3 results (0.008 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Directory Traversal vulnerability in Wyomind Help Desk Magento 2 extension v.1.3.6 and before fixed in v.1.3.7 allows attacker to execute arbitrary code via the file attachment directory setting. • https://www.exploit-db.com/exploits/50113 https://www.wyomind.com/magento2/helpdesk-magento-2.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

Cross Site Scripting Vulnerability in Wyomind Help Desk Magento 2 extension v.1.3.6 and before and fixed in v.1.3.7 allows attackers to escalte privileges via a crafted payload in the ticket message field. • https://www.exploit-db.com/exploits/50113 https://www.wyomind.com/magento2/helpdesk-magento-2.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

An issue in Wyomind Help Desk Magento 2 extension v.1.3.6 and before fixed in v.1.3.7 allows attacker to execute arbitrary code via a phar file upload in the ticket message field. • https://www.exploit-db.com/exploits/50113 https://www.wyomind.com/magento2/helpdesk-magento-2.html • CWE-434: Unrestricted Upload of File with Dangerous Type •