| ID |
CVE-2026-5507
|
| Sažetak |
When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs. |
| Reference |
|
| CVSS |
| Base: | 4.0 |
| Impact: | 3.6 |
| Exploitability: | 0.3 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
HIGH |
HIGH |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| NONE |
NONE |
HIGH |
|
| CVSS vektor |
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H |
| Zadnje važnije ažuriranje |
29-04-2026 - 14:05 |
| Objavljeno |
09-04-2026 - 23:17 |