SolarWinds Web Help Desk 12.7.0 allows HTML injection via a Comment in a Help Request ticket.
5.4CVSS
5.6AI Score
0.001EPSS
SolarWinds Web Help Desk 12.7.0 allows XSS via the Request Type parameter of a ticket.
5.4CVSS
5.3AI Score
0.001EPSS
SolarWinds Web Help Desk 12.7.0 allows XSS via a CSV template file with a crafted Location Name field.
5.4CVSS
5.1AI Score
0.001EPSS
5.4CVSS
5.2AI Score
0.001EPSS
Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the 'Web Help Desk Getting Started Wizard', especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP ...
5.3CVSS
5.2AI Score
0.001EPSS
The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.7 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the o...
7.5CVSS
7.7AI Score
0.001EPSS
Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details about the Web Help Desk installation.
5.3CVSS
5.1AI Score
0.001EPSS
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it w...