Metrics
Affected Vendors & Products
Tue, 21 Oct 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 10 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Fri, 16 Aug 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Solarwinds web Help Desk
|
|
| CPEs | cpe:2.3:a:solarwinds:web_help_desk:*:*:*:*:*:*:*:* cpe:2.3:a:solarwinds:web_help_desk:12.8.3:-:*:*:*:*:*:* |
|
| Vendors & Products |
Solarwinds web Help Desk
|
Thu, 15 Aug 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Solarwinds
Solarwinds webhelpdesk |
|
| CPEs | cpe:2.3:a:solarwinds:webhelpdesk:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Solarwinds
Solarwinds webhelpdesk |
|
| Metrics |
ssvc
|
Wed, 14 Aug 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. |
Wed, 14 Aug 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. |
Tue, 13 Aug 2024 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. |
Tue, 13 Aug 2024 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. | |
| Title | SolarWinds Web Help Desk Java Deserialization Remote Code Execution Vulnerability | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SolarWinds
Published: 2024-08-13T22:06:45.234Z
Updated: 2025-10-21T22:55:47.324Z
Reserved: 2024-03-13T20:27:09.782Z
Link: CVE-2024-28986
Updated: 2024-08-15T14:35:07.979Z
Status : Modified
Published: 2024-08-13T23:15:16.627
Modified: 2025-10-21T23:16:27.160
Link: CVE-2024-28986
No data.