Vulnerabilities (CVE)

Filtered by vendor Sysaid Subscribe
Filtered by product Sysaid
Total 26 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-2997 1 Sysaid 1 Sysaid 2024-11-21 5.0 MEDIUM N/A
SysAid Help Desk before 15.2 allows remote attackers to obtain sensitive information via an invalid value in the accountid parameter to getAgentLogFile, as demonstrated by a large directory traversal sequence, which reveals the installation path in an error message.
CVE-2015-2996 1 Sysaid 1 Sysaid 2024-11-21 8.5 HIGH N/A
Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.
CVE-2015-2995 1 Sysaid 1 Sysaid 2024-11-21 6.8 MEDIUM N/A
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.
CVE-2015-2994 1 Sysaid 1 Sysaid 2024-11-21 6.5 MEDIUM N/A
Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/.
CVE-2015-2993 1 Sysaid 1 Sysaid 2024-11-21 7.5 HIGH N/A
SysAid Help Desk before 15.2 does not properly restrict access to certain functionality, which allows remote attackers to (1) create administrator accounts via a crafted request to /createnewaccount or (2) write to arbitrary files via the fileName parameter to /userentry.
CVE-2014-9436 1 Sysaid 1 Sysaid 2024-11-21 5.0 MEDIUM N/A
Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\ (four backslashes) in the fileName parameter to getRdsLogFile.