Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers.
References
Link | Resource |
---|---|
https://manageengine.com | Product |
https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html | Vendor Advisory |
https://manageengine.com | Product |
https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://manageengine.com - Product | |
References | () https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html - Vendor Advisory |
10 May 2023, 03:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126166:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126005:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126162:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126154:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126110:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126120:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126119:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126310:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126134:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126141:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126104:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126122:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126280:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126165:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126147:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126264:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126108:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126135:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126275:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126322:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126139:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126284:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126311:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126109:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126131:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126164:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126150:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126306:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126294:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126107:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126290:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126285:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126262:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126279:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126118:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126283:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126149:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126277:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126169:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126276:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126121:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126163:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126167:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126151:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126002:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126148:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126132:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126136:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126295:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126168:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126155:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126278:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126293:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126308:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126323:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126004:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126130:*:*:*:*:*:* cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html - Vendor Advisory | |
References | (MISC) https://manageengine.com - Product |
04 May 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-04 02:15
Updated : 2025-01-29 20:15
NVD link : CVE-2023-31099
Mitre link : CVE-2023-31099
CVE.ORG link : CVE-2023-31099
JSON object : View
Products Affected
zohocorp
- manageengine_opmanager
CWE