Browse all 3 CVE security advisories affecting Saysis. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Saysis is a software platform primarily used for enterprise content management and workflow automation. Historically, vulnerabilities have commonly included remote code execution, cross-site scripting, and privilege escalation flaws. The platform has demonstrated inconsistent input validation and insufficient access controls in multiple versions. While no major public security incidents have been widely reported, the three documented CVEs highlight recurring issues in sanitizing user inputs and managing permission boundaries. Security researchers have noted that default configurations often leave systems exposed to exploitation, particularly in environments where recommended hardening measures are not implemented.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-1246 | Files or Directories Accessible to External Parties in Saysis Starcities — StarcitiesCWE-552 | 7.5 | High | 2023-03-10 |
| CVE-2023-1198 | SQLi in Saysis Starcities — StarcitiesCWE-89 | 9.8 | Critical | 2023-03-10 |
| CVE-2022-2178 | XSS in Saysis' Starcities — StarcitiesCWE-79 | 6.1 | Medium | 2023-03-06 |
This page lists every published CVE security advisory associated with Saysis. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.