WhisperX tag archive

#session hijacking

This page collects WhisperX intelligence signals tagged #session hijacking. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (9)

The Lab · 2026-03-25 18:27:32 · GitHub Issues

1. Critical API Flaw Exposes Full Game Vote History and Session IDs Without Authentication

A critical security vulnerability has been discovered in a game server's API, exposing the complete historical dataset of player votes, scores, and session identifiers to anyone on the internet. The `/api/export/votes.csv` endpoint lacks any form of authentication, allowing uncredentialed access to download the entire ...

The Lab · 2026-03-27 10:27:11 · GitHub Issues

2. Security Gap: Insecure VNC Command in Official Docs, Default Setting Allows Session Hijacking

A recent security gap analysis has uncovered two low-severity but critical configuration flaws in a VNC (Virtual Network Computing) setup. The first is an insecure command example present in official troubleshooting documentation, which would reintroduce a known vulnerability if followed. The second is a default templa...

The Lab · 2026-04-02 23:27:03 · GitHub Issues

3. CVE-2024-47764: Medium-Severity Cookie Parsing Flaw Exposes Node.js Servers to Session Manipulation

A newly disclosed vulnerability in a foundational Node.js library opens a path for attackers to manipulate cookie data and potentially hijack user sessions. The flaw, tracked as CVE-2024-47764 and rated medium severity, resides in the widely used `cookie` library, specifically version 0.1.3. This library is a core comp...

The Lab · 2026-04-03 23:26:57 · GitHub Issues

4. LAN Hijack Vulnerability in Discovery Pairing: Attacker Could Steal Admin Secrets via Forged Requests

A critical security flaw in a discovery pairing mechanism allowed an attacker on the same local network to hijack pending requests and redirect sensitive shared secrets to a malicious endpoint. The vulnerability, classified as a P1-level issue, resided in the `createPairRequest()` function, which deduplicated pending r...

The Lab · 2026-04-21 18:22:54 · GitHub Issues

5. Security Alert: Hardcoded Flask Secret Key Exposes 'vulnerable-app' to Session Hijacking

A critical security vulnerability has been identified in a Flask application, exposing it to potential session hijacking and user impersonation attacks. The application's secret key, used for cryptographically signing session cookies, is hardcoded directly into the source code file `app.py` on line 20. This fundamental...

The Lab · 2026-04-23 18:54:16 · GitHub Issues

6. Hono Framework Cookie Prefix Bypass: Parsing Gap Enables Attacker Override of Legitimate Cookies

A parsing discrepancy in Hono, a web application framework supporting multiple JavaScript runtimes, allows cookie prefix protections to be bypassed through non-breaking space character injection. Versions prior to 4.12.12 contain a flaw where cookie names treated as distinct by browsers are normalized to the same key b...

The Lab · 2026-04-30 08:54:12 · GitHub Issues

7. Stored XSS Vulnerability in Apache Superset Chart Metadata Allows Session Hijacking Before Version 5.0.0

A stored Cross-Site Scripting (XSS) vulnerability has been identified in Apache Superset's chart visualization component. The flaw allows an authenticated user with chart edit permissions to inject malicious code into column labels, which the application fails to sanitize before rendering. When other users interact wit...

The Lab · 2026-05-07 17:31:41 · GitHub Issues

8. Critical Authorization Gap in Gateway Enables Cross-User Session Hijacking

A critical security flaw has been identified in the WebSocket gateway module responsible for session reconnection handling. The vulnerability exists in `internal/gateway/conn.go`, which manages the AEP init handshake for WebSocket connections. During session reconnection, when a client provides an existing `session_id`...

The Lab · 2026-05-11 09:40:30 · Mastodon:mastodon.social:#infosec

9. CVE-2026-5084: WebDyne::Session ≤2.075 Flaw Generates Predictable Session IDs via MD5 and rand(), Enabling Hijacking

A high-severity vulnerability has been identified in WebDyne::Session versions up to and including 2.075, potentially exposing web applications to session hijacking attacks. The flaw, tracked as CVE-2026-5084, stems from the module's use of cryptographically weak session ID generation. Specifically, the software relies...