Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-62cp-m7mw-jrpc

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Virtual War (aka VWar) 1.6.1 R2 uses static session cookies that depend only on a user's password, which makes it easier for remote attackers to bypass timeout and logout actions, and retain access for a long period of time, by leveraging knowledge of a session cookie.

Virtual War (aka VWar) 1.6.1 R2 uses static session cookies that depend only on a user's password, which makes it easier for remote attackers to bypass timeout and logout actions, and retain access for a long period of time, by leveraging knowledge of a session cookie.

EPSS

Процентиль: 45%
0.00225
Низкий

Связанные уязвимости

nvd
больше 13 лет назад

Virtual War (aka VWar) 1.6.1 R2 uses static session cookies that depend only on a user's password, which makes it easier for remote attackers to bypass timeout and logout actions, and retain access for a long period of time, by leveraging knowledge of a session cookie.

EPSS

Процентиль: 45%
0.00225
Низкий