Show filters
71 Total Results
Displaying 51-60 of 71
Sort by:
Attacker Value
Unknown
CVE-2020-26035
Disclosure Date: December 28, 2020 (last updated February 22, 2025)
An issue was discovered in Zammad before 3.4.1. There is Stored XSS via a Tags element in a TIcket.
0
Attacker Value
Unknown
CVE-2020-26028
Disclosure Date: December 28, 2020 (last updated February 22, 2025)
An issue was discovered in Zammad before 3.4.1. Admin Users without a ticket.* permission can access Tickets.
0
Attacker Value
Unknown
CVE-2020-14214
Disclosure Date: June 16, 2020 (last updated February 21, 2025)
Zammad before 3.3.1, when Domain Based Assignment is enabled, relies on a claimed e-mail address for authorization decisions. An attacker can register a new account that will have access to all tickets of an arbitrary Organization.
0
Attacker Value
Unknown
CVE-2020-14213
Disclosure Date: June 16, 2020 (last updated February 21, 2025)
In Zammad before 3.3.1, a Customer has ticket access that should only be available to an Agent (e.g., read internal data, split, or merge).
0
Attacker Value
Unknown
CVE-2020-10100
Disclosure Date: March 05, 2020 (last updated November 27, 2024)
An issue was discovered in Zammad 3.0 through 3.2. It allows for users to view ticket customer details associated with specific customers. However, the application does not properly implement access controls related to this functionality. As such, users of one company are able to access ticket data from other companies. Due to the multi-tenant nature of this application, users who can access ticket details from one organization to the next allows for users to exfiltrate potentially sensitive data of other companies.
0
Attacker Value
Unknown
CVE-2020-10103
Disclosure Date: March 05, 2020 (last updated February 21, 2025)
An XSS issue was discovered in Zammad 3.0 through 3.2. Malicious code can be provided by a low-privileged user through the File Upload functionality in Zammad. The malicious JavaScript will execute within the browser of any user who opens a specially crafted link to the uploaded file with an active Zammad session.
0
Attacker Value
Unknown
CVE-2020-10096
Disclosure Date: March 05, 2020 (last updated February 21, 2025)
An issue was discovered in Zammad 3.0 through 3.2. It does not prevent caching of confidential data within browser memory. An attacker who either remotely compromises or obtains physical access to a user's workstation can browse the browser cache contents and obtain sensitive information. The attacker does not need to be authenticated with the application to view this information, as it would be available via the browser cache.
0
Attacker Value
Unknown
CVE-2020-10102
Disclosure Date: March 05, 2020 (last updated February 21, 2025)
An issue was discovered in Zammad 3.0 through 3.2. The Forgot Password functionality is implemented in a way that would enable an anonymous user to guess valid user emails. In the current implementation, the application responds differently depending on whether the input supplied was recognized as associated with a valid user. This behavior could be used as part of a two-stage automated attack. During the first stage, an attacker would iterate through a list of account names to determine which correspond to valid accounts. During the second stage, the attacker would use a list of common passwords to attempt to brute force credentials for accounts that were recognized by the system in the first stage.
0
Attacker Value
Unknown
CVE-2020-10104
Disclosure Date: March 05, 2020 (last updated February 21, 2025)
An issue was discovered in Zammad 3.0 through 3.2. After authentication, it transmits sensitive information to the user that may be compromised and used by an attacker to gain unauthorized access. Hashed passwords are returned to the user when visiting a certain URL.
0
Attacker Value
Unknown
CVE-2020-10098
Disclosure Date: March 05, 2020 (last updated February 21, 2025)
An XSS issue was discovered in Zammad 3.0 through 3.2. Malicious code can be provided by a low-privileged user through the Email functionality. The malicious JavaScript will execute within the browser of any user who opens the Ticket with the Article created from that Email.
0