Description
A vulnerability had been discovered in WinNMP 19.02 consisting of an XSS attack via /tools/redis.php page in the k, hash, key and p parameters. This vulnerability could allow a remote user to submit a specially crafted JavaScript payload for an authenticated user to retrieve their session details.
Published: 2024-05-27
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

There is no reported solution at this time.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-46627 A vulnerability had been discovered in WinNMP 19.02 consisting of an XSS attack via /tools/redis.php page in the k, hash, key and p parameters. This vulnerability could allow a remote user to submit a specially crafted JavaScript payload for an authenticated user to retrieve their session details.
History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2024-08-01T21:11:12.613Z

Reserved: 2024-05-27T07:22:48.538Z

Link: CVE-2024-5405

cve-icon Vulnrichment

Updated: 2024-08-01T21:11:12.613Z

cve-icon NVD

Status : Deferred

Published: 2024-05-27T12:15:09.067

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-5405

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses