Page 21 of 256 results (0.003 seconds)

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

Each authenticated Orion Platform user in a MSP (Managed Service Provider) environment can view and browse all NetPath Services from all that MSP's customers. This can lead to any user having a limited insight into other customer's infrastructure and potential data cross-contamination. Cada usuario autenticado de Orion Platform en un entorno MSP (Managed Service Provider) puede visualizar y navegar todos los servicios NetPath de todos los clientes de ese MSP. Esto puede conllevar a que cualquier usuario tenga una visión limitada de la infraestructura de otros clientes y una posible contaminación cruzada de datos • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm https://support.solarwinds.com/SuccessCenter/s/article/NPM-2020-2-6-Hotfix-2?language=en_US https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35225 •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

The vulnerability in SolarWinds Pingdom can be described as a failure to invalidate user session upon password or email address change. When running multiple active sessions in separate browser windows, it was observed a password or email address change could be changed without terminating the user session. This issue has been resolved on September 13, 2021. La vulnerabilidad en SolarWinds Pingdom puede describirse como un fallo en la invalidación de la sesión de usuario al cambiar la contraseña o la dirección de correo electrónico. Cuando se ejecutaban varias sesiones activas en ventanas de navegador separadas, se observaba que se podía cambiar la contraseña o la dirección de correo electrónico sin terminar la sesión de usuario. • https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35214 • CWE-613: Insufficient Session Expiration •

CVSS: 8.9EPSS: 4%CPEs: 1EXPL: 0

Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data. Se ha detectado una vulnerabilidad de ejecución de código remota en una Deserialización de datos no confiables en el módulo de integración de la plataforma Orion de Patch Manager y nos fue reportada por ZDI. Un atacante autenticado podría explotarla al ejecutar la deserialización de datos no confiables de WSAsyncExecuteTasks This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Patch Manager. Authentication is required to exploit this vulnerability. The specific flaw exists within the WSAsyncExecuteTasks endpoint. • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35217 https://www.zerodayinitiative.com/advisories/ZDI-21-1247 • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.9EPSS: 7%CPEs: 1EXPL: 0

Deserialization of Untrusted Data in the Web Console Chart Endpoint can lead to remote code execution. An unauthorized attacker who has network access to the Orion Patch Manager Web Console could potentially exploit this and compromise the server Una deserialización de Datos no Confiables en el Endpoint de la Consola Web puede conllevar a una ejecución de código remota. Un atacante no autorizado que tenga acceso a la red de la Consola Web de Orion Patch Manager podría potencialmente explotar esto y comprometer el servidor This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Patch Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Chart endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. • https://documentation.solarwinds.com/en/success_center/patchman/content/release_notes/patchman_2020-2-6_release_notes.htm https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35218 https://www.zerodayinitiative.com/advisories/ZDI-21-1248 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.0EPSS: 7%CPEs: 1EXPL: 0

Insecure Deserialization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module. An Authenticated Attacker with network access via HTTP can compromise this vulnerability can result in Remote Code Execution. Se ha detectado una vulnerabilidad de ejecución de código remota en una deserialización insegura de datos no confiables en Patch Manager Orion Platform Integration module. Un atacante autenticado con acceso a la red por medio de HTTP puede comprometer esta vulnerabilidad y dar lugar a una ejecución de código remota This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Patch Manager. Authentication is required to exploit this vulnerability. The specific flaw exists within the EditResourceControls endpoint. • https://documentation.solarwinds.com/en/success_center/patchman/content/release_notes/patchman_2020-2-6_release_notes.htm https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35216 https://www.zerodayinitiative.com/advisories/ZDI-21-1246 • CWE-502: Deserialization of Untrusted Data •