Количество 3
Количество 3
CVE-2024-28986
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
GHSA-g536-h677-2w32
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
BDU:2024-06556
Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Desk (WHD), связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольные команды
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-28986 SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. | CVSS3: 9.8 | 84% Высокий | больше 1 года назад | |
GHSA-g536-h677-2w32 SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. | CVSS3: 9.8 | 84% Высокий | больше 1 года назад | |
BDU:2024-06556 Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Desk (WHD), связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольные команды | CVSS3: 9.8 | 84% Высокий | больше 1 года назад |
Уязвимостей на страницу