SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 02:28
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html - Exploit | |
| References | () http://seclists.org/fulldisclosure/2015/Jun/8 - Exploit | |
| References | () http://www.securityfocus.com/archive/1/535679/100/0/threaded - | |
| References | () http://www.securityfocus.com/bid/75035 - | |
| References | () https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk - Vendor Advisory | 
Information
                Published : 2015-06-08 14:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-3001
Mitre link : CVE-2015-3001
CVE.ORG link : CVE-2015-3001
JSON object : View
Products Affected
                sysaid
- sysaid
CWE
                
                    
                        
                        CWE-255
                        
            Credentials Management Errors
