Show filters
50 Total Results
Displaying 31-40 of 50
Sort by:
Attacker Value
Unknown

CVE-2021-35212

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
An SQL injection Privilege Escalation Vulnerability was discovered in the Orion Platform reported by the ZDI Team. A blind Boolean SQL injection which could lead to full read/write over the Orion database content including the Orion certificate for any authenticated user.
Attacker Value
Unknown

CVE-2021-35239

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
A security researcher found a user with Orion map manage rights could store XSS through via text box hyperlink.
Attacker Value
Unknown

CVE-2021-35240

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
A security researcher stored XSS via a Help Server setting. This affects customers using Internet Explorer, because they do not support 'rel=noopener'.
Attacker Value
Unknown

CVE-2021-35222

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
This vulnerability allows attackers to impersonate users and perform arbitrary actions leading to a Remote Code Execution (RCE) from the Alerts Settings page.
Attacker Value
Unknown

CVE-2021-35221

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
Improper Access Control Tampering Vulnerability using ImportAlert function which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.
Attacker Value
Unknown

CVE-2021-35219

Disclosure Date: August 31, 2021 (last updated November 28, 2024)
ExportToPdfCmd Arbitrary File Read Information Disclosure Vulnerability using ImportAlert function within the Alerts Settings page.
Attacker Value
Unknown

CVE-2021-35220

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
Command Injection vulnerability in EmailWebPage API which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.
Attacker Value
Unknown

CVE-2021-28674

Disclosure Date: July 30, 2021 (last updated February 23, 2025)
The node management page in SolarWinds Orion Platform before 2020.2.5 HF1 allows an attacker to create or delete a node (outside of the attacker's perimeter) via an account with write permissions. This occurs because node IDs are predictable (with incrementing numbers) and the access control on Services/NodeManagement.asmx/DeleteObjNow is incorrect. To exploit this, an attacker must be authenticated and must have node management rights associated with at least one valid group on the platform.
Attacker Value
Unknown

CVE-2021-35215

Disclosure Date: July 15, 2021 (last updated February 23, 2025)
Insecure deserialization leading to Remote Code Execution was detected in the Orion Platform version 2020.2.5. Authentication is required to exploit this vulnerability.
Attacker Value
Unknown

CVE-2021-27277

Disclosure Date: April 22, 2021 (last updated February 22, 2025)
This vulnerability allows local attackers to escalate privileges on affected installations of SolarWinds Orion Virtual Infrastructure Monitor 2020.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the OneTimeJobSchedulerEventsService WCF service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-11955.