Metrics
Affected Vendors & Products
Mon, 10 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Fri, 16 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Solarwinds web Help Desk
|
|
CPEs | cpe:2.3:a:solarwinds:web_help_desk:*:*:*:*:*:*:*:* cpe:2.3:a:solarwinds:web_help_desk:12.8.3:-:*:*:*:*:*:* |
|
Vendors & Products |
Solarwinds web Help Desk
|
Thu, 15 Aug 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Solarwinds
Solarwinds webhelpdesk |
|
CPEs | cpe:2.3:a:solarwinds:webhelpdesk:*:*:*:*:*:*:*:* | |
Vendors & Products |
Solarwinds
Solarwinds webhelpdesk |
|
Metrics |
ssvc
|
Wed, 14 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. |
Wed, 14 Aug 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. |
Tue, 13 Aug 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. |
Tue, 13 Aug 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. | |
Title | SolarWinds Web Help Desk Java Deserialization Remote Code Execution Vulnerability | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: SolarWinds
Published:
Updated: 2025-02-10T18:33:18.550Z
Reserved: 2024-03-13T20:27:09.782Z
Link: CVE-2024-28986

Updated: 2024-08-15T14:35:07.979Z

Status : Analyzed
Published: 2024-08-13T23:15:16.627
Modified: 2024-08-16T15:04:28.150
Link: CVE-2024-28986

No data.