Vulnerabilities > Solarwinds > Orion Platform > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-09-13 | CVE-2023-23840 | Incorrect Comparison vulnerability in Solarwinds Orion Platform The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. | 7.2 |
2023-09-13 | CVE-2023-23845 | Incorrect Comparison vulnerability in Solarwinds Orion Platform The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. | 7.2 |
2023-04-21 | CVE-2022-36963 | Code Injection vulnerability in Solarwinds Orion Platform The SolarWinds Platform was susceptible to the Command Injection Vulnerability. | 7.2 |
2023-04-21 | CVE-2022-47505 | Improper Privilege Management vulnerability in Solarwinds Orion Platform The SolarWinds Platform was susceptible to the Local Privilege Escalation Vulnerability. | 7.8 |
2023-02-15 | CVE-2022-38111 | Deserialization of Untrusted Data vulnerability in Solarwinds Orion Platform 2022.4.1 SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. | 7.2 |
2023-02-15 | CVE-2022-47503 | Deserialization of Untrusted Data vulnerability in Solarwinds Orion Platform 2022.4.1 SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. | 7.2 |
2023-02-15 | CVE-2022-47504 | Deserialization of Untrusted Data vulnerability in Solarwinds Orion Platform 2022.4.1 SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. | 7.2 |
2023-02-15 | CVE-2022-47506 | Path Traversal vulnerability in Solarwinds Orion Platform 2022.4.1 SolarWinds Platform was susceptible to the Directory Traversal Vulnerability. | 7.8 |
2023-02-15 | CVE-2022-47507 | Deserialization of Untrusted Data vulnerability in Solarwinds Orion Platform 2022.4.1 SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. | 7.2 |
2023-02-15 | CVE-2023-23836 | Deserialization of Untrusted Data vulnerability in Solarwinds Orion Platform 2022.4.1 SolarWinds Platform version 2022.4.1 was found to be susceptible to the Deserialization of Untrusted Data. | 7.2 |