Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
High
CVE-2024-28986
Disclosure Date: August 13, 2024 (last updated August 17, 2024)
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine.
While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.
However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
3
Attacker Value
Moderate
CVE-2024-28987
Disclosure Date: August 21, 2024 (last updated October 17, 2024)
The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
1
Attacker Value
Unknown
CVE-2024-28989
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
SolarWinds Web Help Desk was found to have a hardcoded cryptographic key that could allow the disclosure of sensitive information from the software.
0
Attacker Value
Unknown
CVE-2024-45709
Disclosure Date: December 10, 2024 (last updated December 21, 2024)
SolarWinds Web Help Desk was susceptible to a local file read vulnerability. This vulnerability requires the software be installed on Linux and configured to use non-default development/test mode making exposure to the vulnerability very limited.
0
Attacker Value
Unknown
CVE-2021-35251
Disclosure Date: March 07, 2022 (last updated October 07, 2023)
Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details about the Web Help Desk installation.
0
Attacker Value
Unknown
CVE-2021-35243
Disclosure Date: December 22, 2021 (last updated October 07, 2023)
The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.7 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity.
0
Attacker Value
Unknown
CVE-2021-32076
Disclosure Date: August 20, 2021 (last updated January 26, 2024)
Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the 'Web Help Desk Getting Started Wizard', especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback.
0
Attacker Value
Unknown
CVE-2019-16961
Disclosure Date: January 15, 2021 (last updated February 22, 2025)
SolarWinds Web Help Desk 12.7.0 allows XSS via a Schedule Name.
0
Attacker Value
Unknown
CVE-2019-16954
Disclosure Date: January 06, 2021 (last updated February 22, 2025)
SolarWinds Web Help Desk 12.7.0 allows HTML injection via a Comment in a Help Request ticket.
0
Attacker Value
Unknown
CVE-2019-16960
Disclosure Date: January 04, 2021 (last updated February 22, 2025)
SolarWinds Web Help Desk 12.7.0 allows XSS via a CSV template file with a crafted Location Name field.
0