solarwinds CVE Vulnerabilities & Metrics

Focus on solarwinds vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About solarwinds Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with solarwinds. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total solarwinds CVEs: 250
Earliest CVE date: 16 Feb 2001, 05:00 UTC
Latest CVE date: 11 Feb 2025, 08:15 UTC

Latest CVE reference: CVE-2024-52612

Rolling Stats

30-day Count (Rolling): 4
365-day Count (Rolling): 40

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -9.09%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -9.09%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical solarwinds CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.55

Max CVSS: 10.0

Critical CVEs (≥9): 28

CVSS Range vs. Count

Range Count
0.0-3.9 142
4.0-6.9 90
7.0-8.9 22
9.0-10.0 28

CVSS Distribution Chart

Top 5 Highest CVSS solarwinds CVEs

These are the five CVEs with the highest CVSS scores for solarwinds, sorted by severity first and recency.

All CVEs for solarwinds

CVE-2024-52612 solarwinds vulnerability CVSS: 0 11 Feb 2025, 08:15 UTC

SolarWinds Platform is vulnerable to a reflected cross-site scripting vulnerability. This was caused by an insufficient sanitation of input parameters. This vulnerability requires authentication by a high- privileged account to be exploitable.

CVE-2024-52611 solarwinds vulnerability CVSS: 0 11 Feb 2025, 08:15 UTC

The SolarWinds Platform is vulnerable to an information disclosure vulnerability through an error message. While the data does not provide anything sensitive, the information could assist an attacker in other malicious actions.

CVE-2024-52606 solarwinds vulnerability CVSS: 0 11 Feb 2025, 08:15 UTC

SolarWinds Platform is affected by server-side request forgery vulnerability. Proper input sanitation was not applied allowing for the possibility of a malicious web request.

CVE-2024-28989 solarwinds vulnerability CVSS: 0 11 Feb 2025, 08:15 UTC

SolarWinds Web Help Desk was found to have a hardcoded cryptographic key that could allow the disclosure of sensitive information from the software.

CVE-2024-45709 solarwinds vulnerability CVSS: 0 10 Dec 2024, 09:15 UTC

SolarWinds Web Help Desk was susceptible to a local file read vulnerability. This vulnerability requires the software be installed on Linux and configured to use non-default development/test mode making exposure to the vulnerability very limited.

CVE-2024-45717 solarwinds vulnerability CVSS: 0 04 Dec 2024, 07:15 UTC

The SolarWinds Platform was susceptible to a XSS vulnerability that affects the search and node information section of the user interface. This vulnerability requires authentication and requires user interaction.

CVE-2024-45713 solarwinds vulnerability CVSS: 0 17 Oct 2024, 11:15 UTC

SolarWinds Kiwi CatTools is susceptible to a sensitive data disclosure vulnerability when a non-default setting has been enabled for troubleshooting purposes.

CVE-2024-45715 solarwinds vulnerability CVSS: 0 16 Oct 2024, 08:15 UTC

The SolarWinds Platform was susceptible to a Cross-Site Scripting vulnerability when performing an edit function to existing elements.

CVE-2024-45714 solarwinds vulnerability CVSS: 0 16 Oct 2024, 08:15 UTC

Application is vulnerable to Cross Site Scripting (XSS) an authenticated attacker with users’ permissions can modify a variable with a payload.

CVE-2024-45711 solarwinds vulnerability CVSS: 0 16 Oct 2024, 08:15 UTC

SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where remote code execution is possible depending on privileges given to the authenticated user. This issue requires a user to be authenticated and this is present when software environment variables are abused. Authentication is required for this vulnerability

CVE-2024-45710 solarwinds vulnerability CVSS: 0 16 Oct 2024, 08:15 UTC

SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low privilege account and local access to the affected node machine.

CVE-2024-28991 solarwinds vulnerability CVSS: 0 12 Sep 2024, 14:16 UTC

SolarWinds Access Rights Manager (ARM) was found to be susceptible to a remote code execution vulnerability. If exploited, this vulnerability would allow an authenticated user to abuse the service, resulting in remote code execution.

CVE-2024-28990 solarwinds vulnerability CVSS: 0 12 Sep 2024, 14:16 UTC

SolarWinds Access Rights Manager (ARM) was found to contain a hard-coded credential authentication bypass vulnerability. If exploited, this vulnerability would allow access to the RabbitMQ management console. We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.

CVE-2024-28987 solarwinds vulnerability CVSS: 0 21 Aug 2024, 22:15 UTC

The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.

CVE-2024-28986 solarwinds vulnerability CVSS: 0 13 Aug 2024, 23:15 UTC

SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.   However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.

CVE-2024-28993 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to a Directory Traversal and Information Disclosure Vulnerability. This vulnerability allows an unauthenticated user to perform arbitrary file deletion and leak sensitive information.

CVE-2024-28992 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to a Directory Traversal and Information Disclosure Vulnerability. This vulnerability allows an unauthenticated user to perform arbitrary file deletion and leak sensitive information.

CVE-2024-28074 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

It was discovered that a previous vulnerability was not completely fixed with SolarWinds Access Rights Manager. While some controls were implemented the researcher was able to bypass these and use a different method to exploit the vulnerability.

CVE-2024-23475 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to a Directory Traversal and Information Disclosure Vulnerability. This vulnerability allows an unauthenticated user to perform arbitrary file deletion and leak sensitive information.

CVE-2024-23474 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

The SolarWinds Access Rights Manager was found to be susceptible to an Arbitrary File Deletion and Information Disclosure vulnerability.

CVE-2024-23472 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

SolarWinds Access Rights Manager (ARM) is susceptible to Directory Traversal vulnerability. This vulnerability allows an authenticated user to arbitrary read and delete files in ARM.

CVE-2024-23471 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

The SolarWinds Access Rights Manager was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service resulting in remote code execution.

CVE-2024-23470 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

The SolarWinds Access Rights Manager was found to be susceptible to a pre-authentication remote code execution vulnerability. If exploited, this vulnerability allows an unauthenticated user to run commands and executables.

CVE-2024-23469 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

SolarWinds Access Rights Manager (ARM) is susceptible to a Remote Code Execution vulnerability. If exploited, this vulnerability allows an unauthenticated user to perform the actions with SYSTEM privileges.

CVE-2024-23468 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to a Directory Traversal and Information Disclosure Vulnerability. This vulnerability allows an unauthenticated user to perform arbitrary file deletion and leak sensitive information.

CVE-2024-23467 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to a Directory Traversal and Information Disclosure Vulnerability. This vulnerability allows an unauthenticated user to perform remote code execution.

CVE-2024-23466 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

SolarWinds Access Rights Manager (ARM) is susceptible to a Directory Traversal Remote Code Execution vulnerability. If exploited, this vulnerability allows an unauthenticated user to perform the actions with SYSTEM privileges.

CVE-2024-23465 solarwinds vulnerability CVSS: 0 17 Jul 2024, 15:15 UTC

The SolarWinds Access Rights Manager was found to be susceptible to an authentication bypass vulnerability. This vulnerability allows an unauthenticated user to gain domain admin access within the Active Directory environment.  

CVE-2024-28995 solarwinds vulnerability CVSS: 0 06 Jun 2024, 09:15 UTC

SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.

CVE-2024-29004 solarwinds vulnerability CVSS: 0 04 Jun 2024, 15:15 UTC

The SolarWinds Platform was determined to be affected by a stored cross-site scripting vulnerability affecting the web console. A high-privileged user and user interaction is required to exploit this vulnerability.

CVE-2024-28999 solarwinds vulnerability CVSS: 0 04 Jun 2024, 15:15 UTC

The SolarWinds Platform was determined to be affected by a Race Condition Vulnerability affecting the web console.

CVE-2024-28996 solarwinds vulnerability CVSS: 0 04 Jun 2024, 15:15 UTC

The SolarWinds Platform was determined to be affected by a SWQL Injection Vulnerability. Attack complexity is high for this vulnerability.  

CVE-2024-29000 solarwinds vulnerability CVSS: 0 20 May 2024, 19:15 UTC

The SolarWinds Platform was determined to be affected by a reflected cross-site scripting vulnerability affecting the web console. A high-privileged user and user interaction is required to exploit this vulnerability.

CVE-2024-28075 solarwinds vulnerability CVSS: 0 14 May 2024, 15:13 UTC

The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an authenticated user to abuse SolarWinds service resulting in remote code execution. We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.

CVE-2024-23473 solarwinds vulnerability CVSS: 0 14 May 2024, 14:59 UTC

The SolarWinds Access Rights Manager was found to contain a hard-coded credential authentication bypass vulnerability. If exploited, this vulnerability allows access to the RabbitMQ management console. We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.

CVE-2024-28072 solarwinds vulnerability CVSS: 0 03 May 2024, 08:15 UTC

A highly privileged account can overwrite arbitrary files on the system with log output. The log file path tags were not sanitized properly.

CVE-2024-29003 solarwinds vulnerability CVSS: 0 18 Apr 2024, 10:15 UTC

The SolarWinds Platform was susceptible to a XSS vulnerability that affects the maps section of the user interface. This vulnerability requires authentication and requires user interaction.

CVE-2024-29001 solarwinds vulnerability CVSS: 0 18 Apr 2024, 09:15 UTC

A SolarWinds Platform SWQL Injection Vulnerability was identified in the user interface. This vulnerability requires authentication and user interaction to be exploited.

CVE-2024-28076 solarwinds vulnerability CVSS: 0 18 Apr 2024, 09:15 UTC

The SolarWinds Platform was susceptible to a Arbitrary Open Redirection Vulnerability. A potential attacker can redirect to different domain when using URL parameter with relative entry in the correct format

CVE-2024-28073 solarwinds vulnerability CVSS: 0 17 Apr 2024, 17:15 UTC

SolarWinds Serv-U was found to be susceptible to a Directory Traversal Remote Code Vulnerability. This vulnerability requires a highly privileged account to be exploited.

CVE-2024-0692 solarwinds vulnerability CVSS: 0 01 Mar 2024, 09:15 UTC

The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.

CVE-2024-23479 solarwinds vulnerability CVSS: 0 15 Feb 2024, 21:15 UTC

SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve a Remote Code Execution.

CVE-2024-23478 solarwinds vulnerability CVSS: 0 15 Feb 2024, 21:15 UTC

SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service, resulting in remote code execution.

CVE-2024-23477 solarwinds vulnerability CVSS: 0 15 Feb 2024, 21:15 UTC

The SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve a Remote Code Execution.

CVE-2024-23476 solarwinds vulnerability CVSS: 0 15 Feb 2024, 21:15 UTC

The SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve the Remote Code Execution.

CVE-2023-40057 solarwinds vulnerability CVSS: 0 15 Feb 2024, 21:15 UTC

The SolarWinds Access Rights Manager was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service resulting in remote code execution.

CVE-2023-50395 solarwinds vulnerability CVSS: 0 06 Feb 2024, 16:15 UTC

SQL Injection Remote Code Execution Vulnerability was found using an update statement in the SolarWinds Platform. This vulnerability requires user authentication to be exploited

CVE-2023-35188 solarwinds vulnerability CVSS: 0 06 Feb 2024, 16:15 UTC

SQL Injection Remote Code Execution Vulnerability was found using a create statement in the SolarWinds Platform. This vulnerability requires user authentication to be exploited.

CVE-2023-40058 solarwinds vulnerability CVSS: 0 21 Dec 2023, 17:15 UTC

Sensitive data was added to our public-facing knowledgebase that, if exploited, could be used to access components of Access Rights Manager (ARM) if the threat actor is in the same environment.

CVE-2023-40053 solarwinds vulnerability CVSS: 0 06 Dec 2023, 04:15 UTC

A vulnerability has been identified within Serv-U 15.4 that allows an authenticated actor to insert content on the file share function feature of Serv-U, which could be used maliciously.

CVE-2023-40056 solarwinds vulnerability CVSS: 0 28 Nov 2023, 18:15 UTC

SQL Injection Remote Code Vulnerability was found in the SolarWinds Platform. This vulnerability can be exploited with a low privileged account.

CVE-2023-40055 solarwinds vulnerability CVSS: 0 09 Nov 2023, 15:15 UTC

The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33227

CVE-2023-40054 solarwinds vulnerability CVSS: 0 09 Nov 2023, 15:15 UTC

The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33226

CVE-2023-40062 solarwinds vulnerability CVSS: 0 01 Nov 2023, 16:15 UTC

SolarWinds Platform Incomplete List of Disallowed Inputs Remote Code Execution Vulnerability. If executed, this vulnerability would allow a low-privileged user to execute commands with SYSTEM privileges.

CVE-2023-40061 solarwinds vulnerability CVSS: 0 01 Nov 2023, 16:15 UTC

 Insecure job execution mechanism vulnerability. This vulnerability can lead to other attacks as a result.

CVE-2023-33228 solarwinds vulnerability CVSS: 0 01 Nov 2023, 16:15 UTC

The SolarWinds Network Configuration Manager was susceptible to the Exposure of Sensitive Information Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to obtain sensitive information.

CVE-2023-33227 solarwinds vulnerability CVSS: 0 01 Nov 2023, 16:15 UTC

The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability This vulnerability allows a low level user to perform the actions with SYSTEM privileges.

CVE-2023-33226 solarwinds vulnerability CVSS: 0 01 Nov 2023, 16:15 UTC

The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges.

CVE-2023-35187 solarwinds vulnerability CVSS: 0 19 Oct 2023, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to a Directory Traversal Remote Code Vulnerability. This vulnerability allows an unauthenticated user to achieve the Remote Code Execution.

CVE-2023-35186 solarwinds vulnerability CVSS: 0 19 Oct 2023, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an authenticated user to abuse SolarWinds service resulting in remote code execution.

CVE-2023-35185 solarwinds vulnerability CVSS: 0 19 Oct 2023, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to a Directory Traversal Remote Code Vulnerability using SYSTEM privileges.

CVE-2023-35184 solarwinds vulnerability CVSS: 0 19 Oct 2023, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse a SolarWinds service resulting in a remote code execution.

CVE-2023-35183 solarwinds vulnerability CVSS: 0 19 Oct 2023, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to Privilege Escalation Vulnerability. This vulnerability allows authenticated users to abuse local resources to Privilege Escalation.

CVE-2023-35182 solarwinds vulnerability CVSS: 0 19 Oct 2023, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability can be abused by unauthenticated users on SolarWinds ARM Server.

CVE-2023-35181 solarwinds vulnerability CVSS: 0 19 Oct 2023, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to Privilege Escalation Vulnerability. This vulnerability allows users to abuse incorrect folder permission resulting in Privilege Escalation.

CVE-2023-35180 solarwinds vulnerability CVSS: 0 19 Oct 2023, 15:15 UTC

The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows authenticated users to abuse SolarWinds ARM API.

CVE-2023-23845 solarwinds vulnerability CVSS: 0 13 Sep 2023, 23:15 UTC

The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with NETWORK SERVICE privileges.

CVE-2023-23840 solarwinds vulnerability CVSS: 0 13 Sep 2023, 23:15 UTC

The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with NETWORK SERVICE privileges.

CVE-2023-40060 solarwinds vulnerability CVSS: 0 07 Sep 2023, 16:15 UTC

A vulnerability has been identified within Serv-U 15.4 and 15.4 Hotfix 1 that, if exploited, allows an actor to bypass multi-factor/two-factor authentication. The actor must have administrator-level access to Serv-U to perform this action. 15.4.  SolarWinds found that the issue was not completely fixed in 15.4 Hotfix 1. 

CVE-2023-35179 solarwinds vulnerability CVSS: 0 11 Aug 2023, 00:15 UTC

A vulnerability has been identified within Serv-U 15.4 that, if exploited, allows an actor to bypass multi-factor/two-factor authentication. The actor must have administrator-level access to Serv-U to perform this action. 

CVE-2023-3622 solarwinds vulnerability CVSS: 0 26 Jul 2023, 15:15 UTC

Access Control Bypass Vulnerability in the SolarWinds Platform that allows an underprivileged user to read arbitrary resource

CVE-2023-33229 solarwinds vulnerability CVSS: 0 26 Jul 2023, 15:15 UTC

The SolarWinds Platform was susceptible to the Incorrect Input Neutralization Vulnerability. This vulnerability allows a remote adversary with a valid SolarWinds Platform account to append URL parameters to inject passive HTML.

CVE-2023-33225 solarwinds vulnerability CVSS: 0 26 Jul 2023, 14:15 UTC

The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with SYSTEM privileges.

CVE-2023-33224 solarwinds vulnerability CVSS: 0 26 Jul 2023, 14:15 UTC

The SolarWinds Platform was susceptible to the Incorrect Behavior Order Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with NETWORK SERVICE privileges.

CVE-2023-23844 solarwinds vulnerability CVSS: 0 26 Jul 2023, 14:15 UTC

The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with SYSTEM privileges.

CVE-2023-23843 solarwinds vulnerability CVSS: 0 26 Jul 2023, 14:15 UTC

The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands.

CVE-2023-33231 solarwinds vulnerability CVSS: 0 18 Jul 2023, 17:15 UTC

XSS attack was possible in DPA 2023.2 due to insufficient input validation

CVE-2023-23841 solarwinds vulnerability CVSS: 0 15 Jun 2023, 22:15 UTC

SolarWinds Serv-U is submitting an HTTP request when changing or updating the attributes for File Share or File request.  Part of the URL of the request discloses sensitive data. 

CVE-2023-23839 solarwinds vulnerability CVSS: 0 25 Apr 2023, 21:15 UTC

The SolarWinds Platform was susceptible to the Exposure of Sensitive Information Vulnerability. This vulnerability allows users to access Orion.WebCommunityStrings SWIS schema object and obtain sensitive information.

CVE-2023-23838 solarwinds vulnerability CVSS: 0 25 Apr 2023, 18:15 UTC

Directory traversal and file enumeration vulnerability which allowed users to enumerate to different folders of the server.

CVE-2023-23837 solarwinds vulnerability CVSS: 0 25 Apr 2023, 18:15 UTC

No exception handling vulnerability which revealed sensitive or excessive information to users.

CVE-2022-47509 solarwinds vulnerability CVSS: 0 21 Apr 2023, 20:15 UTC

The SolarWinds Platform was susceptible to the Incorrect Input Neutralization Vulnerability. This vulnerability allows a remote adversary with a valid SolarWinds Platform account to append URL parameters to inject HTML.

CVE-2022-47505 solarwinds vulnerability CVSS: 0 21 Apr 2023, 20:15 UTC

The SolarWinds Platform was susceptible to the Local Privilege Escalation Vulnerability. This vulnerability allows a local adversary with a valid system user account to escalate local privileges.

CVE-2022-36963 solarwinds vulnerability CVSS: 0 21 Apr 2023, 20:15 UTC

The SolarWinds Platform was susceptible to the Command Injection Vulnerability. This vulnerability allows a remote adversary with a valid SolarWinds Platform admin account to execute arbitrary commands.

CVE-2023-23836 solarwinds vulnerability CVSS: 0 15 Feb 2023, 19:15 UTC

SolarWinds Platform version 2022.4.1 was found to be susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to the SolarWinds Web Console to execute arbitrary commands.

CVE-2022-47508 solarwinds vulnerability CVSS: 0 15 Feb 2023, 19:15 UTC

Customers who had configured their polling to occur via Kerberos did not expect NTLM Traffic on their environment, but since we were querying for data via IP address this prevented us from utilizing Kerberos.

CVE-2022-47507 solarwinds vulnerability CVSS: 0 15 Feb 2023, 19:15 UTC

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-47506 solarwinds vulnerability CVSS: 0 15 Feb 2023, 19:15 UTC

SolarWinds Platform was susceptible to the Directory Traversal Vulnerability. This vulnerability allows a local adversary with authenticated account access to edit the default configuration, enabling the execution of arbitrary commands.

CVE-2022-47504 solarwinds vulnerability CVSS: 0 15 Feb 2023, 19:15 UTC

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-47503 solarwinds vulnerability CVSS: 0 15 Feb 2023, 19:15 UTC

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-38111 solarwinds vulnerability CVSS: 0 15 Feb 2023, 19:15 UTC

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-47012 solarwinds vulnerability CVSS: 0 20 Jan 2023, 19:15 UTC

Use of uninitialized variable in function gen_eth_recv in GNS3 dynamips 0.2.21.

CVE-2022-38112 solarwinds vulnerability CVSS: 0 20 Jan 2023, 18:15 UTC

In DPA 2022.4 and older releases, generated heap memory dumps contain sensitive information in cleartext.

CVE-2022-38110 solarwinds vulnerability CVSS: 0 20 Jan 2023, 18:15 UTC

In Database Performance Analyzer (DPA) 2022.4 and older releases, certain URL vectors are susceptible to authenticated reflected cross-site scripting.

CVE-2022-47512 solarwinds vulnerability CVSS: 0 19 Dec 2022, 16:15 UTC

Sensitive information was stored in plain text in a file that is accessible by a user with a local account in Hybrid Cloud Observability (HCO)/ SolarWinds Platform 2022.4. No other versions are affected

CVE-2022-38106 solarwinds vulnerability CVSS: 0 16 Dec 2022, 16:15 UTC

This vulnerability happens in the web client versions 15.3.0 to Serv-U 15.3.1. This vulnerability affects the directory creation function.

CVE-2021-35252 solarwinds vulnerability CVSS: 0 16 Dec 2022, 16:15 UTC

Common encryption key appears to be used across all deployed instances of Serv-U FTP Server. Because of this an encrypted value that is exposed to an attacker can be simply recovered to plaintext.

CVE-2022-36964 solarwinds vulnerability CVSS: 0 29 Nov 2022, 21:15 UTC

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36962 solarwinds vulnerability CVSS: 0 29 Nov 2022, 21:15 UTC

SolarWinds Platform was susceptible to Command Injection. This vulnerability allows a remote adversary with complete control over the SolarWinds database to execute arbitrary commands.

CVE-2022-36960 solarwinds vulnerability CVSS: 0 29 Nov 2022, 21:15 UTC

SolarWinds Platform was susceptible to Improper Input Validation. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to escalate user privileges.

CVE-2022-38113 solarwinds vulnerability CVSS: 0 23 Nov 2022, 17:15 UTC

This vulnerability discloses build and services versions in the server response header.

CVE-2021-35246 solarwinds vulnerability CVSS: 0 23 Nov 2022, 17:15 UTC

The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption and use the application as a platform for attacks against its users.

CVE-2022-38108 solarwinds vulnerability CVSS: 0 20 Oct 2022, 21:15 UTC

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36966 solarwinds vulnerability CVSS: 0 20 Oct 2022, 21:15 UTC

Users with Node Management rights were able to view and edit all nodes due to Insufficient control on URL parameter causing insecure direct object reference (IDOR) vulnerability in SolarWinds Platform 2022.3 and previous.

CVE-2022-36958 solarwinds vulnerability CVSS: 0 20 Oct 2022, 21:15 UTC

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36957 solarwinds vulnerability CVSS: 0 20 Oct 2022, 21:15 UTC

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-38107 solarwinds vulnerability CVSS: 0 19 Oct 2022, 22:15 UTC

Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details.

CVE-2021-35226 solarwinds vulnerability CVSS: 0 10 Oct 2022, 23:15 UTC

An entity in Network Configuration Manager product is misconfigured and exposing password field to Solarwinds Information Service (SWIS). Exposed credentials are encrypted and require authenticated access with an NCM role.

CVE-2022-36965 solarwinds vulnerability CVSS: 0 30 Sep 2022, 17:15 UTC

Insufficient sanitization of inputs in QoE application input field could lead to stored and Dom based XSS attack. This issue is fixed and released in SolarWinds Platform (2022.3.0).

CVE-2022-36961 solarwinds vulnerability CVSS: 0 30 Sep 2022, 17:15 UTC

A vulnerable component of Orion Platform was vulnerable to SQL Injection, an authenticated attacker could leverage this for privilege escalation or remote code execution.

CVE-2021-35249 solarwinds vulnerability CVSS: 4.0 17 May 2022, 20:15 UTC

This broken access control vulnerability pertains specifically to a domain admin who can access configuration & user data of other domains which they should not have access to. Please note the admin is unable to modify the data (read only operation). This UAC issue leads to a data leak to unauthorized users for a domain, with no log of them accessing the data unless they attempt to modify it. This read-only activity is logged to the original domain and does not specify which domain was accessed.

CVE-2021-35250 solarwinds vulnerability CVSS: 5.0 25 Apr 2022, 20:15 UTC

A researcher reported a Directory Transversal Vulnerability in Serv-U 15.3. This may allow access to files relating to the Serv-U installation and server files. This issue has been resolved in Serv-U 15.3 Hotfix 1.

CVE-2021-35229 solarwinds vulnerability CVSS: 4.3 21 Apr 2022, 19:15 UTC

Cross-site scripting vulnerability is present in Database Performance Monitor 2022.1.7779 and previous versions when using a complex SQL query

CVE-2021-35254 solarwinds vulnerability CVSS: 6.5 25 Mar 2022, 19:15 UTC

SolarWinds received a report of a vulnerability related to an input that was not sanitized in WebHelpDesk. SolarWinds has removed this input field to prevent the misuse of this input in the future.

CVE-2021-35251 solarwinds vulnerability CVSS: 5.0 10 Mar 2022, 17:42 UTC

Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details about the Web Help Desk installation.

CVE-2021-35247 solarwinds vulnerability CVSS: 5.0 10 Jan 2022, 14:10 UTC

Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.

CVE-2021-35232 solarwinds vulnerability CVSS: 3.6 27 Dec 2021, 19:15 UTC

Hard coded credentials discovered in SolarWinds Web Help Desk product. Through these credentials, the attacker with local access to the Web Help Desk host machine allows to execute arbitrary HQL queries against the database and leverage the vulnerability to steal the password hashes of the users or insert arbitrary data into the database.

CVE-2021-35243 solarwinds vulnerability CVSS: 5.0 23 Dec 2021, 20:15 UTC

The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.7 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity.

CVE-2021-35248 solarwinds vulnerability CVSS: 4.0 20 Dec 2021, 21:15 UTC

It has been reported that any Orion user, e.g. guest accounts can query the Orion.UserSettings entity and enumerate users and their basic settings.

CVE-2021-35244 solarwinds vulnerability CVSS: 8.5 20 Dec 2021, 21:15 UTC

The "Log alert to a file" action within action management enables any Orion Platform user with Orion alert management rights to write to any file. An attacker with Orion alert management rights could use this vulnerability to perform an unrestricted file upload causing a remote code execution.

CVE-2021-35234 solarwinds vulnerability CVSS: 6.5 20 Dec 2021, 21:15 UTC

Numerous exposed dangerous functions within Orion Core has allows for read-only SQL injection leading to privileged escalation. An attacker with low-user privileges may steal password hashes and password salt information.

CVE-2021-35245 solarwinds vulnerability CVSS: 6.8 06 Dec 2021, 17:15 UTC

When a user has admin rights in Serv-U Console, the user can move, create and delete any files are able to be accessed on the Serv-U host machine.

CVE-2021-35242 solarwinds vulnerability CVSS: 6.8 06 Dec 2021, 17:15 UTC

Serv-U server responds with valid CSRFToken when the request contains only Session.

CVE-2021-35237 solarwinds vulnerability CVSS: 4.3 29 Oct 2021, 14:15 UTC

A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server.

CVE-2021-35236 solarwinds vulnerability CVSS: 5.0 27 Oct 2021, 01:15 UTC

The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP, there is a potential for the cookie can be sent in clear text.

CVE-2021-35235 solarwinds vulnerability CVSS: 5.0 27 Oct 2021, 01:15 UTC

The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent.

CVE-2021-35233 solarwinds vulnerability CVSS: 5.0 27 Oct 2021, 01:15 UTC

The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies.

CVE-2021-35231 solarwinds vulnerability CVSS: 4.6 25 Oct 2021, 13:15 UTC

As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".

CVE-2021-35230 solarwinds vulnerability CVSS: 7.2 22 Oct 2021, 12:15 UTC

As a result of an unquoted service path vulnerability present in the Kiwi CatTools Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry.

CVE-2021-35228 solarwinds vulnerability CVSS: 2.6 21 Oct 2021, 18:15 UTC

This vulnerability occurred due to missing input sanitization for one of the output fields that is extracted from headers on specific section of page causing a reflective cross site scripting attack. An attacker would need to perform a Man in the Middle attack in order to change header for a remote victim.

CVE-2021-35227 solarwinds vulnerability CVSS: 4.6 21 Oct 2021, 18:15 UTC

The HTTP interface was enabled for RabbitMQ Plugin in ARM 2020.2.6 and the ability to configure HTTPS was not available.

CVE-2021-35225 solarwinds vulnerability CVSS: 5.5 21 Oct 2021, 18:15 UTC

Each authenticated Orion Platform user in a MSP (Managed Service Provider) environment can view and browse all NetPath Services from all that MSP's customers. This can lead to any user having a limited insight into other customer's infrastructure and potential data cross-contamination.

CVE-2021-35217 solarwinds vulnerability CVSS: 6.5 08 Sep 2021, 14:15 UTC

Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data.

CVE-2021-35218 solarwinds vulnerability CVSS: 6.5 01 Sep 2021, 15:15 UTC

Deserialization of Untrusted Data in the Web Console Chart Endpoint can lead to remote code execution. An unauthorized attacker who has network access to the Orion Patch Manager Web Console could potentially exploit this and compromise the server

CVE-2021-35216 solarwinds vulnerability CVSS: 9.0 01 Sep 2021, 15:15 UTC

Insecure Deserialization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module. An Authenticated Attacker with network access via HTTP can compromise this vulnerability can result in Remote Code Execution.

CVE-2021-35215 solarwinds vulnerability CVSS: 6.5 01 Sep 2021, 15:15 UTC

Insecure deserialization leading to Remote Code Execution was detected in the Orion Platform version 2020.2.5. Authentication is required to exploit this vulnerability.

CVE-2021-35238 solarwinds vulnerability CVSS: 3.5 01 Sep 2021, 12:15 UTC

User with Orion Platform Admin Rights could store XSS through URL POST parameter in CreateExternalWebsite website.

CVE-2021-35212 solarwinds vulnerability CVSS: 9.0 31 Aug 2021, 17:15 UTC

An SQL injection Privilege Escalation Vulnerability was discovered in the Orion Platform reported by the ZDI Team. A blind Boolean SQL injection which could lead to full read/write over the Orion database content including the Orion certificate for any authenticated user.

CVE-2021-35240 solarwinds vulnerability CVSS: 3.5 31 Aug 2021, 16:15 UTC

A security researcher stored XSS via a Help Server setting. This affects customers using Internet Explorer, because they do not support 'rel=noopener'.

CVE-2021-35239 solarwinds vulnerability CVSS: 3.5 31 Aug 2021, 16:15 UTC

A security researcher found a user with Orion map manage rights could store XSS through via text box hyperlink.

CVE-2021-35223 solarwinds vulnerability CVSS: 6.5 31 Aug 2021, 16:15 UTC

The Serv-U File Server allows for events such as user login failures to be audited by executing a command. This command can be supplied with parameters that can take the form of user string variables, allowing remote code execution.

CVE-2021-35213 solarwinds vulnerability CVSS: 9.0 31 Aug 2021, 16:15 UTC

An Improper Access Control Privilege Escalation Vulnerability was discovered in the User Setting of Orion Platform version 2020.2.5. It allows a guest user to elevate privileges to the Administrator using this vulnerability. Authentication is required to exploit the vulnerability.

CVE-2021-35222 solarwinds vulnerability CVSS: 4.3 31 Aug 2021, 13:15 UTC

This vulnerability allows attackers to impersonate users and perform arbitrary actions leading to a Remote Code Execution (RCE) from the Alerts Settings page.

CVE-2021-35221 solarwinds vulnerability CVSS: 5.5 31 Aug 2021, 13:15 UTC

Improper Access Control Tampering Vulnerability using ImportAlert function which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.

CVE-2021-35220 solarwinds vulnerability CVSS: 6.5 31 Aug 2021, 12:15 UTC

Command Injection vulnerability in EmailWebPage API which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.

CVE-2021-35219 solarwinds vulnerability CVSS: 4.0 31 Aug 2021, 12:15 UTC

ExportToPdfCmd Arbitrary File Read Information Disclosure Vulnerability using ImportAlert function within the Alerts Settings page.

CVE-2021-32076 solarwinds vulnerability CVSS: 5.0 26 Aug 2021, 15:15 UTC

Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the 'Web Help Desk Getting Started Wizard', especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback.

CVE-2021-28674 solarwinds vulnerability CVSS: 5.5 30 Jul 2021, 14:15 UTC

The node management page in SolarWinds Orion Platform before 2020.2.5 HF1 allows an attacker to create or delete a node (outside of the attacker's perimeter) via an account with write permissions. This occurs because node IDs are predictable (with incrementing numbers) and the access control on Services/NodeManagement.asmx/DeleteObjNow is incorrect. To exploit this, an attacker must be authenticated and must have node management rights associated with at least one valid group on the platform.

CVE-2021-35211 solarwinds vulnerability CVSS: 10.0 14 Jul 2021, 21:15 UTC

Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.

CVE-2021-31217 solarwinds vulnerability CVSS: 9.4 13 Jul 2021, 18:15 UTC

In SolarWinds DameWare Mini Remote Control Server 12.0.1.200, insecure file permissions allow file deletion as SYSTEM.

CVE-2021-31475 solarwinds vulnerability CVSS: 9.0 21 May 2021, 15:15 UTC

This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Orion Job Scheduler 2020.2.1 HF 2. Authentication is required to exploit this vulnerability. The specific flaw exists within the JobRouterService WCF service. The issue is due to the WCF service configuration, which allows a critical resource to be accessed by unprivileged users. An attacker can leverage this vulnerability to execute code in the context of an administrator. Was ZDI-CAN-12007.

CVE-2021-31474 solarwinds vulnerability CVSS: 10.0 21 May 2021, 15:15 UTC

This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Network Performance Monitor 2020.2.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SolarWinds.Serialization library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12213.

CVE-2021-32604 solarwinds vulnerability CVSS: 3.5 11 May 2021, 23:15 UTC

Share/IncomingWizard.htm in SolarWinds Serv-U before 15.2.3 mishandles the user-supplied SenderEmail parameter, aka "Share URL XSS."

CVE-2021-25179 solarwinds vulnerability CVSS: 4.3 05 May 2021, 03:15 UTC

SolarWinds Serv-U before 15.2 is affected by Cross Site Scripting (XSS) via the HTTP Host header.

CVE-2020-22428 solarwinds vulnerability CVSS: 3.5 05 May 2021, 03:15 UTC

SolarWinds Serv-U before 15.1.6 Hotfix 3 is affected by Cross Site Scripting (XSS) via a directory name (entered by an admin) containing a JavaScript payload.

CVE-2021-3154 solarwinds vulnerability CVSS: 5.0 04 May 2021, 14:15 UTC

An issue was discovered in SolarWinds Serv-U before 15.2.2. Unauthenticated attackers can retrieve cleartext passwords via macro Injection. NOTE: this had a distinct fix relative to CVE-2020-35481.

CVE-2021-27277 solarwinds vulnerability CVSS: 7.2 22 Apr 2021, 18:15 UTC

This vulnerability allows local attackers to escalate privileges on affected installations of SolarWinds Orion Virtual Infrastructure Monitor 2020.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the OneTimeJobSchedulerEventsService WCF service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-11955.

CVE-2021-27258 solarwinds vulnerability CVSS: 7.5 14 Apr 2021, 16:15 UTC

This vulnerability allows remote attackers to execute escalate privileges on affected installations of SolarWinds Orion Platform 2020.2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SaveUserSetting endpoint. The issue results from improper restriction of this endpoint to unprivileged users. An attacker can leverage this vulnerability to escalate privileges their privileges from Guest to Administrator. Was ZDI-CAN-11903.

CVE-2021-27240 solarwinds vulnerability CVSS: 7.2 29 Mar 2021, 21:15 UTC

This vulnerability allows local attackers to escalate privileges on affected installations of SolarWinds Patch Manager 2020.2.1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DataGridService WCF service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of Administrator. Was ZDI-CAN-12009.

CVE-2021-3109 solarwinds vulnerability CVSS: 4.9 26 Mar 2021, 16:15 UTC

The custom menu item options page in SolarWinds Orion Platform before 2020.2.5 allows Reverse Tabnabbing in the context of an administrator account.

CVE-2020-35856 solarwinds vulnerability CVSS: 3.5 26 Mar 2021, 16:15 UTC

SolarWinds Orion Platform before 2020.2.5 allows stored XSS attacks by an administrator on the Customize View page.

CVE-2020-27869 solarwinds vulnerability CVSS: 9.0 12 Feb 2021, 00:15 UTC

This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2. Authentication is required to exploit this vulnerability. The specific flaw exists within the WriteToFile method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges and reset the password for the Admin user. Was ZDI-CAN-11804.

CVE-2020-27871 solarwinds vulnerability CVSS: 9.0 10 Feb 2021, 23:15 UTC

This vulnerability allows remote attackers to create arbitrary files on affected installations of SolarWinds Orion Platform 2020.2.1. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within VulnerabilitySettings.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-11902.

CVE-2020-27870 solarwinds vulnerability CVSS: 4.0 10 Feb 2021, 23:15 UTC

This vulnerability allows remote attackers to disclose sensitive information on affected installations of SolarWinds Orion Platform 2020.2.1. Authentication is required to exploit this vulnerability. The specific flaw exists within ExportToPDF.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-11917.

CVE-2021-25276 solarwinds vulnerability CVSS: 3.6 03 Feb 2021, 17:15 UTC

In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges.

CVE-2021-25275 solarwinds vulnerability CVSS: 2.1 03 Feb 2021, 17:15 UTC

SolarWinds Orion Platform before 2020.2.4, as used by various SolarWinds products, installs and uses a SQL Server backend, and stores database credentials to access this backend in a file readable by unprivileged users. As a result, any user having access to the filesystem can read database login details from that file, including the login name and its associated password. Then, the credentials can be used to get database owner access to the SWNetPerfMon.DB database. This gives access to the data collected by SolarWinds applications, and leads to admin access to the applications by inserting or changing authentication data stored in the Accounts table of the database.

CVE-2021-25274 solarwinds vulnerability CVSS: 10.0 03 Feb 2021, 17:15 UTC

The Collector Service in SolarWinds Orion Platform before 2020.2.4 uses MSMQ (Microsoft Message Queue) and doesn't set permissions on its private queues. As a result, remote unauthenticated clients can send messages to TCP port 1801 that the Collector Service will process. Additionally, upon processing of such messages, the service deserializes them in insecure manner, allowing remote arbitrary code execution as LocalSystem.

CVE-2020-35482 solarwinds vulnerability CVSS: 3.5 03 Feb 2021, 16:15 UTC

SolarWinds Serv-U before 15.2.2 allows authenticated reflected XSS.

CVE-2020-35481 solarwinds vulnerability CVSS: 7.5 03 Feb 2021, 16:15 UTC

SolarWinds Serv-U before 15.2.2 allows Unauthenticated Macro Injection.

CVE-2020-28001 solarwinds vulnerability CVSS: 3.5 03 Feb 2021, 16:15 UTC

SolarWinds Serv-U before 15.2.2 allows Authenticated Stored XSS.

CVE-2020-27994 solarwinds vulnerability CVSS: 4.0 03 Feb 2021, 16:15 UTC

SolarWinds Serv-U before 15.2.2 allows Authenticated Directory Traversal.

CVE-2019-16961 solarwinds vulnerability CVSS: 3.5 15 Jan 2021, 14:15 UTC

SolarWinds Web Help Desk 12.7.0 allows XSS via a Schedule Name.

CVE-2019-16954 solarwinds vulnerability CVSS: 4.9 06 Jan 2021, 17:15 UTC

SolarWinds Web Help Desk 12.7.0 allows HTML injection via a Comment in a Help Request ticket.

CVE-2019-16960 solarwinds vulnerability CVSS: 3.5 04 Jan 2021, 08:15 UTC

SolarWinds Web Help Desk 12.7.0 allows XSS via a CSV template file with a crafted Location Name field.

CVE-2019-16956 solarwinds vulnerability CVSS: 3.5 04 Jan 2021, 08:15 UTC

SolarWinds Web Help Desk 12.7.0 allows XSS via the Request Type parameter of a ticket.

CVE-2020-10148 solarwinds vulnerability CVSS: 7.5 29 Dec 2020, 22:15 UTC

The SolarWinds Orion API is vulnerable to an authentication bypass that could allow a remote attacker to execute API commands. This vulnerability could allow a remote attacker to bypass authentication and execute API commands which may result in a compromise of the SolarWinds instance. SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 with no hotfix installed, and 2020.2 HF 1 are affected.

CVE-2019-16959 solarwinds vulnerability CVSS: 4.0 21 Dec 2020, 16:15 UTC

SolarWinds Web Help Desk 12.7.0 allows CSV Injection, also known as Formula Injection, via a file attached to a ticket.

CVE-2019-16957 solarwinds vulnerability CVSS: 3.5 18 Dec 2020, 09:15 UTC

SolarWinds Web Help Desk 12.7.0 allows XSS via the First Name field of a User Account.

CVE-2019-16955 solarwinds vulnerability CVSS: 3.5 18 Dec 2020, 09:15 UTC

SolarWinds Web Help Desk 12.7.0 allows XSS via an uploaded SVG document in a request.

CVE-2020-25622 solarwinds vulnerability CVSS: 6.8 16 Dec 2020, 15:15 UTC

An issue was discovered in SolarWinds N-Central 12.3.0.670. The AdvancedScripts HTTP endpoint allows CSRF.

CVE-2020-25621 solarwinds vulnerability CVSS: 2.1 16 Dec 2020, 15:15 UTC

An issue was discovered in SolarWinds N-Central 12.3.0.670. The local database does not require authentication: security is only based on ability to access a network interface. The database has keys and passwords.

CVE-2020-25620 solarwinds vulnerability CVSS: 4.6 16 Dec 2020, 15:15 UTC

An issue was discovered in SolarWinds N-Central 12.3.0.670. Hard-coded Credentials exist by default for local user accounts named support@n-able.com and nableadmin@n-able.com. These allow logins to the N-Central Administrative Console (NAC) and/or the regular web interface.

CVE-2020-25619 solarwinds vulnerability CVSS: 3.6 16 Dec 2020, 14:15 UTC

An issue was discovered in SolarWinds N-Central 12.3.0.670. The SSH component does not restrict the Communication Channel to Intended Endpoints. An attacker can leverage an SSH feature (port forwarding with a temporary key pair) to access network services on the 127.0.0.1 interface, even though this feature was only intended for user-to-agent communication.

CVE-2020-25618 solarwinds vulnerability CVSS: 9.0 16 Dec 2020, 14:15 UTC

An issue was discovered in SolarWinds N-Central 12.3.0.670. The sudo configuration has incorrect access control because the nable web user account is effectively able to run arbitrary OS commands as root (i.e., the use of root privileges is not limited to specific programs listed in the sudoers file).

CVE-2020-25617 solarwinds vulnerability CVSS: 9.0 16 Dec 2020, 14:15 UTC

An issue was discovered in SolarWinds N-Central 12.3.0.670. The AdvancedScripts HTTP endpoint allows Relative Path Traversal by an authenticated user of the N-Central Administration Console (NAC), leading to execution of OS commands as root.

CVE-2018-16243 solarwinds vulnerability CVSS: 3.5 15 Dec 2020, 23:15 UTC

SolarWinds Database Performance Analyzer (DPA) 11.1.468 and 12.0.3074 have several persistent XSS vulnerabilities, related to logViewer.iwc, centralManage.cen, userAdministration.iwc, database.iwc, alertManagement.iwc, eventAnnotations.iwc, and central.cen.

CVE-2019-16958 solarwinds vulnerability CVSS: 3.5 01 Dec 2020, 18:15 UTC

Cross-site Scripting (XSS) vulnerability in SolarWinds Web Help Desk 12.7.0 allows attacker to inject arbitrary web script or HTML via Location Name.

CVE-2020-15910 solarwinds vulnerability CVSS: 4.3 19 Oct 2020, 13:15 UTC

SolarWinds N-Central version 12.3 GA and lower does not set the JSESSIONID attribute to HTTPOnly. This makes it possible to influence the cookie with javascript. An attacker could send the user to a prepared webpage or by influencing JavaScript to the extract the JESSIONID. This could then be forwarded to the attacker.

CVE-2020-15909 solarwinds vulnerability CVSS: 6.8 19 Oct 2020, 13:15 UTC

SolarWinds N-central through 2020.1 allows session hijacking and requires user interaction or physical access. The N-Central JSESSIONID cookie attribute is not checked against multiple sources such as sourceip, MFA claim, etc. as long as the victim stays logged in within N-Central. To take advantage of this, cookie could be stolen and the JSESSIONID can be captured. On its own this is not a surprising result; low security tools allow the cookie to roam from machine to machine. The JSESSION cookie can then be used on the attackers’ workstation by browsing to the victim’s NCentral server URL and replacing the JSESSIONID attribute value by the captured value. Expected behavior would be to check this against a second source and enforce at least a reauthentication or multi factor request as N-Central is a highly privileged service.

CVE-2020-13169 solarwinds vulnerability CVSS: 3.5 17 Sep 2020, 18:15 UTC

Stored XSS (Cross-Site Scripting) exists in the SolarWinds Orion Platform before before 2020.2.1 on multiple forms and pages. This vulnerability may lead to the Information Disclosure and Escalation of Privileges (takeover of administrator account).

CVE-2020-15576 solarwinds vulnerability CVSS: 5.0 07 Jul 2020, 14:15 UTC

SolarWinds Serv-U File Server before 15.2.1 allows information disclosure via an HTTP response.

CVE-2020-15575 solarwinds vulnerability CVSS: 4.3 07 Jul 2020, 14:15 UTC

SolarWinds Serv-U File Server before 15.2.1 allows XSS as demonstrated by Tenable Scan, aka Case Number 00484194.

CVE-2020-15574 solarwinds vulnerability CVSS: 5.0 07 Jul 2020, 14:15 UTC

SolarWinds Serv-U File Server before 15.2.1 mishandles the Same-Site cookie attribute, aka Case Number 00331893.

CVE-2020-15573 solarwinds vulnerability CVSS: 4.3 07 Jul 2020, 14:15 UTC

SolarWinds Serv-U File Server before 15.2.1 has a "Cross-script vulnerability," aka Case Numbers 00041778 and 00306421.

CVE-2020-15543 solarwinds vulnerability CVSS: 7.5 05 Jul 2020, 22:15 UTC

SolarWinds Serv-U FTP server before 15.2.1 does not validate an argument path.

CVE-2020-15542 solarwinds vulnerability CVSS: 7.5 05 Jul 2020, 22:15 UTC

SolarWinds Serv-U FTP server before 15.2.1 mishandles the CHMOD command.

CVE-2020-15541 solarwinds vulnerability CVSS: 7.5 05 Jul 2020, 22:15 UTC

SolarWinds Serv-U FTP server before 15.2.1 allows remote command execution.

CVE-2020-14007 solarwinds vulnerability CVSS: 3.5 24 Jun 2020, 14:15 UTC

Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a name of an alert definition.

CVE-2020-14006 solarwinds vulnerability CVSS: 3.5 24 Jun 2020, 14:15 UTC

Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a Responsible Team.

CVE-2020-14005 solarwinds vulnerability CVSS: 9.0 24 Jun 2020, 14:15 UTC

Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows remote attackers to execute arbitrary code via a defined event.

CVE-2020-13912 solarwinds vulnerability CVSS: 6.0 07 Jun 2020, 21:15 UTC

SolarWinds Advanced Monitoring Agent before 10.8.9 allows local users to gain privileges via a Trojan horse .exe file, because everyone can write to a certain .exe file.

CVE-2019-12864 solarwinds vulnerability CVSS: 2.1 04 May 2020, 14:15 UTC

SolarWinds Orion Platform 2018.4 HF3 (NPM 12.4, NetPath 1.1.4) is vulnerable to Information Leakage, because of improper error handling with stack traces, as demonstrated by discovering a full pathname upon a 500 Internal Server Error via the api2/swis/query?lang=en-us&swAlertOnError=false query parameter.

CVE-2019-20002 solarwinds vulnerability CVSS: 6.0 27 Apr 2020, 15:15 UTC

Formula Injection exists in the export feature in SolarWinds WebHelpDesk 12.7.1 via a value (provided by a low-privileged user in the Subject field of a help request form) that is mishandled in a TicketActions/view?tab=group TSV export by an admin user.

CVE-2020-5734 solarwinds vulnerability CVSS: 4.3 07 Apr 2020, 14:15 UTC

Classic buffer overflow in SolarWinds Dameware allows a remote, unauthenticated attacker to cause a denial of service by sending a large 'SigPubkeyLen' during ECDH key exchange.

CVE-2019-12769 solarwinds vulnerability CVSS: 6.8 18 Mar 2020, 19:15 UTC

SolarWinds Serv-U Managed File Transfer (MFT) Web client before 15.1.6 Hotfix 2 is vulnerable to Cross-Site Request Forgery in the file upload functionality via ?Command=Upload with the Dir and File parameters.

CVE-2019-12863 solarwinds vulnerability CVSS: 3.5 25 Feb 2020, 17:15 UTC

SolarWinds Orion Platform 2018.4 HF3 (NPM 12.4, NetPath 1.1.4) allows Stored HTML Injection by administrators via the Web Console Settings screen.

CVE-2019-12954 solarwinds vulnerability CVSS: 3.5 17 Feb 2020, 17:15 UTC

SolarWinds Network Performance Monitor (Orion Platform 2018, NPM 12.3, NetPath 1.1.3) allows XSS by authenticated users via a crafted onerror attribute of a VIDEO element in an action for an ALERT.

CVE-2020-7984 solarwinds vulnerability CVSS: 5.0 26 Jan 2020, 21:15 UTC

SolarWinds N-central before 12.1 SP1 HF5 and 12.2 before SP1 HF2 allows remote attackers to retrieve cleartext domain admin credentials from the Agent & Probe settings, and obtain other sensitive information. The attacker can use a customer ID to self register and read any aspects of the agent/appliance configuration.

CVE-2019-17127 solarwinds vulnerability CVSS: 4.3 17 Jan 2020, 18:15 UTC

A Stored Client Side Template Injection (CSTI) with Angular was discovered in the SolarWinds Orion Platform 2019.2 HF1 in many application forms. An attacker can inject an Angular expression and escape the Angular sandbox to achieve stored XSS. This can lead to privilege escalation.

CVE-2019-17125 solarwinds vulnerability CVSS: 4.3 17 Jan 2020, 18:15 UTC

A Reflected Client Side Template Injection (CSTI) with Angular was discovered in the SolarWinds Orion Platform 2019.2 HF1 in many forms. An attacker can inject an Angular expression and escape the Angular sandbox to achieve stored XSS.

CVE-2019-19829 solarwinds vulnerability CVSS: 3.5 18 Dec 2019, 18:15 UTC

A cross-site scripting (XSS) vulnerability exists in SolarWinds Serv-U FTP Server 15.1.7 in the email parameter, a different vulnerability than CVE-2018-19934 and CVE-2019-13182.

CVE-2019-13182 solarwinds vulnerability CVSS: 3.5 16 Dec 2019, 21:15 UTC

A stored cross-site scripting (XSS) vulnerability exists in the web UI of SolarWinds Serv-U FTP Server 15.1.7.

CVE-2019-13181 solarwinds vulnerability CVSS: 4.0 16 Dec 2019, 21:15 UTC

A CSV injection vulnerability exists in the web UI of SolarWinds Serv-U FTP Server v15.1.7.

CVE-2019-3980 solarwinds vulnerability CVSS: 10.0 08 Oct 2019, 20:15 UTC

The Solarwinds Dameware Mini Remote Client agent v12.1.0.89 supports smart card authentication which can allow a user to upload an executable to be executed on the DWRCS.exe host. An unauthenticated, remote attacker can request smart card login and upload and execute an arbitrary executable run under the Local System account.

CVE-2018-19386 solarwinds vulnerability CVSS: 4.3 14 Aug 2019, 20:15 UTC

SolarWinds Database Performance Analyzer 11.1.457 contains an instance of Reflected XSS in its idcStateError component, where the page parameter is reflected into the HREF of the 'Try Again' Button on the page, aka a /iwc/idcStateError.iwc?page= URI.

CVE-2018-13442 solarwinds vulnerability CVSS: 6.5 16 Jul 2019, 18:15 UTC

SolarWinds Network Performance Monitor 12.3 allows SQL Injection via the /api/ActiveAlertsOnThisEntity/GetActiveAlerts TriggeringObjectEntityNames parameter.

CVE-2019-12181 solarwinds vulnerability CVSS: 6.5 17 Jun 2019, 16:15 UTC

A privilege escalation vulnerability exists in SolarWinds Serv-U before 15.1.7 for Linux.

CVE-2019-3957 solarwinds vulnerability CVSS: 5.8 07 Jun 2019, 21:29 UTC

Dameware Remote Mini Control version 12.1.0.34 and prior contains an unauthenticated remote buffer over-read due to the server not properly validating RsaSignatureLen during key negotiation, which could crash the application or leak sensitive information.

CVE-2018-19999 solarwinds vulnerability CVSS: 7.2 07 Jun 2019, 17:29 UTC

The local management interface in SolarWinds Serv-U FTP Server 15.1.6.25 has incorrect access controls that permit local users to bypass authentication in the application and execute code in the context of the Windows SYSTEM account, leading to privilege escalation. To exploit this vulnerability, an attacker must have local access the the host running Serv-U, and a Serv-U administrator have an active management console session.

CVE-2019-9017 solarwinds vulnerability CVSS: 5.0 02 May 2019, 19:29 UTC

DWRCC in SolarWinds DameWare Mini Remote Control 10.0 x64 has a Buffer Overflow associated with the size field for the machine name.

CVE-2018-19934 solarwinds vulnerability CVSS: 3.5 21 Mar 2019, 16:00 UTC

SolarWinds Serv-U FTP Server 15.1.6.25 has reflected cross-site scripting (XSS) in the Web management interface via URL path and HTTP POST parameter.

CVE-2018-15906 solarwinds vulnerability CVSS: 9.0 21 Mar 2019, 16:00 UTC

SolarWinds Serv-U FTP Server 15.1.6 allows remote authenticated users to execute arbitrary code by leveraging the Import feature and modifying a CSV file.

CVE-2019-9546 solarwinds vulnerability CVSS: 7.5 01 Mar 2019, 22:29 UTC

SolarWinds Orion Platform before 2018.4 Hotfix 2 allows privilege escalation through the RabbitMQ service.

CVE-2019-8917 solarwinds vulnerability CVSS: 10.0 18 Feb 2019, 19:29 UTC

SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may be abused by an attacker to execute commands as the SYSTEM user.

CVE-2018-16792 solarwinds vulnerability CVSS: 6.4 05 Dec 2018, 22:29 UTC

SolarWinds SFTP/SCP server through 2018-09-10 is vulnerable to XXE via a world readable and writable configuration file that allows an attacker to exfiltrate data.

CVE-2018-16791 solarwinds vulnerability CVSS: 5.0 05 Dec 2018, 22:29 UTC

In SolarWinds SFTP/SCP Server through 2018-09-10, the configuration file is world readable and writable, and stores user passwords in an insecure manner, allowing an attacker to determine passwords for potentially privileged accounts. This also grants the attacker an ability to backdoor the server.

CVE-2018-12897 solarwinds vulnerability CVSS: 4.6 07 Sep 2018, 22:29 UTC

SolarWinds DameWare Mini Remote Control before 12.1 has a Buffer Overflow.

CVE-2018-10241 solarwinds vulnerability CVSS: 4.0 16 May 2018, 14:29 UTC

A denial of service vulnerability in SolarWinds Serv-U before 15.1.6 HFv1 allows an authenticated user to crash the application (with a NULL pointer dereference) via a specially crafted URL beginning with the /Web%20Client/ substring.

CVE-2018-10240 solarwinds vulnerability CVSS: 5.0 16 May 2018, 14:29 UTC

SolarWinds Serv-U MFT before 15.1.6 HFv1 assigns authenticated users a low-entropy session token that can be included in requests to the application as a URL parameter in lieu of a session cookie. This session token's value can be brute-forced by an attacker to obtain the corresponding session cookie and hijack the user's session.

CVE-2017-9538 solarwinds vulnerability CVSS: 4.0 03 Oct 2017, 01:29 UTC

The 'Upload logo from external path' function of SolarWinds Network Performance Monitor version 12.0.15300.90 allows remote attackers to cause a denial of service (permanent display of a "Cannot exit above the top directory" error message throughout the entire web application) via a ".." in the path field. In other words, the denial of service is caused by an incorrect implementation of a directory-traversal protection mechanism.

CVE-2017-9537 solarwinds vulnerability CVSS: 3.5 03 Oct 2017, 01:29 UTC

Persistent cross-site scripting (XSS) in the Add Node function of SolarWinds Network Performance Monitor version 12.0.15300.90 allows remote attackers to introduce arbitrary JavaScript into various vulnerable parameters.

CVE-2017-7722 solarwinds vulnerability CVSS: 10.0 12 Apr 2017, 16:59 UTC

In SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4, a menu system is encountered when the SSH service is accessed with "cmc" and "password" (the default username and password). By exploiting a vulnerability in the restrictssh feature of the menuing script, an attacker can escape from the restricted shell.

CVE-2017-7647 solarwinds vulnerability CVSS: 6.5 10 Apr 2017, 19:59 UTC

SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4 allows an authenticated user to execute arbitrary commands.

CVE-2017-7646 solarwinds vulnerability CVSS: 4.0 10 Apr 2017, 19:59 UTC

SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4 allows an authenticated user to browse the server's filesystem and read the contents of arbitrary files contained within.

CVE-2017-5199 solarwinds vulnerability CVSS: 6.5 24 Mar 2017, 07:59 UTC

The editbanner feature in SolarWinds LEM (aka SIEM) through 6.3.1 allows remote authenticated users to execute arbitrary code by editing /usr/local/contego/scripts/mgrconfig.pl.

CVE-2017-5198 solarwinds vulnerability CVSS: 7.2 24 Mar 2017, 07:59 UTC

SolarWinds LEM (aka SIEM) before 6.3.1 has an incorrect sudo configuration, which allows local users to obtain root access by editing /usr/local/contego/scripts/hostname.sh.

CVE-2017-6803 solarwinds vulnerability CVSS: 6.8 20 Mar 2017, 16:59 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface in the Scheduler in SolarWinds (formerly Serv-U) FTP Voyager 16.2.0 allow remote attackers to hijack the authentication of users for requests that (1) change the admin password, (2) terminate the scheduler, or (3) possibly execute arbitrary commands via crafted requests to Admin/XML/Result.xml.

CVE-2016-5709 solarwinds vulnerability CVSS: 1.9 24 Jun 2016, 17:59 UTC

SolarWinds Virtualization Manager 6.3.1 and earlier uses weak encryption to store passwords in /etc/shadow, which allows local users with superuser privileges to obtain user passwords via a brute force attack.

CVE-2016-3643 solarwinds vulnerability CVSS: 7.2 17 Jun 2016, 15:59 UTC

SolarWinds Virtualization Manager 6.3.1 and earlier allow local users to gain privileges by leveraging a misconfiguration of sudo, as demonstrated by "sudo cat /etc/passwd."

CVE-2016-3642 solarwinds vulnerability CVSS: 10.0 17 Jun 2016, 15:59 UTC

The RMI service in SolarWinds Virtualization Manager 6.3.1 and earlier allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

CVE-2016-4350 solarwinds vulnerability CVSS: 10.0 09 May 2016, 20:59 UTC

Multiple SQL injection vulnerabilities in the Web Services web server in SolarWinds Storage Resource Monitor (SRM) Profiler (formerly Storage Manager (STM)) before 6.2.3 allow remote attackers to execute arbitrary SQL commands via the (1) ScriptSchedule parameter in the ScriptServlet servlet; the (2) winEventId or (3) winEventLog parameter in the WindowsEventLogsServlet servlet; the (4) processOS parameter in the ProcessesServlet servlet; the (5) group, (6) groupName, or (7) clientName parameter in the BackupExceptionsServlet servlet; the (8) valDB or (9) valFS parameter in the BackupAssociationServlet servlet; the (10) orderBy or (11) orderDir parameter in the HostStorageServlet servlet; the (12) fileName, (13) sortField, or (14) sortDirection parameter in the DuplicateFilesServlet servlet; the (15) orderFld or (16) orderDir parameter in the QuantumMonitorServlet servlet; the (17) exitCode parameter in the NbuErrorMessageServlet servlet; the (18) udfName, (19) displayName, (20) udfDescription, (21) udfDataValue, (22) udfSectionName, or (23) udfId parameter in the UserDefinedFieldConfigServlet servlet; the (24) sortField or (25) sortDirection parameter in the XiotechMonitorServlet servlet; the (26) sortField or (27) sortDirection parameter in the BexDriveUsageSummaryServlet servlet; the (28) state parameter in the ScriptServlet servlet; the (29) assignedNames parameter in the FileActionAssignmentServlet servlet; the (30) winEventSource parameter in the WindowsEventLogsServlet servlet; or the (31) name, (32) ipOne, (33) ipTwo, or (34) ipThree parameter in the XiotechMonitorServlet servlet.

CVE-2015-8220 solarwinds vulnerability CVSS: 7.5 17 Nov 2015, 15:59 UTC

Stack-based buffer overflow in the URI handler in DWRCC.exe in SolarWinds DameWare Mini Remote Control before 12.0 HotFix 1 allows remote attackers to execute arbitrary code via a crafted commandline argument in a link.

CVE-2015-7840 solarwinds vulnerability CVSS: 7.5 15 Oct 2015, 20:59 UTC

The command line management console (CMC) in SolarWinds Log and Event Manager (LEM) before 6.2.0 allows remote attackers to execute arbitrary code via unspecified vectors involving the ping feature.

CVE-2015-7839 solarwinds vulnerability CVSS: 7.5 15 Oct 2015, 20:59 UTC

SolarWinds Log and Event Manager (LEM) allows remote attackers to execute arbitrary commands on managed computers via a request to services/messagebroker/nonsecurestreamingamf involving the traceroute functionality.

CVE-2015-7838 solarwinds vulnerability CVSS: 10.0 15 Oct 2015, 20:59 UTC

ProcessFileUpload.jsp in SolarWinds Storage Manager before 6.2 allows remote attackers to upload and execute arbitrary files via unspecified vectors.

CVE-2015-5371 solarwinds vulnerability CVSS: 10.0 06 Jul 2015, 14:59 UTC

The AuthenticationFilter class in SolarWinds Storage Manager allows remote attackers to upload and execute arbitrary scripts via unspecified vectors.

CVE-2015-2284 solarwinds vulnerability CVSS: 10.0 24 Mar 2015, 17:59 UTC

userlogin.jsp in SolarWinds Firewall Security Manager (FSM) before 6.6.5 HotFix1 allows remote attackers to gain privileges and execute arbitrary code via unspecified vectors, related to client session handling.

CVE-2014-9566 solarwinds vulnerability CVSS: 7.5 10 Mar 2015, 14:59 UTC

Multiple SQL injection vulnerabilities in the Manage Accounts page in the AccountManagement.asmx service in the Solarwinds Orion Platform 2015.1, as used in Network Performance Monitor (NPM) before 11.5, NetFlow Traffic Analyzer (NTA) before 4.1, Network Configuration Manager (NCM) before 7.3.2, IP Address Manager (IPAM) before 4.3, User Device Tracker (UDT) before 3.2, VoIP & Network Quality Manager (VNQM) before 4.2, Server & Application Manager (SAM) before 6.2, Web Performance Monitor (WPM) before 2.2, and possibly other Solarwinds products, allow remote authenticated users to execute arbitrary SQL commands via the (1) dir or (2) sort parameter to the (a) GetAccounts or (b) GetAccountGroups endpoint.

CVE-2015-1501 solarwinds vulnerability CVSS: 6.8 16 Feb 2015, 15:59 UTC

The factory.loadExtensionFactory function in TSUnicodeGraphEditorControl in SolarWinds Server and Application Monitor (SAM) allow remote attackers to execute arbitrary code via a UNC path to a crafted binary.

CVE-2015-1500 solarwinds vulnerability CVSS: 6.8 16 Feb 2015, 15:59 UTC

Multiple stack-based buffer overflows in the TSUnicodeGraphEditorControl in SolarWinds Server and Application Monitor (SAM) allow remote attackers to execute arbitrary code via unspecified vectors to (1) graphManager.load or (2) factory.load.

CVE-2014-5504 solarwinds vulnerability CVSS: 7.5 04 Sep 2014, 17:55 UTC

SolarWinds Log and Event Manager before 6.0 uses "static" credentials, which makes it easier for remote attackers to obtain access to the database and execute arbitrary code via unspecified vectors, related to HyperSQL.

CVE-2014-3459 solarwinds vulnerability CVSS: 6.8 07 Aug 2014, 11:13 UTC

Heap-based buffer overflow in SolarWinds Network Configuration Manager (NCM) before 7.3 allows remote attackers to execute arbitrary code via the PEstrarg1 property.

CVE-2013-3249 solarwinds vulnerability CVSS: 9.3 20 Mar 2014, 16:55 UTC

Stack-based buffer overflow in the "Add from text file" feature in the DameWare Exporter tool (DWExporter.exe) in DameWare Remote Support 10.0.0.372, 9.0.1.247, and earlier allows user-assisted attackers to execute arbitrary code via unspecified vectors.

CVE-2012-4939 solarwinds vulnerability CVSS: 4.3 31 Oct 2012, 19:55 UTC

Cross-site scripting (XSS) vulnerability in IPAMSummaryView.aspx in the IPAM web interface before 3.0-HotFix1 in SolarWinds Orion Network Performance Monitor might allow remote attackers to inject arbitrary web script or HTML via the "Search for an IP address" field.

CVE-2012-2602 solarwinds vulnerability CVSS: 6.8 12 Aug 2012, 16:55 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in SolarWinds Orion Network Performance Monitor (NPM) before 10.3.1 allow remote attackers to hijack the authentication of administrators for requests that (1) create user accounts via CreateUserStepContainer actions to Admin/Accounts/Add/OrionAccount.aspx or (2) modify account privileges via a ynAdminRights action to Admin/Accounts/EditAccount.aspx.

CVE-2012-2577 solarwinds vulnerability CVSS: 4.3 12 Aug 2012, 16:55 UTC

Multiple cross-site scripting (XSS) vulnerabilities in SolarWinds Orion Network Performance Monitor (NPM) before 10.3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) syslocation, (2) syscontact, or (3) sysName field of an snmpd.conf file.

CVE-2011-4800 solarwinds vulnerability CVSS: 9.0 14 Dec 2011, 00:55 UTC

Directory traversal vulnerability in Serv-U FTP Server before 11.1.0.5 allows remote authenticated users to read and write arbitrary files, and list and create arbitrary directories, via a "..:/" (dot dot colon forward slash) in the (1) list, (2) put, or (3) get commands.

CVE-2010-4828 solarwinds vulnerability CVSS: 4.3 24 Aug 2011, 10:55 UTC

Multiple cross-site scripting (XSS) vulnerabilities in SolarWinds Orion Network Performance Monitor (NPM) 10.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Title parameter to MapView.aspx; NetObject parameter to (2) NodeDetails.aspx and (3) InterfaceDetails.aspx; and the (4) ChartName parameter to CustomChart.aspx.

CVE-2010-2310 solarwinds vulnerability CVSS: 5.0 16 Jun 2010, 20:30 UTC

SolarWinds TFTP Server 10.4.0.13 allows remote attackers to cause a denial of service (crash) via a long write request.

CVE-2010-2115 solarwinds vulnerability CVSS: 5.0 28 May 2010, 20:30 UTC

SolarWinds TFTP Server 10.4.0.10 allows remote attackers to cause a denial of service (no new connections) via a crafted read request.

CVE-2009-4815 solarwinds vulnerability CVSS: 4.0 27 Apr 2010, 15:30 UTC

Directory traversal vulnerability in Serv-U before 9.2.0.1 allows remote authenticated users to read arbitrary files via unspecified vectors.

CVE-2009-4006 solarwinds vulnerability CVSS: 10.0 20 Nov 2009, 11:30 UTC

Stack-based buffer overflow in the TEA decoding algorithm in RhinoSoft Serv-U FTP server 7.0.0.1, 9.0.0.5, and other versions before 9.1.0.0 allows remote attackers to execute arbitrary code via a long hexadecimal string.

CVE-2009-3655 solarwinds vulnerability CVSS: 5.0 09 Oct 2009, 14:30 UTC

Rhino Software Serv-U 7.0.0.1 through 8.2.0.3 allows remote attackers to cause a denial of service (server crash) via unspecified vectors related to the "SITE SET TRANSFERPROGRESS ON" FTP command.

CVE-2009-3115 solarwinds vulnerability CVSS: 5.0 09 Sep 2009, 22:30 UTC

SolarWinds TFTP Server 9.2.0.111 and earlier allows remote attackers to cause a denial of service (service stop) via a crafted Option Acknowledgement (OACK) request. NOTE: some of these details are obtained from third party information.

CVE-2009-1031 solarwinds vulnerability CVSS: 7.8 20 Mar 2009, 00:30 UTC

Directory traversal vulnerability in the FTP server in Rhino Software Serv-U File Server 7.0.0.1 through 7.4.0.1 allows remote attackers to create arbitrary directories via a \.. (backslash dot dot) in an MKD request.

CVE-2009-0967 solarwinds vulnerability CVSS: 4.0 19 Mar 2009, 10:30 UTC

The FTP server in Serv-U 7.0.0.1 through 7.4.0.1 allows remote authenticated users to cause a denial of service (service hang) via a large number of SMNT commands without an argument.

CVE-2008-4501 solarwinds vulnerability CVSS: 9.0 09 Oct 2008, 00:00 UTC

Directory traversal vulnerability in the FTP server in Serv-U 7.0.0.1 through 7.3, including 7.2.0.1, allows remote authenticated users to overwrite or create arbitrary files via a ..\ (dot dot backslash) in the RNTO command.

CVE-2008-4500 solarwinds vulnerability CVSS: 4.0 09 Oct 2008, 00:00 UTC

Serv-U 7.0.0.1 through 7.3, including 7.2.0.1, allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted stou command, probably related to MS-DOS device names, as demonstrated using "con:1".

CVE-2008-3731 solarwinds vulnerability CVSS: 4.0 20 Aug 2008, 16:41 UTC

Unspecified vulnerability in Serv-U File Server 7.0.0.1, and other versions before 7.2.0.1, allows remote authenticated users to cause a denial of service (daemon crash) via an SSH session with SFTP commands for directory creation and logging.

CVE-2006-1951 solarwinds vulnerability CVSS: 5.0 24 Apr 2006, 23:02 UTC

Directory traversal vulnerability in SolarWinds TFTP Server 8.1 and earlier allows remote attackers to download arbitrary files via a crafted GET request including "....//" sequences, which are collapsed into "../" sequences by filtering.

CVE-2005-3467 solarwinds vulnerability CVSS: 5.0 02 Nov 2005, 23:02 UTC

Serv-U FTP Server before 6.1.0.4 allows attackers to cause a denial of service (crash) via (1) malformed packets and possibly other unspecified issues with unknown impact and attack vectors including (2) use of "~" in a pathname, and (3) memory consumption of the daemon. NOTE: it is not clear whether items (2) and above are vulnerabilities.

CVE-2004-2532 solarwinds vulnerability CVSS: 10.0 31 Dec 2004, 05:00 UTC

Serv-U FTP server before 5.1.0.0 has a default account and password for local administration, which allows local users to execute arbitrary commands by connecting to the server using the default administrator account, creating a new user, logging in as that new user, and then using the SITE EXEC command.

CVE-2004-2111 solarwinds vulnerability CVSS: 8.5 31 Dec 2004, 05:00 UTC

Stack-based buffer overflow in the site chmod command in Serv-U FTP Server before 4.2 allows remote attackers to execute arbitrary code via a long filename.

CVE-2004-2533 solarwinds vulnerability CVSS: 5.0 31 Dec 2004, 05:00 UTC

Serv-U FTP Server 4.1 (possibly 4.0) allows remote attackers to cause a denial of service (application crash) via a SITE CHMOD command with a "\\...\" followed by a short string, causing partial memory corruption, a different vulnerability than CVE-2004-2111.

CVE-2004-0330 solarwinds vulnerability CVSS: 10.0 23 Nov 2004, 05:00 UTC

Buffer overflow in Serv-U ftp before 5.0.0.4 allows remote authenticated users to execute arbitrary code via a long time zone argument to the MDTM command.

CVE-2004-1675 solarwinds vulnerability CVSS: 5.0 11 Sep 2004, 04:00 UTC

Serv-U FTP server 4.x and 5.x allows remote attackers to cause a denial of service (application crash) via a STORE UNIQUE (STOU) command with an MS-DOS device name argument such as (1) COM1, (2) LPT1, (3) PRN, or (4) AUX.

CVE-2004-1992 solarwinds vulnerability CVSS: 5.0 20 Apr 2004, 04:00 UTC

Buffer overflow in Serv-U FTP server before 5.0.0.6 allows remote attackers to cause a denial of service (crash) via a long -l parameter, which triggers an out-of-bounds read.

CVE-2002-1542 solarwinds vulnerability CVSS: 5.0 31 Mar 2003, 05:00 UTC

SolarWinds TFTP server 5.0.55 and earlier allows remote attackers to cause a denial of service (crash) via a large UDP datagram, possibly triggering a buffer overflow.

CVE-2002-2393 solarwinds vulnerability CVSS: 5.0 31 Dec 2002, 05:00 UTC

Serv-U FTP server 3.0, 3.1 and 4.0.0.4 does not accept new connections while validating user folder access rights, which allows remote attackers to cause a denial of service (no new connections) via a series of MKD commands.

CVE-2002-1209 solarwinds vulnerability CVSS: 5.0 04 Nov 2002, 05:00 UTC

Directory traversal vulnerability in SolarWinds TFTP Server 5.0.55, and possibly earlier, allows remote attackers to read arbitrary files via "..\" (dot-dot backslash) sequences in a GET request.

CVE-2001-1463 solarwinds vulnerability CVSS: 7.5 19 Nov 2001, 05:00 UTC

The remote administration client for RhinoSoft Serv-U 3.0 sends the user password in plaintext even when S/KEY One-Time Password (OTP) authentication is enabled, which allows remote attackers to sniff passwords.

CVE-2001-0054 solarwinds vulnerability CVSS: 5.0 16 Feb 2001, 05:00 UTC

Directory traversal vulnerability in FTP Serv-U before 2.5i allows remote attackers to escape the FTP root and read arbitrary files by appending a string such as "/..%20." to a CD command, a variant of a .. (dot dot) attack.