Page 3 of 28 results (0.009 seconds)

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

31 Aug 2021 — An Improper Access Control Privilege Escalation Vulnerability was discovered in the User Setting of Orion Platform version 2020.2.5. It allows a guest user to elevate privileges to the Administrator using this vulnerability. Authentication is required to exploit the vulnerability. Se ha detectado una vulnerabilidad de Escalada de Privilegios por Control de Acceso Inapropiado en la configuración de usuario de Orion Platform versión 2020.2.5. Permite a un usuario invitado elevar privilegios a Administrador us... • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm • CWE-284: Improper Access Control •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

31 Aug 2021 — A security researcher stored XSS via a Help Server setting. This affects customers using Internet Explorer, because they do not support 'rel=noopener'. Un investigador de seguridad almacenó un ataque de tipo XSS por medio de una configuración del Servidor de Ayuda. Esto afecta a clientes usando Internet Explorer, porque no soportan "rel=noopener" • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

31 Aug 2021 — A security researcher found a user with Orion map manage rights could store XSS through via text box hyperlink. Un investigador de seguridad ha detectado que un usuario con derechos de administración de mapas de Orion podía almacenar una vulnerabilidad de tipo XSS mediante un hipervínculo de cuadro de texto • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.6EPSS: 0%CPEs: 2EXPL: 0

31 Aug 2021 — This vulnerability allows attackers to impersonate users and perform arbitrary actions leading to a Remote Code Execution (RCE) from the Alerts Settings page. Esta vulnerabilidad permite a atacantes hacerse pasar por usuarios y llevar a cabo acciones arbitrarias que conllevan a una Ejecución de Código Remota (RCE) desde la página Alerts Settings • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

31 Aug 2021 — Improper Access Control Tampering Vulnerability using ImportAlert function which can lead to a Remote Code Execution (RCE) from the Alerts Settings page. Una Vulnerabilidad de Manipulación del Control de Acceso Inapropiado usando la función ImportAlert que puede conllevar una Ejecución de Código Remota (RCE) desde la página Alerts Settings • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm • CWE-284: Improper Access Control •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

31 Aug 2021 — Command Injection vulnerability in EmailWebPage API which can lead to a Remote Code Execution (RCE) from the Alerts Settings page. Una vulnerabilidad de Inyección de Comandos en la API de EmailWebPage, que puede conllevar una Ejecución de Código Remota (RCE) desde la página Alerts Settings • https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 0

31 Aug 2021 — ExportToPdfCmd Arbitrary File Read Information Disclosure Vulnerability using ImportAlert function within the Alerts Settings page. Una Vulnerabilidad de Divulgación de Información de Lectura Arbitraria de Archivos en ExportToPdfCmd, mediante la función ImportAlert en la página Alerts Settings • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

27 Jul 2021 — The node management page in SolarWinds Orion Platform before 2020.2.5 HF1 allows an attacker to create or delete a node (outside of the attacker's perimeter) via an account with write permissions. This occurs because node IDs are predictable (with incrementing numbers) and the access control on Services/NodeManagement.asmx/DeleteObjNow is incorrect. To exploit this, an attacker must be authenticated and must have node management rights associated with at least one valid group on the platform. La página de a... • https://pastebin.com/zFUd2cCj • CWE-330: Use of Insufficiently Random Values CWE-863: Incorrect Authorization •