2 results (0.003 seconds)

CVSS: 7.2EPSS: 1%CPEs: 1EXPL: 2

09 Aug 2019 — Jitbit Helpdesk before 9.0.3 allows remote attackers to escalate privileges because of mishandling of the User/AutoLogin userHash parameter. By inspecting the token value provided in a password reset link, a user can leverage a weak PRNG to recover the shared secret used by the server for remote authentication. The shared secret can be used to escalate privileges by forging new tokens for any user. These tokens can be used to automatically log in as the affected user. Jitbit Helpdesk en versiones anteriores... • https://github.com/Kc57/JitBit_Helpdesk_Auth_Bypass • CWE-332: Insufficient Entropy in PRNG •

CVSS: 6.8EPSS: 0%CPEs: 13EXPL: 1

07 Dec 2006 — Cross-site scripting (XSS) vulnerability in includes/elements/spellcheck/spellwin.php in Cerberus Helpdesk 0.97.3, 2.0 through 2.7, 3.2.1, and 3.3 allows remote attackers to inject arbitrary web script or HTML via the js parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en includes/elements/spellcheck/spellwin.php de Cerberus Helpdesk 0.97.3, 2.0 hasta 2.7, 3.2.1, y 3... • https://www.exploit-db.com/exploits/29222 •