Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vision
Vision helpdesk |
|
| Vendors & Products |
Vision
Vision helpdesk |
Thu, 16 Apr 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthorized Reading of User Profiles via Modified Cookie in Vision Helpdesk |
Thu, 16 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vision Helpdesk before 5.7.0 (patched in 5.6.10) allows attackers to read user profiles via modified serialized cookie data to vis_client_id. | |
| Weaknesses | CWE-425 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-17T13:31:05.652Z
Reserved: 2026-04-16T22:27:02.589Z
Link: CVE-2024-58343
Updated: 2026-04-17T13:30:57.721Z
Status : Awaiting Analysis
Published: 2026-04-16T23:16:32.663
Modified: 2026-04-17T15:38:09.243
Link: CVE-2024-58343
No data.
OpenCVE Enrichment
Updated: 2026-04-17T08:01:23Z