Description
A vulnerability had been discovered in WinNMP 19.02 consisting of an XSS attack via /tools/redis.php page in the k, hash, key and p parameters. This vulnerability could allow a remote user to submit a specially crafted JavaScript payload for an authenticated user to retrieve their session details.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
There is no reported solution at this time.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46627 | A vulnerability had been discovered in WinNMP 19.02 consisting of an XSS attack via /tools/redis.php page in the k, hash, key and p parameters. This vulnerability could allow a remote user to submit a specially crafted JavaScript payload for an authenticated user to retrieve their session details. |
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-08-01T21:11:12.613Z
Reserved: 2024-05-27T07:22:48.538Z
Link: CVE-2024-5405
Updated: 2024-08-01T21:11:12.613Z
Status : Deferred
Published: 2024-05-27T12:15:09.067
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-5405
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD