Sherpa Orchestrator
Monthly
In Sherpa Orchestrator 141851, the web application lacks protection against CSRF attacks, with resultant effects of an attacker conducting XSS attacks, adding a new user or role, or exploiting a SQL. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
In Sherpa Orchestrator 141851, multiple time-based blind SQL injections can be performed by an authenticated user. Rated low severity (CVSS 3.5), this vulnerability is remotely exploitable. No vendor patch available.
In Sherpa Orchestrator 141851, the functionality for adding or updating licenses allows for stored XSS attacks by an administrator through the name parameter. Rated medium severity (CVSS 4.4), this vulnerability is remotely exploitable. No vendor patch available.
In Sherpa Orchestrator 141851, a low-privileged user can elevate their privileges by creating new users and roles. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
In Sherpa Orchestrator 141851, the web application lacks protection against CSRF attacks, with resultant effects of an attacker conducting XSS attacks, adding a new user or role, or exploiting a SQL. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
In Sherpa Orchestrator 141851, multiple time-based blind SQL injections can be performed by an authenticated user. Rated low severity (CVSS 3.5), this vulnerability is remotely exploitable. No vendor patch available.
In Sherpa Orchestrator 141851, the functionality for adding or updating licenses allows for stored XSS attacks by an administrator through the name parameter. Rated medium severity (CVSS 4.4), this vulnerability is remotely exploitable. No vendor patch available.
In Sherpa Orchestrator 141851, a low-privileged user can elevate their privileges by creating new users and roles. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.