Vulnerabilities
Vulnerable Software
Solarwinds:  >> Serv-U  >> 15.3.1  Security Vulnerabilities
SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where remote code execution is possible depending on privileges given to the authenticated user. This issue requires a user to be authenticated and this is present when software environment variables are abused. Authentication is required for this vulnerability
CVSS Score
7.5
EPSS Score
0.016
Published
2024-10-16
Application is vulnerable to Cross Site Scripting (XSS) an authenticated attacker with users’ permissions can modify a variable with a payload.
CVSS Score
4.8
EPSS Score
0.0
Published
2024-10-16
CVE-2024-28995
Known exploited
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
CVSS Score
8.6
EPSS Score
0.944
Published
2024-06-06
A highly privileged account can overwrite arbitrary files on the system with log output. The log file path tags were not sanitized properly.
CVSS Score
5.7
EPSS Score
0.004
Published
2024-05-03
SolarWinds Serv-U was found to be susceptible to a Directory Traversal Remote Code Vulnerability. This vulnerability requires a highly privileged account to be exploited.
CVSS Score
8.4
EPSS Score
0.003
Published
2024-04-17
SolarWinds Serv-U is submitting an HTTP request when changing or updating the attributes for File Share or File request.  Part of the URL of the request discloses sensitive data. 
CVSS Score
7.5
EPSS Score
0.001
Published
2023-06-15
This vulnerability happens in the web client versions 15.3.0 to Serv-U 15.3.1. This vulnerability affects the directory creation function.
CVSS Score
5.4
EPSS Score
0.009
Published
2022-12-16
Common encryption key appears to be used across all deployed instances of Serv-U FTP Server. Because of this an encrypted value that is exposed to an attacker can be simply recovered to plaintext.
CVSS Score
7.5
EPSS Score
0.001
Published
2022-12-16


Contact Us

Shodan ® - All rights reserved