Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Trudesk
(Trudesk_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 20 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-05-31 | CVE-2022-1931 | Incorrect Synchronization in GitHub repository polonel/trudesk prior to 1.2.3. | Trudesk | 8.1 | ||
2022-05-31 | CVE-2022-1926 | Integer Overflow or Wraparound in GitHub repository polonel/trudesk prior to 1.2.3. | Trudesk | 4.9 | ||
2022-05-31 | CVE-2022-1808 | Execution with Unnecessary Privileges in GitHub repository polonel/trudesk prior to 1.2.3. | Trudesk | 8.8 | ||
2022-05-31 | CVE-2022-1893 | Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository polonel/trudesk prior to 1.2.3. | Trudesk | 5.3 | ||
2022-05-31 | CVE-2022-1947 | Use of Incorrect Operator in GitHub repository polonel/trudesk prior to 1.2.3. | Trudesk | 6.5 | ||
2022-06-20 | CVE-2022-2023 | Incorrect Use of Privileged APIs in GitHub repository polonel/trudesk prior to 1.2.4. | Trudesk | 9.8 | ||
2022-06-20 | CVE-2022-2128 | Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4. | Trudesk | 9.8 | ||
2022-09-29 | CVE-2022-1718 | The trudesk application allows large characters to insert in the input field "Full Name" on the signup field which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request in GitHub repository polonel/trudesk prior to 1.2.2. This can lead to Denial of service. | Trudesk | 7.5 | ||
2022-09-29 | CVE-2022-1719 | Reflected XSS on ticket filter function in GitHub repository polonel/trudesk prior to 1.2.2. This vulnerability is capable of executing a malicious javascript code in web page | Trudesk | 5.4 | ||
2024-06-24 | CVE-2021-45785 | TruDesk Help Desk/Ticketing Solution v1.1.11 is vulnerable to a Cross-Site Request Forgery (CSRF) attack which would allow an attacker to restart the server, causing a DoS attack. The attacker must craft a webpage that would perform a GET request to the /api/v1/admin/restart endpoint, then the victim (who has sufficient privileges), would visit the page and the server restart would begin. The attacker must know the full URL that TruDesk is on in order to craft the webpage. | Trudesk | 6.5 |