Show filters
38 Total Results
Displaying 21-30 of 38
Sort by:
Attacker Value
Unknown

CVE-2021-43972

Disclosure Date: January 11, 2022 (last updated February 23, 2025)
An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.
Attacker Value
Unknown

CVE-2021-43971

Disclosure Date: January 11, 2022 (last updated February 23, 2025)
A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter.
Attacker Value
Unknown

CVE-2021-36721

Disclosure Date: December 13, 2021 (last updated October 07, 2023)
Sysaid API User Enumeration - Attacker sending requests to specific api path without any authorization before 21.3.60 version could get users names from the LDAP server.
Attacker Value
Unknown

CVE-2021-31862

Disclosure Date: October 29, 2021 (last updated February 23, 2025)
SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.
Attacker Value
Unknown

CVE-2021-30049

Disclosure Date: July 22, 2021 (last updated February 23, 2025)
SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI.
Attacker Value
Unknown

CVE-2021-30486

Disclosure Date: July 22, 2021 (last updated February 23, 2025)
SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection via AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID or group1), or AssetManagementSummary.jsp (GET group1).
Attacker Value
Unknown

CVE-2020-13168

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
SysAid 20.1.11b26 allows reflected XSS via the ForgotPassword.jsp accountid parameter.
Attacker Value
Unknown

CVE-2020-10569

Disclosure Date: April 21, 2020 (last updated February 21, 2025)
SysAid On-Premise 20.1.11, by default, allows the AJP protocol port, which is vulnerable to a GhostCat attack. Additionally, it allows unauthenticated access to upload files, which can be used to execute commands on the system by chaining it with a GhostCat attack. NOTE: This may be a duplicate of CVE-2020-1938
Attacker Value
Unknown

CVE-2015-2995

Disclosure Date: June 08, 2015 (last updated October 05, 2023)
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.
0
Attacker Value
Unknown

CVE-2015-3001

Disclosure Date: June 08, 2015 (last updated October 05, 2023)
SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
0