
CVE-2024-49193
https://notcve.org/view.php?id=CVE-2024-49193
12 Oct 2024 — Zendesk before 2024-07-02 allows remote attackers to read ticket history via e-mail spoofing, because Cc fields are extracted from incoming e-mail messages and used to grant additional authorization for ticket viewing, the mechanism for detecting spoofed e-mail messages is insufficient, and the support e-mail addresses associated with individual tickets are predictable. • https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52 • CWE-290: Authentication Bypass by Spoofing •

CVE-2024-42363 – GHSL-2023-136_Samson
https://notcve.org/view.php?id=CVE-2024-42363
20 Aug 2024 — Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385. • https://securitylab.github.com/advisories/GHSL-2023-136_Samson • CWE-502: Deserialization of Untrusted Data •

CVE-2023-23716 – WordPress Zendesk Support for WordPress plugin <= 1.8.4 - Broken Access Control vulnerability
https://notcve.org/view.php?id=CVE-2023-23716
18 Apr 2023 — Missing Authorization vulnerability in Zendesk Zendesk Support for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zendesk Support for WordPress: from n/a through 1.8.4. The Zendesk Support for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.4. This is due to missing nonce validation on an unknown function. This makes it possible for unauthenticated attackers to invoke the functions via a fo... • https://patchstack.com/database/wordpress/plugin/zendesk/vulnerability/wordpress-zendesk-support-for-wordpress-plugin-1-8-4-cross-site-request-forgery-csrf?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) CWE-862: Missing Authorization •

CVE-2021-36750
https://notcve.org/view.php?id=CVE-2021-36750
22 Dec 2021 — ENC DataVault before 7.2 and VaultAPI v67 mishandle key derivation, making it easier for attackers to determine the passwords of all DataVault users (across USB drives sold under multiple brand names). ENC DataVault antes de la versión 7.2 y VaultAPI v67 manejan mal la derivación de claves, lo que facilita a los atacantes determinar las contraseñas de todos los usuarios de DataVault (a través de las unidades USB vendidas bajo múltiples marcas) • https://github.com/mamba-4-ever/CVE-2021-36750 • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVE-2018-20857
https://notcve.org/view.php?id=CVE-2018-20857
26 Jul 2019 — Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by <!---->. and then the attacker's domain name. Samlr anterior a versión 2.6.2 de Zendesk, permite un ataque de comentario de nodos XML, tal y como un nodo name_id con user@example.com seguido por (!----), y luego el nombre de dominio del atacante. • https://github.com/zendesk/samlr/compare/v2.6.1...v2.6.2 • CWE-20: Improper Input Validation •

CVE-2015-6921
https://notcve.org/view.php?id=CVE-2015-6921
11 Sep 2015 — Cross-site scripting (XSS) vulnerability in the Zendesk Feedback Tab module 7.x-1.x before 7.x-1.1 for Drupal allows remote administrators with the "Configure Zendesk Feedback Tab" permission to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en el módulo Zendesk Feedback Tab 7.x-1.x en versiones anteriores a 7.x-1.1 para Drupal, permite a administradores remotos con el permiso 'Configure Zendesk Feedback Tab' inyectar secuencias de comandos web o HTML arbitrarios a través... • https://www.drupal.org/node/2561887 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •