Vulnerability Details : CVE-2010-5067
Virtual War (aka VWar) 1.6.1 R2 uses static session cookies that depend only on a user's password, which makes it easier for remote attackers to bypass timeout and logout actions, and retain access for a long period of time, by leveraging knowledge of a session cookie.
Exploit prediction scoring system (EPSS) score for CVE-2010-5067
Probability of exploitation activity in the next 30 days: 0.45%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 75 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-5067
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2010-5067
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-5067
-
http://seclists.org/fulldisclosure/2010/Aug/235
Full Disclosure: VWar 1.6.1 R2 Multiple Remote VulnerabilitiesExploit
-
http://dmcdonald.net/vwar.txt
Exploit
Products affected by CVE-2010-5067
- cpe:2.3:a:vwar:virtual_war:1.6.1:r2:*:*:*:*:*:*