Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-31099

Опубликовано: 04 мая 2023
Источник: nvd
CVSS3: 8.8
EPSS Высокий

Описание

Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*
Версия до 12.6 (исключая)
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126002:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126004:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126005:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126104:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126107:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126108:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126109:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126110:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126118:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126119:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126120:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126121:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126122:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126130:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126131:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126132:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126134:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126135:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126136:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126139:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126141:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126147:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126148:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126149:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126150:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126151:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126154:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126155:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126162:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126163:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126164:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126165:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126166:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126167:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126168:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126169:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126262:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126264:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126275:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126276:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126277:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126278:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126279:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126280:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126283:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126284:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126285:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126290:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126293:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126294:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126295:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126306:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126308:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126310:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126311:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126322:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126323:*:*:*:*:*:*

EPSS

Процентиль: 99%
0.80853
Высокий

8.8 High

CVSS3

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 8.8
github
почти 3 года назад

Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers.

EPSS

Процентиль: 99%
0.80853
Высокий

8.8 High

CVSS3

Дефекты

NVD-CWE-noinfo