Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mr2h-fcf6-jvx9

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data.

Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data.

EPSS

Процентиль: 98%
0.60058
Средний

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 8.9
nvd
больше 4 лет назад

Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data.

CVSS3: 8.9
fstec
больше 4 лет назад

Уязвимость компонента WSAsyncExecuteTasks программного обеспечения управления патчами SolarWinds Patch Manager, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 98%
0.60058
Средний

Дефекты

CWE-502