Page 8 of 37 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 3

SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password. SysAid Help Desk anterior a 15.2 utiliza una contraseña embebida de Password1 para la cuenta de usuario sa SQL Server Express, lo que permite a usuarios remotos autenticados evadir las restricciones de acceso mediante el aprovechamiento de esta contraseña. SysAid Help Desk version 14.4 suffers from code execution, denial of service, path disclosure, remote file upload, remote SQL injection, directory traversal, file download, and various other vulnerabilities. • https://www.exploit-db.com/exploits/43885 http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html http://seclists.org/fulldisclosure/2015/Jun/8 http://www.securityfocus.com/archive/1/535679/100/0/threaded http://www.securityfocus.com/bid/75035 https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk • CWE-255: Credentials Management Errors •

CVSS: 5.0EPSS: 7%CPEs: 1EXPL: 4

Absolute path traversal vulnerability in SysAid On-Premise before 14.4.2 allows remote attackers to read arbitrary files via a \\\\ (four backslashes) in the fileName parameter to getRdsLogFile. Vulnerabilidad de recorrido de directorio absoluto en SysAid On-Premise anterior a 14.4.2 permite a atacantes remotos leer ficheros arbitrarios a través de un \\\\ (cuatro barras invertidas) en el parámetro fileName en getRdsLogFile. • https://www.exploit-db.com/exploits/35593 http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html http://seclists.org/fulldisclosure/2014/Dec/99 http://www.exploit-db.com/exploits/35593 https://exchange.xforce.ibmcloud.com/vulnerabilities/99456 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •