Логотип exploitDog
bind:CVE-2021-44515
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-44515

Количество 3

Количество 3

nvd логотип

CVE-2021-44515

около 4 лет назад

Zoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. For Enterprise builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For Enterprise builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3. For MSP builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For MSP builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-wrwj-r75g-4vx9

около 4 лет назад

Zoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. For Enterprise builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For Enterprise builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3. For MSP builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For MSP builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2021-06278

около 4 лет назад

Уязвимость программного средства для управления рабочими местами через web-интерфейс ManageEngine Desktop Central, связанная с недостатками процедуры аутентификации, позволяющая нарушителю обойти процедуру аутентификации и выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-44515

Zoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. For Enterprise builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For Enterprise builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3. For MSP builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For MSP builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3.

CVSS3: 9.8
94%
Критический
около 4 лет назад
github логотип
GHSA-wrwj-r75g-4vx9

Zoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. For Enterprise builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For Enterprise builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3. For MSP builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For MSP builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3.

CVSS3: 9.8
94%
Критический
около 4 лет назад
fstec логотип
BDU:2021-06278

Уязвимость программного средства для управления рабочими местами через web-интерфейс ManageEngine Desktop Central, связанная с недостатками процедуры аутентификации, позволяющая нарушителю обойти процедуру аутентификации и выполнить произвольный код

CVSS3: 9.8
94%
Критический
около 4 лет назад

Уязвимостей на страницу