The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an authenticated user to abuse SolarWinds service resulting in remote code execution. We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.

#VULNERABILITY

The latest information on known vulnerabilities in popular software and systems.

A blog about vulnerabilities and attacks affecting VoIP and WebRTC applications and infrastructure by Enable Security.

Kroll specialists regularly publish articles, blogs, studies and books that help our clients better understand the changing business landscape. Browse our featured items below, or search for all recent materials by service, industry or topic.

The leading database for open source vulnerabilities and cloud misconfigurations.

The web application vulnerabilities index lists vulnerabilities according to its severity and is classified by the compliance standard it falls under.

Cyber security insights and guidance from the frontlines. Read expert perspectives and get all the latest cyber security industry news at the Mandiant blog.

Latest web security & vulnerabilities, product releases, product docs and faq blogs.

Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.

0day Today is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals. Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database. This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage.

Extremely passionate about Windows exploit development, internals, C, Assembly, or anything low-level.

This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.

Third party vulnerabilities that have been reported by VulnCheck.

A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities.

RTC security Research, talks and tools. We are researchers in cyber-security, continually educating ourselves and developing knowledge and code. By sharing what we learn, we hope to push RTC security forward.

CWE (Common Weakness Enumeration) is a community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation, and prevention efforts.

Well-documented, relevant, reliably discovered vulnerabilities and dedicated tools for pentesters by our IT security experts. TL;DR - we break things.

A list of all publicly disclosed vulnerabilities discovered by Zero Day Initiative researchers. While the affected vendor is working on a patch for these vulnerabilities, Trend Micro customers are protected from exploitation by security filters delivered ahead of public disclosure.