Vulnerabilities > Insufficient Session Expiration
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-02-11 | CVE-2022-34392 | Insufficient Session Expiration vulnerability in Dell Supportassist for Home PCS SupportAssist for Home PCs (versions 3.11.4 and prior) contain an insufficient session expiration Vulnerability. | 5.5 |
2023-02-11 | CVE-2023-25562 | Insufficient Session Expiration vulnerability in Datahub Project Datahub DataHub is an open-source metadata platform. | 9.8 |
2023-01-26 | CVE-2023-23614 | Insufficient Session Expiration vulnerability in Pi-Hole web Interface Pi-hole®'s Web interface (based off of AdminLTE) provides a central location to manage your Pi-hole. | 8.8 |
2023-01-26 | CVE-2023-24426 | Insufficient Session Expiration vulnerability in Jenkins Azure AD Jenkins Azure AD Plugin 303.va_91ef20ee49f and earlier does not invalidate the previous session on login. | 8.8 |
2023-01-17 | CVE-2023-22732 | Insufficient Session Expiration vulnerability in Shopware Shopware is an open source commerce platform based on Symfony Framework and Vue js. | 9.8 |
2023-01-12 | CVE-2023-0227 | Insufficient Session Expiration vulnerability in Pyload Insufficient Session Expiration in GitHub repository pyload/pyload prior to 0.5.0b3.dev36. | 6.5 |
2023-01-11 | CVE-2023-22492 | Insufficient Session Expiration vulnerability in Zitadel ZITADEL is a combination of Auth0 and Keycloak. | 5.9 |
2023-01-05 | CVE-2022-46177 | Insufficient Session Expiration vulnerability in Discourse Discourse is an option source discussion platform. | 8.1 |
2023-01-05 | CVE-2022-43844 | Insufficient Session Expiration vulnerability in IBM Robotic Process Automation for Cloud PAK IBM Robotic Process Automation for Cloud Pak 20.12 through 21.0.3 is vulnerable to broken access control. | 8.8 |
2023-01-05 | CVE-2022-22371 | Insufficient Session Expiration vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. | 6.5 |