Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Solarwinds Subscribe
Total 204 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-35217 1 Solarwinds 1 Patch Manager 2021-11-03 6.5 MEDIUM 8.8 HIGH
Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data.
CVE-2021-35237 1 Solarwinds 1 Kiwi Syslog Server 2021-11-02 4.3 MEDIUM 4.3 MEDIUM
A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server.
CVE-2021-35231 1 Solarwinds 1 Kiwi Syslog Server 2021-10-28 4.6 MEDIUM 6.7 MEDIUM
As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".
CVE-2021-35227 1 Solarwinds 1 Access Rights Manager 2021-10-28 4.6 MEDIUM 7.8 HIGH
The HTTP interface was enabled for RabbitMQ Plugin in ARM 2020.2.6 and the ability to configure HTTPS was not available.
CVE-2021-35235 1 Solarwinds 1 Kiwi Syslog Server 2021-10-28 5.0 MEDIUM 5.3 MEDIUM
The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent.
CVE-2021-35233 1 Solarwinds 1 Kiwi Syslog Server 2021-10-28 5.0 MEDIUM 5.3 MEDIUM
The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies.
CVE-2021-35230 1 Solarwinds 1 Kiwi Cattools 2021-10-27 7.2 HIGH 6.7 MEDIUM
As a result of an unquoted service path vulnerability present in the Kiwi CatTools Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry.
CVE-2021-35228 1 Solarwinds 1 Database Performance Analyzer 2021-10-26 2.6 LOW 4.7 MEDIUM
This vulnerability occurred due to missing input sanitization for one of the output fields that is extracted from headers on specific section of page causing a reflective cross site scripting attack. An attacker would need to perform a Man in the Middle attack in order to change header for a remote victim.
CVE-2021-35214 1 Solarwinds 1 Pingdom 2021-10-18 1.9 LOW 4.7 MEDIUM
The vulnerability in SolarWinds Pingdom can be described as a failure to invalidate user session upon password or email address change. When running multiple active sessions in separate browser windows, it was observed a password or email address change could be changed without terminating the user session. This issue has been resolved on September 13, 2021.
CVE-2021-32076 1 Solarwinds 1 Web Help Desk 2021-09-23 5.0 MEDIUM 5.3 MEDIUM
Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the 'Web Help Desk Getting Started Wizard', especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback.
CVE-2021-35223 1 Solarwinds 1 Serv-u 2021-09-16 6.5 MEDIUM 8.8 HIGH
The Serv-U File Server allows for events such as user login failures to be audited by executing a command. This command can be supplied with parameters that can take the form of user string variables, allowing remote code execution.
CVE-2021-35238 1 Solarwinds 1 Orion Platform 2021-09-09 3.5 LOW 4.8 MEDIUM
User with Orion Platform Admin Rights could store XSS through URL POST parameter in CreateExternalWebsite website.
CVE-2021-35240 2 Microsoft, Solarwinds 2 Internet Explorer, Orion Platform 2021-09-09 3.5 LOW 4.8 MEDIUM
A security researcher stored XSS via a Help Server setting. This affects customers using Internet Explorer, because they do not support 'rel=noopener'.
CVE-2021-35222 2 Microsoft, Solarwinds 2 Windows, Orion Platform 2021-09-09 4.3 MEDIUM 9.6 CRITICAL
This vulnerability allows attackers to impersonate users and perform arbitrary actions leading to a Remote Code Execution (RCE) from the Alerts Settings page.
CVE-2021-35220 1 Solarwinds 1 Orion Platform 2021-09-08 6.5 MEDIUM 7.2 HIGH
Command Injection vulnerability in EmailWebPage API which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.
CVE-2021-35239 1 Solarwinds 1 Orion Platform 2021-09-08 3.5 LOW 5.4 MEDIUM
A security researcher found a user with Orion map manage rights could store XSS through via text box hyperlink.
CVE-2020-15574 1 Solarwinds 1 Serv-u 2021-07-21 5.0 MEDIUM 7.5 HIGH
SolarWinds Serv-U File Server before 15.2.1 mishandles the Same-Site cookie attribute, aka Case Number 00331893.
CVE-2020-25621 1 Solarwinds 1 N-central 2021-07-21 2.1 LOW 8.4 HIGH
An issue was discovered in SolarWinds N-Central 12.3.0.670. The local database does not require authentication: security is only based on ability to access a network interface. The database has keys and passwords.
CVE-2020-15541 1 Solarwinds 1 Serv-u Ftp Server 2021-07-21 7.5 HIGH 9.8 CRITICAL
SolarWinds Serv-U FTP server before 15.2.1 allows remote command execution.
CVE-2020-13912 1 Solarwinds 1 Advanced Monitoring Agent 2021-07-21 6.0 MEDIUM 7.3 HIGH
SolarWinds Advanced Monitoring Agent before 10.8.9 allows local users to gain privileges via a Trojan horse .exe file, because everyone can write to a certain .exe file.