Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SolarWinds | Web Help Desk | 12.8.8 HF1 and below | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-40536.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-40553 | 9.8 CRITICAL | SolarWinds Web Help Desk Deserialization of Untrusted Data Remote Code Execution Vulnerabi |
| CVE-2025-40551 | 9.8 CRITICAL | SolarWinds Web Help Desk Deserialization of Untrusted Data Remote Code Execution Vulnerabi |
| CVE-2025-40552 | 9.8 CRITICAL | SolarWinds Web Help Desk Authentication Bypass Vulnerability |
| CVE-2025-40554 | 9.8 CRITICAL | SolarWinds Web Help Desk Authentication Bypass Vulnerability |
| CVE-2025-40537 | 7.5 HIGH | SolarWinds Web Help Desk Hardcoded Credentials Vulnerability |
No comments yet