漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.tools.exec_jsp servlet, which listens on TCP port 8081 by default. When parsing the command parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of Administrator. Was ZDI-CAN-5193.
漏洞信息
N/A
漏洞
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
漏洞
NetGain Enterprise Manager 命令注入漏洞
漏洞信息
Netgain Enterprise Manager(EM)是新加坡网利系统(NetGain Systems)公司的一套IT资产监控管理软件。 NetGain Enterprise Manager 7.2.730 build 1034版本中的org.apache.jsp.u.jsp.tools.exec_jsp servlet存在命令注入漏洞,该漏洞源于进程在执行系统调用之前,没有正确的验证用户提交的字符串。远程攻击者可利用该漏洞在管理员的上下文中执行任意代码。
漏洞信息
N/A
漏洞
N/A