Page 22 of 256 results (0.008 seconds)

CVSS: 8.9EPSS: 12%CPEs: 1EXPL: 1

Insecure deserialization leading to Remote Code Execution was detected in the Orion Platform version 2020.2.5. Authentication is required to exploit this vulnerability. Se ha detectado una deserialización insegura conllevando a una ejecución de código remota en Orion Platform versión 2020.2.5. Es requerida una autenticación para explotar esta vulnerabilidad This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Orion Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the ActionPluginBaseView class. • https://github.com/Y4er/CVE-2021-35215 https://documentation.solarwinds.co/enm/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35215 https://www.zerodayinitiative.com/advisories/ZDI-21-1245 • CWE-502: Deserialization of Untrusted Data •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 0

User with Orion Platform Admin Rights could store XSS through URL POST parameter in CreateExternalWebsite website. Un usuario con derechos de Administrador de la Plataforma Orion podría almacenar una vulnerabilidad de tipo XSS mediante el parámetro URL POST en el sitio web CreateExternalWebsite • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm https://support.solarwinds.com/SuccessCenter/s/article/Orion-Platform-2020-2-6-Hotfix-1?language=en_US https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35238 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

An SQL injection Privilege Escalation Vulnerability was discovered in the Orion Platform reported by the ZDI Team. A blind Boolean SQL injection which could lead to full read/write over the Orion database content including the Orion certificate for any authenticated user. Se ha detectado una Vulnerabilidad de Escalada de Privilegios por inyección SQL en la plataforma Orion, reportada por el Equipo de ZDI. Una inyección SQL booleana ciega que podría conllevar a una lectura y escritura completa sobre el contenido de la base de datos de Orion, incluyendo el certificado de Orion, para cualquier usuario autenticado This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Orion Network Performance Monitor. Authentication is required to exploit this vulnerability. The specific flaw exists within the DisableNOCView method. • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35212 https://www.zerodayinitiative.com/advisories/ZDI-21-1243 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The Serv-U File Server allows for events such as user login failures to be audited by executing a command. This command can be supplied with parameters that can take the form of user string variables, allowing remote code execution. El Servidor de Archivos Serv-U permite auditar eventos como los fallos de inicio de sesión de los usuarios mediante la ejecución de un comando. Este comando puede ser suministrado con parámetros que pueden tomar la forma de variables de cadena de usuario, permitiendo la ejecución remota de código • https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-2-4_release_notes.htm https://support.solarwinds.com/SuccessCenter/s/article/Execute-Command-Function-Allows-Remote-Code-Execution-RCE-Vulnerability-CVE-2021-35223?language=en_US https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35223 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

An Improper Access Control Privilege Escalation Vulnerability was discovered in the User Setting of Orion Platform version 2020.2.5. It allows a guest user to elevate privileges to the Administrator using this vulnerability. Authentication is required to exploit the vulnerability. Se ha detectado una vulnerabilidad de Escalada de Privilegios por Control de Acceso Inapropiado en la configuración de usuario de Orion Platform versión 2020.2.5. Permite a un usuario invitado elevar privilegios a Administrador usando esta vulnerabilidad. • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35213 https://www.zerodayinitiative.com/advisories/ZDI-21-1244 • CWE-284: Improper Access Control •