7.2 High
AI Score
Confidence
Low
0.003 Low
EPSS
Percentile
71.7%
Session fixation vulnerability in WikyBlog 1.7.3 rc2 allows remote attackers to hijack web sessions by setting the jsessionid parameter to (1) index.php/Comment/Main, (2) index.php/Comment/Main/Home_Wiky, or (3) index.php/Edit/Main.
packetstormsecurity.org/1002-exploits/wikyblog-rfishellxss.txt
www.securityfocus.com/bid/38386
exchange.xforce.ibmcloud.com/vulnerabilities/56594
www.exploit-db.com/exploits/11560