cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-28073,https://securityvulnerability.io/vulnerability/CVE-2024-28073,SolarWinds Serv-U Vulnerable to Directory Traversal Remote Code Execution,"A remote code vulnerability has been identified in SolarWinds Serv-U, which is susceptible to directory traversal issues. This security flaw enables attackers with high levels of privilege to manipulate file paths, potentially leading to unauthorized command execution. The exploitation requires access to a highly privileged user account, emphasizing the necessity for stringent access controls and regular security audits. Organizations leveraging SolarWinds Serv-U must ensure they are implementing the latest security patches to mitigate associated risks. For more information, please refer to the official advisory.",Solarwinds,Servu,7.2,HIGH,0.0004900000058114529,false,,false,false,false,,,false,false,,2024-04-17T16:58:12.353Z,0 CVE-2023-23841,https://securityvulnerability.io/vulnerability/CVE-2023-23841,"SolarWinds Serv-U Exposure of Sensitive Information Vulnerability ","The SolarWinds Serv-U product has identified a vulnerability where an HTTP request made during the modification of attributes for File Share or File Request inadvertently reveals sensitive data embedded within the URL. This flaw creates potential exposure of information that should remain confidential, making it critical for users to update their systems and implement recommended security measures promptly. More details can be found in the vendor's advisory and release notes.",Solarwinds,Servu,7.5,HIGH,0.0017500000540167093,false,,false,false,false,,,false,false,,2023-06-15T00:00:00.000Z,0