Логотип exploitDog
bind:CVE-2018-1127
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1127

Количество 3

Количество 3

redhat логотип

CVE-2018-1127

почти 8 лет назад

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

CVSS3: 4.2
EPSS: Низкий
nvd логотип

CVE-2018-1127

больше 7 лет назад

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

CVSS3: 4.2
EPSS: Низкий
github логотип

GHSA-jwq3-h8rx-wcwj

больше 3 лет назад

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2018-1127

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

CVSS3: 4.2
0%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-1127

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

CVSS3: 4.2
0%
Низкий
больше 7 лет назад
github логотип
GHSA-jwq3-h8rx-wcwj

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

CVSS3: 8.1
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу