Filtered by CWE-613
Total 301 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-31408 1 Vaadin 2 Flow, Vaadin 2021-05-04 7.1 High
Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.
CVE-2019-3867 1 Redhat 1 Quay 2021-03-25 4.1 Medium
A vulnerability was found in the Quay web application. Sessions in the Quay web application never expire. An attacker, able to gain access to a session, could use it to control or delete a user's container repository. Red Hat Quay 2 and 3 are vulnerable to this issue.
CVE-2021-26921 1 Linuxfoundation 1 Argo Continuous Delivery 2021-03-22 6.5 Medium
In util/session/sessionmanager.go in Argo CD before 1.8.4, tokens continue to work even when the user account is disabled.
CVE-2020-35358 1 Domainmod 1 Domainmod 2021-03-18 9.8 Critical
DomainMOD domainmod-v4.15.0 is affected by an insufficient session expiration vulnerability. On changing a password, both sessions using the changed password and old sessions in any other browser or device do not expire and remain active. Such flaws frequently give attackers unauthorized access to some system data or functionality.
CVE-2021-3311 1 Octobercms 1 October 2021-03-15 9.8 Critical
An issue was discovered in October through build 471. It reactivates an old session ID (which had been invalid after a logout) once a new login occurs. NOTE: this violates the intended Auth/Manager.php authentication behavior but, admittedly, is only relevant if an old session ID is known to an attacker.
CVE-2009-20001 1 Mantisbt 1 Mantisbt 2021-03-11 8.1 High
An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user's cookie to login as them.
CVE-2020-4995 1 Ibm 1 Security Identity Governance And Intelligence 2021-02-11 5.3 Medium
IBM Security Identity Governance and Intelligence 5.2.6 does not invalidate session after logout which could allow a user to obtain sensitive information from another users' session. IBM X-Force ID: 192912.
CVE-2020-6649 1 Fortinet 1 Fortiisolator 2021-02-10 9.8 Critical
An insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
CVE-2020-14247 1 Hcltechsw 1 Onetest Performance 2021-02-09 6.5 Medium
HCL OneTest Performance V9.5, V10.0, V10.1 contains an inadequate session timeout, which could allow an attacker time to guess and use a valid session ID.
CVE-2021-3183 1 Files 1 Fat Client 2021-01-27 7.5 High
Files.com Fat Client 3.3.6 allows authentication bypass because the client continues to have access after a logout and a removal of a login profile.
CVE-2020-15218 1 Combodo 1 Itop 2021-01-15 6.8 Medium
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, admin pages are cached, so that their content is visible after deconnection by using the browser back button. This is fixed in versions 2.7.2 and 3.0.0.
CVE-2020-15220 1 Combodo 1 Itop 2021-01-15 6.1 Medium
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, two cookies are created for the same session, which leads to a possibility to steal user session. This is fixed in versions 2.7.2 and 3.0.0.
CVE-2016-20007 1 Rest\/json Project 1 Rest\/json 2021-01-07 7.5 High
The REST/JSON project 7.x-1.x for Drupal allows session name guessing, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.
CVE-2020-29667 1 Lanatmservice 1 M3 Atm Monitoring System 2020-12-14 9.8 Critical
In Lan ATMService M3 ATM Monitoring System 6.1.0, a remote attacker able to use a default cookie value, such as PHPSESSID=LANIT-IMANAGER, can achieve control over the system because of Insufficient Session Expiration.
CVE-2020-27422 1 Anuko 1 Time Tracker 2020-11-30 9.8 Critical
In Anuko Time Tracker v1.19.23.5311, the password reset link emailed to the user doesn't expire once used, allowing an attacker to use the same link to takeover the account.
CVE-2020-23136 1 Microweber 1 Microweber 2020-11-20 5.5 Medium
Microweber v1.1.18 is affected by no session expiry after log-out.
CVE-2020-23140 1 Microweber 1 Microweber 2020-11-20 8.1 High
Microweber 1.1.18 is affected by insufficient session expiration. When changing passwords, both sessions for when a user changes email and old sessions in any other browser or device, the session does not expire and remains active.
CVE-2020-15950 1 Immuta 1 Immuta 2020-11-12 8.8 High
Immuta v2.8.2 is affected by improper session management: user sessions are not revoked upon logout.
CVE-2016-11014 1 Netgear 2 Jnr1010, Jnr1010 Firmware 2020-11-10 9.8 Critical
NETGEAR JNR1010 devices before 1.0.0.32 have Incorrect Access Control because the ok value of the auth cookie is a special case.
CVE-2020-27739 1 Citadel 1 Webcit 2020-11-04 9.8 Critical
A Weak Session Management vulnerability in Citadel WebCit through 926 allows unauthenticated remote attackers to hijack recently logged-in users' sessions. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread.