Skip to content
Threat Feed

Tag

Session Hijacking

8 briefs RSS
critical advisory

Multiple Vulnerabilities in Spring Boot Allow Authorization Bypass and Potential RCE

Multiple vulnerabilities in Spring Boot, including CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972, can allow attackers to bypass authorization, hijack sessions, or achieve remote code execution, potentially leading to data breaches and system compromise.

Spring Boot spring-boot vulnerability rce authentication-bypass session-hijacking
2r 3t 3c
critical advisory

Multiple Vulnerabilities in n8n Workflow Automation Tool

Multiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.

n8n vulnerability sqli xss rce session-hijacking
3r 5t 1c
high advisory

Auth0-PHP SDK Cookie Forging Vulnerability (CVE-2026-34236)

Auth0-PHP SDK versions 8.0.0 to before 8.19.0 encrypt cookies with insufficient entropy, potentially allowing attackers to brute-force the encryption key and forge session cookies.

cve-2026-34236 auth0 php cookie-forging session-hijacking
2r 1t 1c
critical threat

Critical Vulnerabilities in NetScaler ADC and Gateway Allow Sensitive Data Exposure and Session Hijacking

Unauthenticated attackers can exploit CVE-2026-3055 (out-of-bounds read) to exfiltrate sensitive data from NetScaler ADC and Gateway, while CVE-2026-4368 (race condition) enables user session hijacking, necessitating immediate patching and enhanced monitoring.

exploited netscaler cve-2026-3055 cve-2026-4368 out-of-bounds read race condition memory corruption session hijacking
2r 1t 2c
high advisory

Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.

jboss undertow denial-of-service cache-poisoning session-hijacking webserver
2r 3t
high advisory

Checkmk Vulnerability Allows Session Hijacking

An authenticated remote attacker can exploit a vulnerability in Checkmk to bypass security measures, leading to session hijacking.

checkmk session-hijacking vulnerability
2r 1t
critical advisory

Citrix Systems NetScaler Vulnerabilities Allow Information Disclosure and Session Hijacking

An anonymous or authenticated remote attacker can exploit multiple vulnerabilities in Citrix Systems NetScaler to disclose information and take over a user session.

citrix netscaler vulnerability session-hijacking information-disclosure
2r 2t
medium advisory

Okta Session Hijacking via Multiple Device Token Hashes

Detection of multiple device token hashes and source IPs for a single Okta session, indicating potential session hijacking and unauthorized access to Okta resources.

okta session-hijacking credential-access
2r 2t