Sysaid

Sysaid

30 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 13.71%
  • Veröffentlicht 08.06.2015 14:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.

Exploit
  • EPSS 20.11%
  • Veröffentlicht 08.06.2015 14:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

SysAid Help Desk before 15.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an XML document to (1) /agententry, (2) /rdsmonitoringresponse, or (3) /androidactions, a...

Exploit
  • EPSS 1.02%
  • Veröffentlicht 08.06.2015 14:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdmini...

Exploit
  • EPSS 62.16%
  • Veröffentlicht 08.06.2015 14:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml.

Exploit
  • EPSS 80.83%
  • Veröffentlicht 08.06.2015 14:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in a...

Exploit
  • EPSS 89%
  • Veröffentlicht 08.06.2015 14:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consump...

Exploit
  • EPSS 79.21%
  • Veröffentlicht 08.06.2015 14:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.

Exploit
  • EPSS 76.86%
  • Veröffentlicht 08.06.2015 14:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/us...

Exploit
  • EPSS 77%
  • Veröffentlicht 08.06.2015 14:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName pa...

Exploit
  • EPSS 14.54%
  • Veröffentlicht 02.01.2015 19:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\ (four backslashes) in the fileName parameter to getRdsLogFile.