CVE-2006-5428 – Cerberus Helpdesk 3.2.1 - 'Rpc.php' Unauthorized Access
https://notcve.org/view.php?id=CVE-2006-5428
rpc.php in Cerberus Helpdesk 3.2.1 does not verify a client's privileges for a display_get_requesters operation, which allows remote attackers to bypass the GUI login and obtain sensitive information (ticket data) via a direct request. rpc.php en Cerberus Helpdesk 3.2.1 no verifica los privilegios de un cliente para una operación display_get_requesters, lo cual permite a un atacante remoto evitar la validación GUI y obtener información sensible (ticket data) a través de una respuesta directa. • https://www.exploit-db.com/exploits/28826 http://forum.cerberusweb.com/showthread.php?t=7922 http://secunia.com/advisories/22418 http://www.securityfocus.com/bid/20598 http://www.vupen.com/english/advisories/2006/4089 https://exchange.xforce.ibmcloud.com/vulnerabilities/29655 •
CVE-2006-4539
https://notcve.org/view.php?id=CVE-2006-4539
(1) includes/widgets/module_company_tickets.php and (2) includes/widgets/module_track_tickets.php Client Support Center in Cerberus Helpdesk 3.2 Build 317, and possibly earlier, allows remote attackers to bypass security restrictions and obtain sensitive information via the ticket parameter. NOTE: the provenance of this information is unknown; the details are obtained from third party information. (1) includes/widgets/module_company_tickets.php y(2) includes/widgets/module_track_tickets.php Client Support Center en Cerberus Helpdesk 3.2 Build 317, y posiblemente anteriores, permite a atacantes remotos evitar restricciones de seguridad y obtener información sensible a través del parámetro ticket. NOTA: el origen de esta información es desconocido; los detalles se obtuvieron de terceras fuentes de información. • http://cerberusweb.com/cvsweb.pl/support-center/cerberus-support-center/includes/widgets/module_company_tickets.php.diff?r1=1.6%3Br2=1.7%3Bf=h http://cerberusweb.com/cvsweb.pl/support-center/cerberus-support-center/includes/widgets/module_track_tickets.php.diff?r1=1.17%3Br2=1.18%3Bf=h http://forum.cerberusweb.com/showthread.php?t=7671 http://secunia.com/advisories/21706 http://securitytracker.com/id?1016976 http://www.osvdb.org/28317 http://www.securityfocus.com/bid/19797 http:/ •
CVE-2006-0509 – Cerberus Helpdesk 2.7 - 'Clients.php' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2006-0509
Multiple cross-site scripting (XSS) vulnerabilities in clients.php in Cerberus Helpdesk, possibly 2.7, allow remote attackers to inject arbitrary web script or HTML via (1) the contact_search parameter and (2) unspecified url fields. • https://www.exploit-db.com/exploits/27153 http://secunia.com/advisories/18657 http://securityreason.com/securityalert/391 http://www.osvdb.org/22843 http://www.securityfocus.com/archive/1/423547/30/0/threaded http://www.securityfocus.com/bid/16439 http://www.vupen.com/english/advisories/2006/0395 https://exchange.xforce.ibmcloud.com/vulnerabilities/24388 •
CVE-2005-4428
https://notcve.org/view.php?id=CVE-2005-4428
Cross-site scripting (XSS) vulnerability in index.php in Cerberus Helpdesk allows remote attackers to inject arbitrary web script or HTML via the kb_ask parameter. • http://marc.info/?l=full-disclosure&m=113500878630130&w=2 http://secunia.com/advisories/18112 http://www.osvdb.org/21989 http://www.securityfocus.com/archive/1/420271/100/0/threaded http://www.securityfocus.com/bid/16062 https://exchange.xforce.ibmcloud.com/vulnerabilities/23834 •
CVE-2005-4427 – Cerberus Helpdesk 2.649 - 'addresses_export.php?queues' SQL Injection
https://notcve.org/view.php?id=CVE-2005-4427
Multiple SQL injection vulnerabilities in Cerberus Helpdesk allow remote attackers to execute arbitrary SQL commands via the (1) file_id parameter to attachment_send.php, (2) the $addy variable in email_parser.php, (3) $address variable in email_parser.php, (4) $a_address variable in structs.php, (5) kbid parameter to cer_KnowledgebaseHandler.class.php, (6) queues[] parameter to addresses_export.php, (7) $thread variable to display.php, (8) ticket parameter to display_ticket_thread.php. • https://www.exploit-db.com/exploits/26974 https://www.exploit-db.com/exploits/26973 https://www.exploit-db.com/exploits/26975 http://forum.cerberusweb.com/showthread.php?s=&postid=30315 http://marc.info/?l=full-disclosure&m=113500878630130&w=2 http://secunia.com/advisories/18112 http://www.osvdb.org/21988 http://www.osvdb.org/21990 http://www.osvdb.org/21991 http://www.osvdb.org/21992 http://www.osvdb.org/21993 http://www.osvdb.org/21994 http:/ •