4 results (0.003 seconds)

CVSS: 4.3EPSS: %CPEs: 1EXPL: 0

The Zendesk Support for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.4. This is due to missing nonce validation on an unknown function. This makes it possible for unauthenticated attackers to invoke the functions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.1EPSS: 0%CPEs: 3EXPL: 0

ENC DataVault before 7.2 and VaultAPI v67 mishandle key derivation, making it easier for attackers to determine the passwords of all DataVault users (across USB drives sold under multiple brand names). ENC DataVault antes de la versión 7.2 y VaultAPI v67 manejan mal la derivación de claves, lo que facilita a los atacantes determinar las contraseñas de todos los usuarios de DataVault (a través de las unidades USB vendidas bajo múltiples marcas) • https://encsecurity.zendesk.com/hc/en-us/articles/4413283717265-Update-for-ENC-Software https://pretalx.c3voc.de/rc3-2021-r3s/talk/QMYGR3 https://www.encsecurity.com/solutions.php https://www.westerndigital.com/en-ap/support/product-security/wdc-21014-sandisk-secureaccess-software-update • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by <!---->. and then the attacker's domain name. Samlr anterior a versión 2.6.2 de Zendesk, permite un ataque de comentario de nodos XML, tal y como un nodo name_id con user@example.com seguido por (!----), y luego el nombre de dominio del atacante. • https://github.com/zendesk/samlr/compare/v2.6.1...v2.6.2 • CWE-20: Improper Input Validation •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the Zendesk Feedback Tab module 7.x-1.x before 7.x-1.1 for Drupal allows remote administrators with the "Configure Zendesk Feedback Tab" permission to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en el módulo Zendesk Feedback Tab 7.x-1.x en versiones anteriores a 7.x-1.1 para Drupal, permite a administradores remotos con el permiso 'Configure Zendesk Feedback Tab' inyectar secuencias de comandos web o HTML arbitrarios a través de vectores no especificados. • https://www.drupal.org/node/2561887 https://www.drupal.org/node/2561893 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •