Vulnerabilities (CVE)

Filtered by vendor Sysaid Subscribe
Filtered by product Sysaid
Total 26 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-2995 1 Sysaid 1 Sysaid 2024-02-04 6.8 MEDIUM N/A
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.
CVE-2015-2996 1 Sysaid 1 Sysaid 2024-02-04 8.5 HIGH N/A
Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.
CVE-2015-3001 1 Sysaid 1 Sysaid 2024-02-04 5.0 MEDIUM N/A
SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
CVE-2015-2999 1 Sysaid 1 Sysaid 2024-02-04 6.5 MEDIUM N/A
Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp.
CVE-2015-2997 1 Sysaid 1 Sysaid 2024-02-04 5.0 MEDIUM N/A
SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message.
CVE-2014-9436 1 Sysaid 1 Sysaid 2024-02-04 5.0 MEDIUM N/A
Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\ (four backslashes) in the fileName parameter to getRdsLogFile.