 High
Session fixation vulnerability in access control management in Synology Photo Station before 6.8.16-3506 allows remote attackers to bypass security constraint via unspecified vectors.
CVE-2022-22551 1 Dell 1 Emc Appsync 2024-11-21 8.3 High
DELL EMC AppSync versions 3.9 to 4.3 use GET request method with sensitive query strings. An Adjacent, unauthenticated attacker could potentially exploit this vulnerability, and hijack the victim session.
CVE-2022-1849 1 Filegator 1 Filegator 2024-11-21 5.4 Medium
Session Fixation in GitHub repository filegator/filegator prior to 7.8.0.
CVE-2021-42761 1 Fortinet 1 Fortiweb 2024-11-21 8.5 High
A condition for session fixation vulnerability [CWE-384] in the session management of FortiWeb versions 6.4 all versions, 6.3.0 through 6.3.16, 6.2.0 through 6.2.6, 6.1.0 through 6.1.2, 6.0.0 through 6.0.7, 5.9.0 through 5.9.1 may allow a remote, unauthenticated attacker to infer the session identifier of other users and possibly usurp their session.
CVE-2021-42073 1 Barrier Project 1 Barrier 2024-11-21 8.2 High
An issue was discovered in Barrier before 2.4.0. An attacker can enter an active session state with the barriers component (aka the server-side implementation of Barrier) simply by supplying a client label that identifies a valid client configuration. This label is "Unnamed" by default but could instead be guessed from hostnames or other publicly available information. In the active session state, an attacker can capture input device events from the server, and also modify the clipboard content on the server.
CVE-2021-41553 1 Archibus 1 Web Central 2024-11-21 9.8 Critical
In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), the Web Application in /archibus/login.axvw assign a session token that could be already in use by another user. It was therefore possible to access the application through a user whose credentials were not known, without any attempt by the testers to modify the application logic. It is also possible to set the value of the session token, client-side, simply by making an unauthenticated GET Request to the Home Page and adding an arbitrary value to the JSESSIONID field. The application, following the login, does not assign a new token, continuing to keep the inserted one, as the identifier of the entire session. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020