Description
mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these session ID's are used for authentication.
Remediation
References
Related Vulnerabilities
WordPress Plugin YOP Poll Cross-Site Scripting (5.7.3)
Oracle Database Server CVE-2014-4299 Vulnerability (CVE-2014-4299)
WordPress Plugin Login/Signup Popup (Inline Form + Woocommerce) Security Bypass (2.7.2)
Oracle JRE CVE-2013-2417 Vulnerability (CVE-2013-2417)
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2021-23841)