6 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

12 Oct 2024 — Zendesk before 2024-07-02 allows remote attackers to read ticket history via e-mail spoofing, because Cc fields are extracted from incoming e-mail messages and used to grant additional authorization for ticket viewing, the mechanism for detecting spoofed e-mail messages is insufficient, and the support e-mail addresses associated with individual tickets are predictable. • https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52 • CWE-290: Authentication Bypass by Spoofing •

CVSS: 8.8EPSS: 2%CPEs: 1EXPL: 0

20 Aug 2024 — Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385. • https://securitylab.github.com/advisories/GHSL-2023-136_Samson • CWE-502: Deserialization of Untrusted Data •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

18 Apr 2023 — Missing Authorization vulnerability in Zendesk Zendesk Support for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zendesk Support for WordPress: from n/a through 1.8.4. The Zendesk Support for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.4. This is due to missing nonce validation on an unknown function. This makes it possible for unauthenticated attackers to invoke the functions via a fo... • https://patchstack.com/database/wordpress/plugin/zendesk/vulnerability/wordpress-zendesk-support-for-wordpress-plugin-1-8-4-cross-site-request-forgery-csrf?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) CWE-862: Missing Authorization •

CVSS: 8.1EPSS: 23%CPEs: 3EXPL: 1

22 Dec 2021 — ENC DataVault before 7.2 and VaultAPI v67 mishandle key derivation, making it easier for attackers to determine the passwords of all DataVault users (across USB drives sold under multiple brand names). ENC DataVault antes de la versión 7.2 y VaultAPI v67 manejan mal la derivación de claves, lo que facilita a los atacantes determinar las contraseñas de todos los usuarios de DataVault (a través de las unidades USB vendidas bajo múltiples marcas) • https://github.com/mamba-4-ever/CVE-2021-36750 • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

26 Jul 2019 — Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by <!---->. and then the attacker's domain name. Samlr anterior a versión 2.6.2 de Zendesk, permite un ataque de comentario de nodos XML, tal y como un nodo name_id con user@example.com seguido por (!----), y luego el nombre de dominio del atacante. • https://github.com/zendesk/samlr/compare/v2.6.1...v2.6.2 • CWE-20: Improper Input Validation •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

11 Sep 2015 — Cross-site scripting (XSS) vulnerability in the Zendesk Feedback Tab module 7.x-1.x before 7.x-1.1 for Drupal allows remote administrators with the "Configure Zendesk Feedback Tab" permission to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en el módulo Zendesk Feedback Tab 7.x-1.x en versiones anteriores a 7.x-1.1 para Drupal, permite a administradores remotos con el permiso 'Configure Zendesk Feedback Tab' inyectar secuencias de comandos web o HTML arbitrarios a través... • https://www.drupal.org/node/2561887 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •