Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Very High

CVE-2021-44077

Disclosure Date: November 29, 2021 (last updated October 07, 2023)
Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. This is related to /RestAPI URLs in a servlet, and ImportTechnicians in the Struts configuration.
Attacker Value
Unknown

CVE-2021-44526

Disclosure Date: December 23, 2021 (last updated October 07, 2023)
Zoho ManageEngine ServiceDesk Plus before 12003 allows authentication bypass in certain admin configurations.
Attacker Value
Unknown

CVE-2021-37415

Disclosure Date: September 01, 2021 (last updated February 15, 2024)
Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.
Attacker Value
Unknown

CVE-2021-20080

Disclosure Date: April 09, 2021 (last updated February 22, 2025)
Insufficient output sanitization in ManageEngine ServiceDesk Plus before version 11200 and ManageEngine AssetExplorer before version 6800 allows a remote, unauthenticated attacker to conduct persistent cross-site scripting (XSS) attacks by uploading a crafted XML asset file.
Attacker Value
Unknown

CVE-2020-35682

Disclosure Date: March 13, 2021 (last updated February 22, 2025)
Zoho ManageEngine ServiceDesk Plus before 11134 allows an Authentication Bypass (only during SAML login).
Attacker Value
Unknown

CVE-2020-14048

Disclosure Date: June 12, 2020 (last updated February 21, 2025)
Zoho ManageEngine ServiceDesk Plus before 11.1 build 11115 allows remote unauthenticated attackers to change the installation status of deployed agents.
Attacker Value
Unknown

CVE-2020-13154

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
Zoho ManageEngine Service Plus before 11.1 build 11112 allows low-privilege authenticated users to discover the File Protection password via a getFileProtectionSettings call to AjaxServlet.