Vulnerabilities
Vulnerable Software
SolarWinds Virtualization Manager 6.3.1 and earlier uses weak encryption to store passwords in /etc/shadow, which allows local users with superuser privileges to obtain user passwords via a brute force attack.
CVSS Score
4.7
EPSS Score
0.001
Published
2016-06-24
CVE-2016-3643
Known exploited
SolarWinds Virtualization Manager 6.3.1 and earlier allow local users to gain privileges by leveraging a misconfiguration of sudo, as demonstrated by "sudo cat /etc/passwd."
CVSS Score
7.8
EPSS Score
0.07
Published
2016-06-17
The RMI service in SolarWinds Virtualization Manager 6.3.1 and earlier allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
CVSS Score
9.8
EPSS Score
0.235
Published
2016-06-17


Contact Us

Shodan ® - All rights reserved