Zoho ManageEngine ADSelfService Plus before build 5708 has XSS via the mobile app API.
Max CVSS
6.1
EPSS Score
0.15%
Published
2019-04-25
Updated
2019-06-03
Zoho ManageEngine Applications Manager 12 through 14 allows FaultTemplateOptions.jsp resourceid SQL injection. Subsequently, an unauthenticated user can gain the authority of SYSTEM on the server by uploading a malicious file via the "Execute Program Action(s)" feature.
Max CVSS
10.0
EPSS Score
1.32%
Published
2019-04-23
Updated
2019-04-26
An issue was discovered in Zoho ManageEngine Applications Manager 11.0 through 14.0. An unauthenticated user can gain the authority of SYSTEM on the server due to a Popup_SLA.jsp sid SQL injection vulnerability. For example, the attacker can subsequently write arbitrary text to a .vbs file.
Max CVSS
10.0
EPSS Score
0.84%
Published
2019-04-22
Updated
2019-05-06
Information leakage vulnerability in the /mc login page in ManageEngine ServiceDesk Plus 9.3 software allows authenticated users to enumerate active users. Due to a flaw within the way the authentication is handled, an attacker is able to login and verify any active account.
Max CVSS
4.3
EPSS Score
0.66%
Published
2019-04-04
Updated
2020-08-24
Zoho ManageEngine ServiceDesk 9.3 allows session hijacking and privilege escalation because an established guest session is automatically converted into an established administrator session when the guest user enters the administrator username, with an arbitrary incorrect password, in an mc/ login attempt within a different browser tab.
Max CVSS
8.8
EPSS Score
0.70%
Published
2019-04-24
Updated
2019-04-25
Zoho ManageEngine ADManager Plus 6.6 Build 6657 allows local users to gain privileges (after a reboot) by placing a Trojan horse file into the permissive bin directory.
Max CVSS
7.0
EPSS Score
0.06%
Published
2019-04-30
Updated
2019-10-03
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!