CVE-2008-5809
02.01.2009, 18:11
futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id.Enginsight
Vendor | Product | Version |
---|---|---|
futomi | access_analyzer_cgi | 𝑥 ≤ 4.0.1 |
futomi | access_analyzer_cgi | 1.0 |
futomi | access_analyzer_cgi | 1.1 |
futomi | access_analyzer_cgi | 1.1 |
futomi | access_analyzer_cgi | 1.2 |
futomi | access_analyzer_cgi | 1.2 |
futomi | access_analyzer_cgi | 1.3 |
futomi | access_analyzer_cgi | 1.3 |
futomi | access_analyzer_cgi | 1.4 |
futomi | access_analyzer_cgi | 1.4 |
futomi | access_analyzer_cgi | 1.5 |
futomi | access_analyzer_cgi | 1.6 |
futomi | access_analyzer_cgi | 1.7 |
futomi | access_analyzer_cgi | 2.0 |
futomi | access_analyzer_cgi | 2.0 |
futomi | access_analyzer_cgi | 2.1 |
futomi | access_analyzer_cgi | 2.1 |
futomi | access_analyzer_cgi | 2.2 |
futomi | access_analyzer_cgi | 2.2 |
futomi | access_analyzer_cgi | 2.3 |
futomi | access_analyzer_cgi | 2.3 |
futomi | access_analyzer_cgi | 2.4 |
futomi | access_analyzer_cgi | 2.4 |
futomi | access_analyzer_cgi | 3.0 |
futomi | access_analyzer_cgi | 3.0 |
futomi | access_analyzer_cgi | 3.1 |
futomi | access_analyzer_cgi | 3.1 |
futomi | access_analyzer_cgi | 3.2 |
futomi | access_analyzer_cgi | 3.2 |
futomi | access_analyzer_cgi | 3.3 |
futomi | access_analyzer_cgi | 3.3 |
futomi | access_analyzer_cgi | 3.4 |
futomi | access_analyzer_cgi | 3.4 |
futomi | access_analyzer_cgi | 3.5 |
futomi | access_analyzer_cgi | 3.5 |
futomi | access_analyzer_cgi | 3.6 |
futomi | access_analyzer_cgi | 3.7 |
futomi | access_analyzer_cgi | 3.8 |
futomi | access_analyzer_cgi | 3.8.1 |
futomi | access_analyzer_cgi | 4.0 |
futomi | access_analyzer_cgi | 4.0.0 |
futomi | access_analyzer_cgi | 4.1 |
futomi | access_analyzer_cgi | 4.2 |
futomi | access_analyzer_cgi | 4.3 |
futomi | access_analyzer_cgi | 4.4 |
futomi | access_analyzer_cgi | 4.5 |
futomi | access_analyzer_cgi | 4.6 |
futomi | access_analyzer_cgi | 4.7 |
futomi | access_analyzer_cgi | 4.8 |
futomi | access_analyzer_cgi | 4.9 |
futomi | access_analyzer_cgi | 4.10 |
futomi | access_analyzer_cgi | 4.10.1 |
futomi | access_analyzer_cgi | 4.10.2 |
futomi | access_analyzer_cgi | 4.10.3 |
futomi | access_analyzer_cgi | 4.10.4 |
futomi | access_analyzer_cgi | 4.10.5 |
futomi | access_analyzer_cgi | 4.11.0 |
futomi | access_analyzer_cgi | 4.11.1 |
futomi | access_analyzer_cgi | 4.11.2 |
futomi | access_analyzer_cgi | 4.11.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References