CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
90.7%
ajaxterm.js in AjaxTerm 0.10 and earlier generates session IDs with predictable random numbers based on certain JavaScript functions, which makes it easier for remote attackers to (1) hijack a session or (2) cause a denial of service (session ID exhaustion) via a brute-force attack.
Vendor | Product | Version | CPE |
---|---|---|---|
antony_lesuisse | ajaxterm | * | cpe:2.3:a:antony_lesuisse:ajaxterm:*:*:*:*:*:*:*:* |
antony_lesuisse | ajaxterm | 0.6 | cpe:2.3:a:antony_lesuisse:ajaxterm:0.6:*:*:*:*:*:*:* |
antony_lesuisse | ajaxterm | 0.7 | cpe:2.3:a:antony_lesuisse:ajaxterm:0.7:*:*:*:*:*:*:* |
antony_lesuisse | ajaxterm | 0.8 | cpe:2.3:a:antony_lesuisse:ajaxterm:0.8:*:*:*:*:*:*:* |
antony_lesuisse | ajaxterm | 0.9 | cpe:2.3:a:antony_lesuisse:ajaxterm:0.9:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2010-December/052655.html
secunia.com/advisories/42784
www.ocert.org/advisories/ocert-2009-004.html
www.openwall.com/lists/oss-security/2009/05/11/1
www.securityfocus.com/archive/1/503421/100/0/threaded
www.securityfocus.com/bid/34903
exchange.xforce.ibmcloud.com/vulnerabilities/50464