远程代码执行 (RCE)
1、Metabase
厂商:Metabase
漏洞编号:CVE-2021-44077
影响版本:Zoho ManageEngine ServiceDesk Plus <= 11305
描述:该漏洞允许未经授权的攻击者通过远程代码执行进行攻击,从而控制目标系统。
2、Spring Boot Admin
厂商:Spring Boot Admin
漏洞编号:CVE-2023-38286
影响版本:spring-boot-admin <= 3.1.0
描述:此漏洞存在于模板注入中,可能允许攻击者执行任意代码。
3、VMware vCenter Server
厂商:VMware
漏洞编号:CVE-2021-21972
影响版本:vSphere Client 7.0系列
描述:该漏洞允许远程代码执行,影响多个版本的vCenter Server。
文件上传
1、泛微
厂商:泛微
漏洞编号:CNVD-2023-08743
影响版本:e-office V17.0
描述:该漏洞允许未经授权的攻击者上传任意文件,从而导致系统受损。
2、和信创天下一代云桌面
厂商:和信创天
漏洞编号:CNVD-2023-08742
影响版本:未明确
描述:该漏洞同样允许未经授权的文件上传,可能导致系统被攻破。
反序列化
1、Apache Dubbo
厂商:Apache Dubbo
漏洞编号:CVE-2023-23638
影响版本:2.7.0 <= Apache Dubbo <= 3.0.13, 3.0.13 < Apache Dubbo <= 3.1.5, 3.1.5 < Apache Dubbo <= 3.1.13.5, 3.1.13.5 < Apache Dubbo <= 3.3.0, 3.3.0 < Apache Dubbo <= 3.3.13.0, 3.3.13.0 < Apache Dubbo <= 3.3.13.1, 3.3.13.1 < Apache Dubbo <= 3.3.13.5, 3.3.13.5 < Apache Dubbo <= 3.3.13.13, 3.3.13.13 < Apache Dubbo <= 3.5.0, 3.5.0 < Apache Dubbo <= 3.5.1, 3.5.1 < Apache Dubbo <= 3.5.13, 3.5.13 < Apache Dubbo <= 3.5.13.3, 3.5.13.3 < Apache Dubbo <= 3.5.13.5, 3.5.13.5 < Apache Dubbo <= 3.5.13.10, 3.5.13.10 < Apache Dubbo <= 3.5.13.13, 3.5.13.13 < Apache Dubbo <= 3.5.13.15, 3.5.13.15 < Apache Dubbo <= 3.5.13.20, 3.5.13.20 < Apache Dubbo <= 3.5.13.28, 3.5.13.28 < Apache Dubbo <= 3.5.13.30, 3.5.13.30 < Apache Dubbo <= 3.5.13.33, 3.5.13.33 < Apache Dubbo <= 3.5.13.35, 3.5.13.35 < Apache Dubbo <= 3.5.13.40, 3.5.13.40 < Apache Dubbo <= 3.5.13.45, 3.5.13.45 < Apache Dubbo <= 3.5.13.50, 3.5.13.50 < Apache Dubbo <= 3.5.13.55, 3.5.13.55 < Apache Dubbo <= 3.5.13.60, 3.5.13.60 < Apache Dubbo <= 3.5.13.65, 3.5.13.65 < Apache Dubbo <= 3.5.13.70, 3.5.13.70 < Apache Dubbo <= 3.5.13.75, 3.5.13.75 < Apache Dubbo <= 3.5.13.80, 3.5.13.80 < Apache Dubbo <= 3.5.13.85, 3.5.13.85 < Apache Dubbo <= 3.5.13.90, 3.5.13.90 < Apache Dubbo <= 3.5.13.95, 3jdk7 <= JBoss <= jdk7, jdk7_u1 <= JBoss <= jdk7_u2, jdk7_u2 <= JBoss <= jdk7_u4, jdk7_u4 <= JBoss <= jdk7_u6, jdk7_u6 <= J Boot <= jdk7_u9, jdk7_u9 < J Boot <= jdk7_u10, jdk7_u10 < J Boot <= jdk7_u11, jdk7_u11 < J Boot <= jdk9_u2, jdk9_u2 < J Boot <= jdk9_u4, jdk9_u4 < J Boot <= jdk9_u6, jdk9_u6 < J Boot <= jdk9_u9, jdk9_u9 < J Boot <= jdk9_u10, jdk9_u10 < J Boot <= jdk9_u11, jdk9_u11 < J Boot <= jdk9_u12, jdk9_u12 < J Boot <= jdk9_u14, jdk9_u14 < J Boot <= jdk9_u16, jdk9_u16 < J Boot <= jdk9_u18, jdk9_u18 < J Boot <= jdk9_u20, jdk9_u20 < J Boot <= jdk9_u22, jdk9_u22 < J Boot <= jdk9_u24, jdk9_u24 < J Boot <= jdk9_u26, jdk9_u26 < J Boot <= jdbo >= jdk9_u28, jdbo >= jdk9_u28 < jdk9_u29, jdbo >= jdk9_u29 < jdk9_u30, jdbo >= jdk9_u30 < jdk9_u31, jdbo >= jdk9_u31 < jdk9_u32, jdbo >= jdk9_u32 < jdk9_u34, jdbo >= jdk9_u34 < jdk9_bup >= jdk9_bup < jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdk9_bup >= jdki >= jdbc >= joda > joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joda >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadki >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi >= joadboi
在
本文来源于互联网,如若侵权,请联系管理员删除,本文链接:https://www.9969.net/57032.html