SQL injection vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the rows parameter of the jsonGrid route and extract all the information stored in the application.
Max CVSS
9.8
EPSS Score
0.06%
Published
2023-10-04
Updated
2023-10-05
Improper authorization vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to access the platform without authentication and retrieve personal data via the jsonGrid parameter.
Max CVSS
8.6
EPSS Score
0.10%
Published
2023-10-04
Updated
2023-10-05
HelpDEZk 1.1.1 allows remote authenticated users to execute arbitrary PHP code by uploading a .php attachment and then requesting it in the helpdezk\app\uploads\helpdezk\attachments\ directory.
Max CVSS
8.8
EPSS Score
0.17%
Published
2017-09-05
Updated
2017-09-06
HelpDEZk 1.1.1 has SQL Injection in app\modules\admin\controllers\loginController.php via the admin/login/getWarningInfo/id/ PATH_INFO, related to the selectWarning function.
Max CVSS
9.8
EPSS Score
0.15%
Published
2017-09-05
Updated
2017-09-06
HelpDEZk 1.1.1 has CSRF in admin/home#/logos/ with an impact of remote execution of arbitrary PHP code.
Max CVSS
8.8
EPSS Score
1.49%
Published
2017-04-05
Updated
2017-08-16
HelpDEZk 1.1.1 has CSRF in admin/home#/person/ with an impact of obtaining admin privileges.
Max CVSS
8.8
EPSS Score
0.23%
Published
2017-04-05
Updated
2017-08-16
Unrestricted file upload vulnerability in includes/classes/uploadify-v2.1.4/uploadify.php in HelpDEZk 1.0.1 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the directory specified by the folder parameter.
Max CVSS
9.8
EPSS Score
7.93%
Published
2020-01-03
Updated
2020-01-15
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!