首页-> 服务与支持-> 客户支持-> 售后服务

服务与支持

ISCAT V1.0系统插件升级包列表

名称: iscat-update-vulsys-V1.0R00F00.0800.dat 版本:V1.0R00F00.0800
MD5:a4a35966f87ba9889338b852e60ec320 大小:365.76M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.07*。升级包为合集升级包,升级后系统版本不变,系统插件版本变更为 V1.0R00F00.0800。

该升级包是个合集升级包,包含 iscat-update-vulsys-V1.0R00F00.0701.dat至iscat-update-vulsys-V1.0R00F00.0707.dat插件升级包所含变动。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.07*. This upgrade package is a merged upgrade package. After upgrade, the system version remains unchanged, but the system plug-in version is updated to V1.0R00F00.0800.

This upgrade package involves the changes during upgrade from iscat-update-vulsys-V1.0R00F00.0701.dat to iscat-update-vulsys-V1.0R00F00.0707.dat.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-07-14 18:07:39
名称: iscat-update-vulsys-V1.0R00F00.0707.dat 版本:V1.0R00F00.0707
MD5:0744230476a9d92cf79c9bf41e11fb11 大小:132.51M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0706。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0707。


新增漏洞:205个,openeuler:37个,ubuntu:62个,其他:106个。

可通过snmp获取路由等信息


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0706. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0707.

Add plugins:205, openeuler:37,ubuntu:62,other plugins:106.

Information such as routing can be obtained through snmp


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-07-14 18:04:55
名称: iscat-update-vulsys-V1.0R00F00.0706.dat 版本:V1.0R00F00.0706
MD5:689eae67e3bf872873725ae2a2e2b217 大小:309.18M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0705。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0706。


新增漏洞:777个,gentoo:233个,debian:34个,其他:510个。
h3c imc 未授权任意命令执行漏洞【原理扫描】
apache ofbiz 任意命令执行漏洞 (cve-2021-29200)【原理扫描】
vmware center server远程代码执行漏洞(cve-2021-21985)(vmsa-2021-0010) 【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0705. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0706.

Add plugins:777, gentoo:233,debian:34,other plugins:510.

h3c imc unauthorized command execution vulnerability[Thorough Scan]
apache ofbiz arbitrary command execution vulnerability (cve-2021-29200)[Thorough Scan]
Vmware center server remote code execution vulnerability (cve-2021-21985) (vmsa-2021-0010)[Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-07-14 18:03:02
名称: iscat-update-vulsys-V1.0R00F00.0705.dat 版本:V1.0R00F00.0705
MD5:75a809dd9ab0f74e25319593fcf1ea0d 大小:86.40M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0704。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0705。


新增漏洞:926个。chrome:142个,debian:66个,其他:718个。


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0704. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0705.

Add plugins:926. chrome:142,debian:66,other plugins:718.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-06-07 14:42:27
名称: iscat-update-vulsys-V1.0R00F00.0704.dat 版本:V1.0R00F00.0704
MD5:c777e9b4bc39e069653bef8a271c4c60 大小:85.35M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0703。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0704。


新增漏洞:725个,openEuler:160个,debian:40个,其他:525个。
远程主机允许使用未加密ftp协议 【原理扫描】
远程主机允许ftp匿名用户执行危险 【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级


This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0703. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0704.

Add plugins:725, openEuler:160,debian:40,other plugins:525.

The remote host allows the use of unencrypted ftp protocol [Thorough Scan]
The remote host allows ftp anonymous users to execute dangerous [Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-06-07 14:41:36
名称: iscat-update-vulsys-V1.0R00F00.0703.dat 版本:V1.0R00F00.0703
MD5:fcf8f2450c8f26bb6abbd4c3f5fee448 大小:79.02M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0702。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0703。

新增漏洞:567个,database:40个,debian:138个,其他:389个。

Coremail论客邮件系统权限绕过漏洞【原理扫描】
Coremail论客邮件系统Tomcat管理页面默认密码漏洞【原理扫描】
泛微OA未授权任意文件上传漏洞【原理扫描】
Oracle WebLogic Server 安全漏洞【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0702. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0703.

Add plugins:567, openEuler:40,debian:138,other plugins:389.

Coremail System permission bypass vulnerability [Thorough Scan]
Coremail Discussion Mail System Tomcat Management Page Default Password Vulnerability [Thorough Scan]
E-cology Unauthorized arbitrary file upload vulnerability [Thorough Scan]
Oracle WebLogic Server Security Vulnerability [Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-04-29 18:05:13
名称: iscat-update-vulsys-V1.0R00F00.0702.dat 版本:V1.0R00F00.0702
MD5:02142a4c3a50a0bb0ccafbb1e728011c 大小:82.04M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0701。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0702。

新增漏洞:382个,openEuler:90个,debian:38个,其他:254个。


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0701. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0702.

Add plugins:382, openEuler:90,debian:38,other plugins:254.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-04-29 16:28:19
名称: iscat-update-vulsys-V1.0R00F00.0701.dat 版本:V1.0R00F00.0701
MD5:59374db3988e85d29f82232627e52a1c 大小:71.64M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0700。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0701。

新增漏洞:717个,ubuntu:24个,debian:20个,其他:673个。


d-link任意文件读取漏洞(cve-2021-27250)【原理扫描】
ntopng 权限绕过漏洞(cve-2021-28073) 【原理扫描】
ntopng 任意代码执行漏洞(cve-2021-28074) 【原理扫描】
vmware vrealize operations ssrf漏洞(cve-2021-21975)【原理扫描】
php 8.1.0-dev用户代理后门漏洞【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0700. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0701.

Add plugins:717, ubuntu:24,debian:20,other plugins:673.


d-link arbitrary file reading vulnerability (cve-2021-27250)[Thorough Scan]
ntopng permission bypass vulnerability (cve-2021-28073)[Thorough Scan]
ntopng arbitrary code execution vulnerability (cve-2021-28074)[Thorough Scan]
vmware vrealize operations ssrf vulnerability (cve-2021-21975)[Thorough Scan]
PHP 8.1.0-dev user agent backdoor vulnerability[Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-04-29 16:27:34
名称: iscat-update-vulsys-V1.0R00F00.0700.dat 版本:V1.0R00F00.0700
MD5:b9bfac09f7e8a31f5be8e5a18cf6aefb 大小:88.61M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.06*。升级包为合集升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0700。

该升级包是个合集升级包,包含 iscat-update-vulsys-V1.0R00F00.0601.dat 至iscat-update-vulsys-V1.0R00F00.0606.dat 插件升级包所含变动。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.06*. This upgrade package is a merged upgrade package. After upgrade, the system version remains unchanged, but the system plug-in version is updated to V1.0R00F00.0700.

This upgrade package involves the changes during upgrade from iscat-update-vulsys-V1.0R00F00.0601.dat to iscat-update-vulsys-V1.0R00F00.0606.dat.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-04-07 10:23:32
名称: iscat-update-vulsys-V1.0R00F00.0606.dat 版本:V1.0R00F00.0606
MD5:95d2b517b678c2b601bd0f32ec124a36 大小:85.03M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0605。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0606。

新增漏洞:368个,ubuntu:33个,debian:18个,其他:317个。


apache solr 任意文件读取漏洞【原理扫描】
f5 big-ip rest api 远程代码执行漏洞 【原理扫描】
embedthis software appweb embedthis http库安全漏洞 【原理扫描】
xxl-job executor 未授权远程代码执行漏洞【原理扫描】
apache ofbiz 任意命令执行漏洞 (cve-2021-26295)【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0605. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0606.

Add plugins:368, ubuntu:33,debian:18,other plugins:317.


apache solr arbitrary file read vulnerability[Thorough Scan]
f5 big-ip rest api remote code execution vulnerability[Thorough Scan]
embedthis software appweb embedthis http library security vulnerability[Thorough Scan]
xxl-job executor unauthorized remote code execution vulnerability[Thorough Scan]
apache ofbiz arbitrary command execution vulnerability (cve-2021-26295)[Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-04-07 10:22:46
名称: iscat-update-vulsys-V1.0R00F00.0605.dat 版本:V1.0R00F00.0605
MD5:06ea267dd927f1e744c7f276d840abbe 大小:81.24M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0604。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0605。

新增漏洞:14695个,uniontech os:13974个,ubuntu:43个,其他:678个。


rconfig 操作系统命令注入漏洞 【原理扫描】
exim远程命令执行漏洞(cve-2019-10149)【原理扫描】
vbulletin 任意代码执行漏洞 【原理扫描】
drupal core sql注入漏洞 【原理扫描】
wordpress userpro插件认证绕过 【原理扫描】
joomla! core 远程代码执行漏洞 【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0604. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0605.

Add plugins:14695, uniontech os:13974,ubuntu:43,other plugins:678.


rconfig operating system command injection vulnerability[Thorough Scan]
exim remote command execution vulnerability (cve-2019-10149)[Thorough Scan]
vbulletin arbitrary code execution vulnerability[Thorough Scan]
Drupal core sql injection vulnerability[Thorough Scan]
WordPress userpro plugin authentication bypass[Thorough Scan]
joomla! core remote code execution vulnerability[Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-03-19 13:37:40
名称: iscat-update-vulsys-V1.0R00F00.0604.dat 版本:V1.0R00F00.0604
MD5:2815bf34c0e0c11a084f82482ff46f37 大小:72.20M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0603。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0604。


新增漏洞:446个,ubuntu:34个,debian:80个,其他:332个。

apache flink 任意文件上传漏洞(cve-2020-17518)【原理扫描】
apache flink 目录穿越漏洞(cve-2020-17519)【原理扫描】
intellian aptus web 操作系统命令注入漏洞(cve-2020-7980) 【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0603. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0604.

Add plugins:446, ubuntu:34,debian:80,other plugins:332.

Apache flink arbitrary file upload vulnerability (cve-2020-17518)[Thorough Scan]
Apache Flink directory traversal vulnerability (cve-2020-17519)[Thorough Scan]
Intel aptus web operating system command injection vulnerability (cve-2020-7980)[Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-03-12 16:38:18
名称: iscat-update-vulsys-V1.0R00F00.0603.dat 版本:V1.0R00F00.0603
MD5:22207047df62f989590bdf124b241092 大小:65.48M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0602。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0603。


新增漏洞:259个,ubuntu:41个,fedora:20个,其他:198个。

apache druid 远程代码执行漏洞(cve-2021-25646)【原理扫描】
oracle fusion middleware 安全漏洞(cve-2020-14756) 【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0602. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0603.

Add plugins:259, ubuntu:41,fedora:20,other plugins:198.

Apache druid remote code execution vulnerability (cve-2021-25646)[Thorough Scan]
oracle fusion middleware security vulnerability (cve-2020-14756)[Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-03-12 16:32:27
名称: iscat-update-vulsys-V1.0R00F00.0602.dat 版本:V1.0R00F00.0602
MD5:cd3a01a0e4b3a2a13b17b16d015b4f24 大小:69.94M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0601。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0602。


新增漏洞:561个,freebsd:39个,fedora:65个,其他:457个。

jumpserver未授权访问漏洞 【原理扫描】
solarwinds 远程代码执行漏洞 【原理扫描】
sonicwall ssl-vpn 远程命令执行漏洞【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0601. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0602.

Add plugins:561, freebsd:39,fedora:65,other plugins:457.

Jumpserver unauthorized access defense[Thorough Scan]
solarwinds remote code execution vulnerability[Thorough Scan]
Sonicwall ssl-vpn remote command execution vulnerability[Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-03-12 16:29:01
名称: iscat-update-vulsys-V1.0R00F00.0601.dat 版本:V1.0R00F00.0601
MD5:fe3526142e9b0a43f8c3aa4b3e31b129 大小:72.52M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0600。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0601。

新增漏洞:523个。其中mapp:84个,euleros:56个,fedora:36个,其他:347个。

新增:
incaseformat 磁盘清除者病毒检测
通达oa /inc/finger/use_finger.php sql注入漏洞 【原理扫描】
通达oa /general/ems/query/search_excel.php sql注入漏洞 【原理扫描】
通达oa /general/mytable/intel_view/video_file.php sql注入漏洞 【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0600. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0601.

Add plugins:523.mapp:84 euleros:56,fedora:36,other plugins:347.


Add:
incaseformat disk cleaner virus detection
Tongda oa /inc/finger/use_finger.php sql injection vulnerability[Thorough Scan]
Tongda oa /general/ems/query/search_excel.php sql injection vulnerability[Thorough Scan]
Tongda oa /general/mytable/intel_view/video_file.php sql injection vulnerability[Thorough Scan]

发布时间:2021-03-12 16:27:02
名称: iscat-update-vulsys-V1.0R00F00.0600.dat 版本:V1.0R00F00.0600
MD5:18a2e95c186843d74ac2aea9761473bd 大小:97.16M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.05*。升级包为合集升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0600。

该升级包是个合集升级包,包含 iscat-update-vulsys-V1.0R00F00.0501.dat 至iscat-update-vulsys-V1.0R00F00.0507.dat 插件升级包所含变动。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.05*. This upgrade package is a merged upgrade package. After upgrade, the system version remains unchanged, but the system plug-in version is updated to V1.0R00F00.0600.

This upgrade package involves the changes during upgrade from iscat-update-vulsys-V1.0R00F00.0501.dat to iscat-update-vulsys-V1.0R00F00.0507.dat.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-01-06 09:27:27
名称: iscat-update-vulsys-V1.0R00F00.0507.dat 版本:V1.0R00F00.0507
MD5:497daa877af75f19c2a7de1cf578868f 大小:68.50M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0506。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0507。

新增漏洞:844个,euleros:181个,fedora:40个,其他:623个。


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0506. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0507.

Add plugins:844, euleros:181,fedora:40,other plugins:623.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2021-01-05 17:20:20
名称: iscat-update-vulsys-V1.0R00F00.0506.dat 版本:V1.0R00F00.0506
MD5:890324ab89a2fbec8362260e1d33199b 大小:73.22M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0505。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0506。

新增漏洞:1073个,Ubuntu:821个,其他:252个。


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0505. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0506.

Add plugins:1073, Ubuntu:821,other plugins:252.


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-18 15:05:26
名称: iscat-update-vulsys-V1.0R00F00.0505.dat 版本:V1.0R00F00.0505
MD5:f5199d24fcb72c56257e682f9bf56bed 大小:49.17M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0504。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0505。

新增漏洞:3个。

Apache Unomi 远程代码执行漏洞(CVE -2020-13942)【原理扫描】
Oracle WebLogic Server 安全漏洞(CVE-2017-3248)【原理扫描】
SaltStack Salt 操作系统命令注入漏洞(CVE-2020-16846)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0504. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0505.

Add plugins:3.

Apache Unomi remote code execution vulnerability (CVE -2020-13942)
Oracle WebLogic Server security vulnerability (CVE-2017-3248)
SaltStack Salt operating system command injection vulnerability (CVE-2020-16846)


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-18 15:04:51
名称: iscat-update-vulsys-V1.0R00F00.0504.dat 版本:V1.0R00F00.0504
MD5:2501e132d00c2190a4f75610296fd527 大小:68.41M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0503。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0504。

新增漏洞:452个。其中Ubuntu:59,Arch Linux:52,其他:341。


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0503. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0504.

Add plugins:452.Ubuntu:59,Arch Linux:52,other:341.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-08 16:58:59
名称: iscat-update-vulsys-V1.0R00F00.0503.dat 版本:V1.0R00F00.0503
MD5:20ba58b8ae6f1dd85043a30e450e9c18 大小:70.59M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0502。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0503。

新增漏洞:690个,ubuntu:31个,euleros:80个,其他:579个。
用友NC远程命令执行漏洞【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0502. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0503.

Add plugins:690, ubuntu:31,euleros:80,other plugins:579.
YongYou NC rce[Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-08 15:26:25
名称: iscat-update-vulsys-V1.0R00F00.0502.dat 版本:V1.0R00F00.0502
MD5:dc22bed7c319954ff8ae2880cf91a81c 大小:92.89M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0501。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0502。

新增漏洞:455个,ubuntu:75个,freebsd:50个,其他:330个。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0501. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0502.

Add plugins:455, ubuntu:75,freebsd:50,other plugins:330.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-08 13:57:48
名称: iscat-update-vulsys-V1.0R00F00.0501.dat 版本:V1.0R00F00.0501
MD5:01552c59e0702b5703be5b72f64d0bac 大小:84.49M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0500。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0501。

新增漏洞:1210个,Debian:706个,Ubuntu:64个,其他:440个。


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0500. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0501.

Add plugins:1210, Debian:706,Ubuntu:64,other plugins:440.
Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-08 13:57:19
名称: iscat-update-vulsys-V1.0R00F00.0500.dat 版本:V1.0R00F00.0500
MD5:11cad0fd525cd1e59cda668c9c998e94 大小:103.05M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.04*。升级包为合集升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0500。

该升级包包含 iscat-update-vulsys-V1.0R00F00.0401.dat至iscat-update-vulsys-V1.0R00F00.0410.dat插件升级包所含变动。

新增漏洞:87949,MAPP:432个,openSUSE:7323个,ubuntu:1281个,debian:13964个,Photon:1539个,amazon:3388个,centos:176个,其他:59846个。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.04*. This upgrade package is a merged upgrade package. After upgrade, the system version remains unchanged, but the system plug-in version is updated to V1.0R00F00.0500.

This upgrade package involves the changes during upgrade from iscat-update-vulsys-V1.0R00F00.0401.dat to iscat-update-vulsys-V1.0R00F00.0410.dat.

Add plugins:87949, MAPP:432,openSUSE:7323,ubuntu:1281,debian:13964,Photon:1539,amazon:3388,centos:176,other:59846.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-08 13:07:20
名称: iscat-update-vulsys-V1.0R00F00.0410.dat 版本:V1.0R00F00.0410
MD5:344858f3346b76e4cd8c0fb1eef03ae5 大小:54.54M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0409。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0410。

新增漏洞:8944个,openSUSE:5334个,其他:3610个。

通达OA任意文件上传配合文件包含漏洞【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0409. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0410.

Add plugins:8944, openSUSE:5334,other plugins 3610.
Mastery OA Arbitrary File Upload Cooperating File Contains Breakthrough [Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-04 18:07:05
名称: iscat-update-vulsys-V1.0R00F00.0409.dat 版本:V1.0R00F00.0409
MD5:e6782ede674b0aa303dc372dd61d4f43 大小:57.24M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0408。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0409。

新增漏洞:8444个,MAPP:110个,Gentoo:7955个,其他:379个。

Dropbear 用户枚举漏洞(CVE-2018-15599)【原理扫描】
Oracle Fusion Middleware Coherence产品安全漏洞(CVE-2020-2555)【原理扫描】
Microsoft SMBv3远程代码执行漏洞(CVE-2020-0796)【原理扫描】【危险插件】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。
2. “Microsoft SMBv3远程代码执行漏洞(CVE-2020-0796)【原理扫描】” 此插件为危险插件,可能造成受此漏洞影响的主机蓝屏、重启、关闭等异常。默认不开启,如需要,请开启危险插件后进行扫描 。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0408. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0409.

Add plugins:8444, MAPP:110,Gentoo:7955,other plugins 379.

Dropbear user enumeration vulnerability (cve-2018-15599) [Thorough Scan]
Oracle Fusion Middleware coherence product security vulnerability (cve-2020-2555)[Thorough Scan]
Microsoft smbv3 Remote Code Execution Vulnerability (cve-2020-0796)[Thorough Scan][Dangerous plugin]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.
2. "Microsoft smbv3 Remote Code Execution Vulnerability (cve-2020-0796)"[Thorough Scan] This plug-in is a dangerous plug-in, which may cause the host blue screen, restart, shutdown and other exceptions affected by this vulnerability. It is not enabled by default. If necessary, please enable the dangerous plug-in and scan it.

发布时间:2020-12-04 18:06:33
名称: iscat-update-vulsys-V1.0R00F00.0408.dat 版本:V1.0R00F00.0408
MD5:d3eb630640efab9200e6eb24a1f8d5b9 大小:55.87M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0407。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0408。

新增插件:8550个,FreeBSD:8254个,其他:296个。

Apache Dubbo反序列化漏洞(CVE-2019-17564)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0407. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0408.

Add plugins:8550,FreeBSD:8254,other plugins 296.

Apache Dubbo deserialization vulnerability(cve-2019-17564) [Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-04 18:06:02
名称: iscat-update-vulsys-V1.0R00F00.0407.dat 版本:V1.0R00F00.0407
MD5:adf40ceaa22e2d8b8aa646db38adfc7b 大小:36.97M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0406。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0407。

新增插件:3536个,oracle linux:3534个,其他:2个。

Apache Tomcat文件包含漏洞(CVE-2020-1938)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0406. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0407.

Add plugins:3536, oracle linux:3534,other plugins 2.

Apache Tomcat file contains vulnerability (CVE-2020-1938) [Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-04 18:05:33
名称: iscat-update-vulsys-V1.0R00F00.0406.dat 版本:V1.0R00F00.0406
MD5:283d46a0a7338f30a0d778edb7100a4c 大小:36.99M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0405。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0406。

新增插件:8216个,Mapp:95个,Fedora:7688个,其他:433个。


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0405. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0406.

Add plugins:8216,Mapp:95,Fedora:7688,other plugins 433.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-04 17:17:49
名称: iscat-update-vulsys-V1.0R00F00.0405.dat 版本:V1.0R00F00.0405
MD5:df71976b5fc5324c310933caa9fa27ca 大小:33.63M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0404。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0405。

新增插件:7005个,suse:7002个,其他:3个。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0404. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0405.

Add plugins:7005, suse:7002,other plugins 3.


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-04 17:11:37
名称: iscat-update-vulsys-V1.0R00F00.0404.dat 版本:V1.0R00F00.0404
MD5:b3ff303aedddbd2ed690d86247a6e84f 大小:33.15M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0403。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0404。

新增插件:8425个,MAPP: 34个,ubuntu:8305个,其他:86个。

Oracle WebLogic Server WSL Core 组件访问控制错误漏洞(CVE-2020-2551)
Oracle WebLogic Server Application Container - JavaEE 组件访问控制错误漏洞(CVE-2020-2546)

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0403. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0404.

Add plugins:8425, MAPP:34,ubuntu:8305,other plugins 86.

Oracle WebLogic Server WSL core component access control error vulnerability (cve-2020-2551)
Oracle WebLogic Server application container - JavaEE component access control error vulnerability (cve-2020-2546)


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-04 17:01:25
名称: iscat-update-vulsys-V1.0R00F00.0403.dat 版本:V1.0R00F00.0403
MD5:641ef447104194b697e4ef002179af7f 大小:41.58M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0402。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0403。

新增插件:8726个,red hat:8726个。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0402. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0403.

Add plugins:8726, red hat:8726.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-12-04 16:39:26
名称: iscat-update-vulsys-V1.0R00F00.0402.dat 版本:V1.0R00F00.0402
MD5:6be7dc44d93a619485c250cb7bad53d2 大小:39.90M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0401。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0402。

新增漏洞:8061个,centos:5894个,其他:2167个。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0401. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0402.

Add vulnerabilities:8061, centos:5894,other plugins 2167.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-09-14 15:59:50
名称: iscat-update-vulsys-V1.0R00F00.0401.dat 版本:V1.0R00F00.0401
MD5:1885d2a4913044e65c43768df1b93e0d 大小:30.09M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0400。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0401。

新增漏洞:8397个,debian:8384个,其他:13个。

WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)【原理扫描】
Oracle Fusion Middleware WebLogic Server远程安全漏洞(CVE-2016-0638)【原理扫描】
Oracle Fusion Middleware WebLogic Server安全漏洞(CVE-2016-3510)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0400. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0401.

Add vulnerabilities:8397, debian:8384,other plugins 13.


WebLogic EJBTaglibDescriptor XXE extension (CVE-2019-2888)[Thorough Scan]
Oracle Fusion Middleware WebLogic Server Remote Security Vulnerability (CVE-2016-0638)[Thorough Scan]
Oracle Fusion Middleware WebLogic Server Security Vulnerability (CVE-2016-3510)[Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-09-14 15:56:33
名称: iscat-update-vulsys-V1.0R00F00.0400.dat 版本:V1.0R00F00.0400
MD5:92241211e5a9fdab4fc45a0f98cbacb4 大小:127.35M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.03*。升级包为合集升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0400。

该升级包是个合集升级包,包含 iscat-update-vulsys-V1.0R00F00.0301.dat 至iscat-update-vulsys-V1.0R00F00.0307.dat 插件升级包所含变动。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.03*. This upgrade package is a merged upgrade package. After upgrade, the system version remains unchanged, but the system plug-in version is updated to V1.0R00F00.0400.

This upgrade package involves the changes during upgrade from iscat-update-vulsys-V1.0R00F00.0301.dat to iscat-update-vulsys-V1.0R00F00.0307.dat.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-03-20 17:08:16
名称: iscat-update-vulsys-V1.0R00F00.0307.dat 版本:V1.0R00F00.0307
MD5:dcc6485577c58977d0d9415f6cd737a8 大小:74.61M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0306。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0307。

新增插件:8042个,debian:1062个,ubuntu:1243个,suse:1588个,red hat:1242个,其他:2907个。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0306. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0307.

Add plugins:8042. debian:1062,ubuntu:1243,suse:1588,red hat:1242,other:2907

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-03-20 16:44:52
名称: iscat-update-vulsys-V1.0R00F00.0306.dat 版本:V1.0R00F00.0306
MD5:259a353469e574a857900fcc59aa1775 大小:23.98M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0305。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0306。

新增插件:5009个,EulerOS Linux:843个,ubuntu:3520个,其他:646个。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0304. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0305.

Add plugins:5009. EulerOS Linux:843,ubuntu:3520,other:646.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-03-20 16:43:18
名称: iscat-update-vulsys-V1.0R00F00.0305.dat 版本:V1.0R00F00.0305
MD5:d0e40ef4c2b9067a0a86fdb49ed7412f 大小:44.51M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0304。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0305。

新增插件:5074个,Arch Linux:3834个,Slackware:1108个,其他132个。

kibana未授权远程代码执行漏洞(CVE-2019-7609)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0304. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0305.

Add plugins:5074. Arch Linux:3834,Slackware:1108,other:132.

Kibana unauthorized Remote Code Execution Vulnerability (cve-2019-7609)[Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-03-20 14:26:42
名称: iscat-update-vulsys-V1.0R00F00.0304.dat 版本:V1.0R00F00.0304
MD5:f9bb2a23fa25a0d94be71b3ba8f62878 大小:21.98M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0303。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0304。

新增插件:582个,mapp:69个,其他:513个。

Apache Flink 远程代码执行漏洞【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0303. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0304.

Add plugins:582, mapp:69, other plugins 513.

Apache Flink remote code execution vulnerability[Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-03-20 14:25:17
名称: iscat-update-vulsys-V1.0R00F00.0303.dat 版本:V1.0R00F00.0303
MD5:30180d2077e613585de07d7b8a6ffa95 大小:51.07M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0302。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0303。

新增插件:237个,chrome:28个,其他:209个。

Microsoft Windows CredSSP 远程执行代码漏洞(CVE-2018-0886)【原理扫描】
Apache Solr 基于Velocity模板的远程命令执行漏洞【原理扫描】
vBulletin 输入验证错误漏洞(CVE-2019-16759)【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0301. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0303.

Add plugins:237, chrome:28, other plugins 209.

Microsoft Windows CredSSP remote execution code vulnerability (cve-2018-0886)[Thorough Scan]
Apache Solr remote command execution vulnerability based on Velocity templates[Thorough Scan]
VBulletin input verification error vulnerability (cve-2019-16759)[Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-03-20 14:22:01
名称: iscat-update-vulsys-V1.0R00F00.0302.dat 版本:V1.0R00F00.0302
MD5:82bdbb26efb2957417e620f04c562d8e 大小:20.67M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0301。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0302。

新增插件:272个,oracle:79个,其他:193个。


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0301。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0302。

Add plugins:272, oracle:79, other plugins 193.


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

发布时间:2020-03-20 14:20:00
名称: iscat-update-vulsys-V1.0R00F00.0301.dat 版本:V1.0R00F00.0301
MD5:82eeb0c6a5fefaf3ab8e509c3cf7e891 大小:50.65M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0300。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0301。

新增插件:312个,mapp:54个,其他:258个。


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0300. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0301.

Add plugins:312, mapp:54, other plugins 258.


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-03-20 14:14:25
名称: iscat-update-vulsys-V1.0R00F00.0300.dat 版本:V1.0R00F00.0300
MD5:e6f4a3d1847b9a5e78cd257ae3007caf 大小:53.51M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.02*,支持的系统版本为V1.0R00F00。升级包为合集升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0300。

该升级包是个合集升级包,包含 iscat-update-vulsys-V1.0R00F00.0201.dat 至iscat-update-vulsys-V1.0R00F00.0206.dat 插件升级包所含变动。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.02*,which supports the system version of V1.0R00F00. This upgrade package is a merged upgrade package. After upgrade, the system version remains unchanged, but the system plug-in version is updated to V1.0R00F00.0300.

This upgrade package involves the changes during upgrade from iscat-update-vulsys-V1.0R00F00.0201.dat to iscat-update-vulsys-V1.0R00F00.0206.dat.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-03-20 14:02:14
名称: iscat-update-vulsys-V1.0R00F00.0206.dat 版本:V1.0R00F00.0206
MD5:b7d613bc4e808badf8ff1b96005451fc 大小:52.80M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0205。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0206。

新增插件:208个,google:73个,其他:135个。

Atlassian Jira 服务端请求伪造漏洞 (CVE-2019-8451)【原理扫描】
Harbor 权限提升漏洞 (CVE-2019-16097)【原理扫描】
phpstudy后门任意代码执行漏洞【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0205. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0206.

Add plugins:208, google:73,other plugins 135.

Atlassian Jira Server Request Forgery Vulnerability (CVE-2019-8451)[Thorough Scan]
Harbor Privilege Escalation Vulnerability (CVE-2019-16097)[Thorough Scan]
Phpstudy backdoor arbitrary code execution vulnerability[Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-03-20 13:59:30
名称: iscat-update-vulsys-V1.0R00F00.0205.dat 版本:V1.0R00F00.0205
MD5:10ac7d2709b7c26c7453c0e5877a84a7 大小:48.74M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0204。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0205。

新增插件:244个,mapp:73个,其他:171个。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0204. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0205.

Add plugins:244, mapp:73,other plugins 171.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2020-03-20 13:54:47
名称: iscat-update-vulsys-V1.0R00F00.0204.dat 版本:V1.0R00F00.0204
MD5:7a7e0323501d0d88824a414ccd2a63c3 大小:53.32M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0203。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0204。

新增插件:297个,oracle:35个,其他:262个。

Webmin 远程命令执行漏洞(CVE-2019-15107)【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0203. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0204.

Add plugins:297, oracle:35, other plugins 262.

Webmin Remote Command Execution Vulnerability (CVE-2019-15107)[Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-10-15 14:39:37
名称: iscat-update-vulsys-V1.0R00F00.0203.dat 版本:V1.0R00F00.0203
MD5:01e598159b10a0fb91bdaa313eb7d986 大小:53.90M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0202。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0203。

新增插件:720个,mapp:82个,database:56个,其他:582个。

typecho 反序列化漏洞【原理扫描】
Atlassian Crowd 远程代码执行漏洞(CVE-2019-11580)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0202. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0203.

Add plugins:720, mapp:82, database:56, other plugins 582.

Typecho deserialization vulnerability [Thorough Scan]
Atlassian Crowd Remote Code Execution Vulnerability (CVE-2019-11580) [Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-10-15 14:36:10
名称: iscat-update-vulsys-V1.0R00F00.0202.dat 版本:V1.0R00F00.0202
MD5:238b8d03d0ee11b91dba270484f02973 大小:24.23M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0201。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0202。

更新插件


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。


This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0201. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0202.

update plugins


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-10-11 12:09:18
名称: iscat-update-vulsys-V1.0R00F00.0201.dat 版本:V1.0R00F00.0201
MD5:a91b8c3147075e457888c1e04f19d65e 大小:53.22M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0200。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0201。

新增插件:138个,mapp:69个,其他:69个。

NFS 共享目录未授权访问(CVE-1999-0554)【原理扫描】
Windows 普通账户对注册表有完全控制权限漏洞【原理扫描】
IBM WebSphere Application Server 远程代码执行漏洞 (CVE-2019-4279)【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0200. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0201.

Add plugins:138, mapp:69, other plugins 69.

Unauthorized access to NFS shared directories(CVE-1999-0554)[Thorough Scan]
Windows General Account Full Control of Registry Vulnerability[Thorough Scan]
IBM WebSphere Application Server Remote Code Execution Vulnerability(CVE-2019-4279)[Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-10-11 11:57:53
名称: iscat-update-vulsys-V1.0R00F00.0200.dat 版本:V1.0R00F00.0200
MD5:29e8868b0127371fd09818354abd7ed7 大小:54.80M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.01*,支持的系统版本为V1.0R00F00。升级包为合集升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0200。

该升级包是个合集升级包,包含 iscat-update-vulsys-V1.0R00F00.0101.dat
至icsscan-iscat-update-vulsys-V1.0R00F00.0111.dat插件升级包所含变动。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.01*,which supports the system version of V1.0R00F00. This upgrade package is a merged upgrade package. After upgrade, the system version remains unchanged, but the system plug-in version is updated to V1.0R00F00.0200.

This upgrade package involves the changes during upgrade from iscat-update-vulsys-V1.0R00F00.0101.dat to icsscan-iscat-update-vulsys-V1.0R00F00.0111.dat.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-10-11 11:55:05
名称: iscat-update-vulsys-V1.0R00F00.0111.dat 版本:V1.0R00F00.0111
MD5:200cd3c276ca5b9a2fc15ce1cebac006 大小:52.90M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0110。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0111。

新增插件:158个,LibreOffice:31个,其他:127个。

Oracle WebLogic Server 远程代码执行漏洞(CVE-2019-2729)【原理扫描】
Coremail 配置信息泄漏漏洞【原理扫描】


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。


This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0110. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0111.

Add plugins:158, LibreOffice:31, other plugins 127.

Oracle WebLogic Server Remote Code Execution Vulnerability(CVE-2019-2729)[Thorough Scan]
Coremail Configuration Information Leakage Vulnerability[Thorough Scan]
Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-10-11 11:53:01
名称: iscat-update-vulsys-V1.0R00F00.0110.dat 版本:V1.0R00F00.0110
MD5:c5545d19e6564fd55ba92d3c9366005c 大小:53.62M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0109。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0110。

新增插件:299个,mapp:87个,其他:212个。

Apache Ambari 默认用户名密码漏洞【原理扫描】
Cassandra 未授权访问漏洞【原理扫描】
Apache Hadoop YARN 资源管理器 REST API未授权访问漏洞【原理扫描】
Apache Cassandra 远程执行任意代码漏洞(CVE-2015-0225)【原理扫描
Apache Solr JMX 远程代码执行漏洞(CVE-2019-0192)【原理扫描】
Rails Sprockets 路径穿越漏洞(CVE-2018-3760)【原理扫描】
Zabbix SQL 注入漏洞(CVE-2016-10134)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。


This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0109. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0110.

Add plugins:299, mapp:87, other plugins 212.

Apache Ambari default username and password vulnerability [Thorough Scan]
Cassandra Unauthorized Access Vulnerability [Thorough Scan]
Apache Hadoop YARN Resource Manager REST API Unauthorized Access Vulnerability [Thorough Scan]
Apache Cassandra Remote Code Execution Vulnerability (CVE-2015-0225) [Thorough Scan]
Apache Solr JMX Remote Code Execution Vulnerability (CVE-2019-0192)[Thorough Scan]
Rails Sprockets Path Crossing Vulnerability (CVE-2018-3760)[Thorough Scan]
Zabbix SQL Injection Vulnerability (CVE-2016-10134)[Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-06-19 09:52:40
名称: iscat-update-vulsys-V1.0R00F00.0109.dat 版本:V1.0R00F00.0109
MD5:513cec6e5dbf1bfa6c4b229c1ae83ada 大小:52.82M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0108。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0109。

新增插件:400个,drupal:129个,其他:271个。

Microsoft Windows 远程桌面服务远程执行代码漏洞(CVE-2019-0708)【原理扫描】
Apache JMeter RMI 反序列化漏洞(CVE-2018-1297)【原理扫描】
Jenkins 远程代码执行漏洞(CVE-2018-1000861)【原理扫描】
Django CommonMiddleware 重定向漏洞 (CVE-2018-14574)【原理扫描】
uWSGI 路径穿越漏洞(CVE-2018-7490)【原理扫描】
Oracle Enterprise Manager Grid Control ATS 组件任意文件上传漏洞(CVE-2016-0491)【原理扫描】
Oracle Enterprise Manager Grid Control ATS 组件认证绕过漏洞(CVE-2016-0492)【原理扫描】
Apache Log4j 远程代码执行漏洞(CVE-2017-5645)【原理扫描】
BeanShell 反序列化漏洞(CVE-2016-2510)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0108. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0109.

Add plugins:400, drupal:129, other plugins 271.

Microsoft Windows Remote Desktop Service Remote Execution Code Vulnerability (CVE-2019-0708) [Through Scan]
Apache JMeter RMI deserialization vulnerability (CVE-2018-1297) [Thorough Scan]
Jenkins Remote Code Execution Vulnerability (CVE-2018-1000861) [Thorough Scan]
Django Common Middleware redirection vulnerability (CVE-2018-14574) [Thorough Scan]
UWSGI Path Crossing Vulnerability (CVE-2018-7490) [Thorough Scan]
Oracle Enterprise Manager Grid Control ATS Component Arbitrary File Upload Vulnerability (CVE-2016-0491)[Thorough Scan]
Oracle Enterprise Manager Grid Control ATS Component Authentication Bypass Vulnerability (CVE-2016-0492)[Thorough Scan]
Apache Log4j Remote Code Execution Vulnerability (CVE-2017-5645)[Thorough Scan]
BeanShell deserialization vulnerability (CVE-2016-2510)[Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-06-20 10:43:21
名称: iscat-update-vulsys-V1.0R00F00.0108.dat 版本:V1.0R00F00.0108
MD5:7600e88917c1cb6a9ecf9b53b7294f38 大小:51.70M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0107。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0108。

新增插件:290个,adobe:88个,其他:202个。

Supervisor XML-RPC服务器远程命令执行漏洞(CVE-2017-11610)【原理扫描】
Drupal Module RESTWS 远程代码执行漏洞【原理扫描】
Apache Tomcat 远程代码执行漏洞(CVE-2017-12615)【原理扫描】
PHPUnit 远程代码执行漏洞(CVE-2017-9841)【原理扫描】
Node.js 目录穿越漏洞 (CVE-2017-14849)【原理扫描】
Oracle WebLogic Server 远程安全漏洞(CVE-2017-3506)【原理扫描】
Adobe ColdFusion 反序列化漏洞(CVE-2017-3066)【原理扫描】
Microsoft Windows 远程桌面服务远程执行代码漏洞(CVE-2019-0708)—需要本地登录


注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0107. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0108.

Add plugins:290, adobe:88, other plugins 202.

Supervisor XML-RPC Server Remote Command Execution Vulnerability (CVE-2017-11610) [Thorough Scan]
Drupal Module RESTWS Remote Code Execution Vulnerability [Thorough Scan]
Apache Tomcat Remote Code Execution Vulnerability (CVE-2017-12615) [Thorough Scan]
PHPUnit Remote Code Execution Vulnerability (CVE-2017-9841) [Thorough Scan]
Node.js Directory Traversal Vulnerability (CVE-2017-14849) [Thorough Scan]
Oracle WebLogic Server Remote Security Vulnerability (CVE-2017-3506)[Thorough Scan]
Adobe ColdFusion Deserialization Vulnerability (CVE-2017-3066)[Thorough Scan]
Microsoft Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708)


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-06-19 09:30:22
名称: iscat-update-vulsys-V1.0R00F00.0106.dat 版本:V1.0R00F00.0106
MD5:7ab7fa18068f0a2a82c50ea6320bfd0a 大小:51.83M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0105。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0106。

新增插件:416个,mapp:69个,其他:347个。
Apache HTTP Server 安全漏洞(CVE-2019-0197)
Apache HTTP Server 安全漏洞(CVE-2019-0211)
Apache HTTP Server 安全漏洞(CVE-2019-0215)
Apache HTTP Server 安全漏洞(CVE-2019-0220)
Apache Tomcat远程代码执行漏洞(CVE-2019-0232)

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0105. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0106.

Add plugins:416, mapp:69, other plugins 347.
Apache HTTP Server Security Vulnerability (CVE-2019-0197)
Apache HTTP Server Security Vulnerability (CVE-2019-0211)
Apache HTTP Server Security Vulnerability (CVE-2019-0215)
Apache HTTP Server Security Vulnerability (CVE-2019-0220)
Apache Tomcat Remote Code Execution Vulnerability (CVE-2019-0232)

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-05-22 12:29:50
名称: iscat-update-vulsys-V1.0R00F00.0107.dat 版本:V1.0R00F00.0107
MD5:f1a4c1151be16da58588cdf095e9bbb8 大小:51.25M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0106。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0107。

新增插件:298个,oracle:80个,其他:218个。
Atlassian Confluence 路径穿越与命令执行漏洞(CVE-2019-3396)【原理扫描】
Oracle WebLogic Server WLS 组件安全漏洞(CVE-2019-2647)【原理扫描】
Oracle WebLogic Server 远程代码执行漏洞【原理扫描】
Jenkins 远程代码执行漏洞(CVE-2017-1000353)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0106. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0107.

Add plugins:298, oracle:80, other plugins 218.

Atlassian Confluence Path Crossing and Command Execution Vulnerability (CVE-2019-3396)[Thorough Scan]
Oracle WebLogic Server WLS Component Security Vulnerability (CVE-2019-2647)[Thorough Scan]
Oracle WebLogic Server Remote Code Execution Vulnerability[Thorough Scan]
Jenkins Remote Code Execution Vulnerability(CVE-2017-1000353)[Thorough Scan]
Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-05-22 12:29:23
名称: iscat-update-vulsys-V1.0R00F00.0105.dat 版本:V1.0R00F00.0105
MD5:a3085795b73ef7694ced354ccb0b5c34 大小:51.54M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0104。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0105。

新增插件:100个,wireshark:3个,其他:97个。

Ruby on Rails 任意文件读取漏洞(CVE-2019-5418)【原理扫描】
Apache Solr XXE and RCE 漏洞(CVE-2017-12629)【原理扫描】
Nexus Repository任意命令执行漏洞(CVE-2019-7238)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0104. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0105.

Add plugins:100, wireshark:3, other plugins 97.

Ruby on Rails Arbitrary File Reading Vulnerability(CVE-2019-5418)[Thorough Scan]
Apache Solr XXE and RCE Vulnerability (CVE-2017-12629)[Thorough Scan]
Nexus Repository arbitrary command execution vulnerability (CVE-2019-7238) [Thorough Scan]


Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-05-22 12:26:13
名称: iscat-update-vulsys-V1.0R00F00.0104.dat 版本:V1.0R00F00.0104
MD5:14d75e4ff7245b2a80174dc153497cb1 大小:51.21M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0103。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0104。

新增插件:372个,mapp:60个,工控:244个,其他:68个。

Citrix XenServer 任意文件读取漏洞 (CVE-2018-14007)【原理扫描】
OpenMRS Platform 反序列化漏洞(CVE-2018-19276)【原理扫描】
Joomla! 3.7.0 SQL注入漏洞(CVE-2017-8917)【原理扫描】
多款Intel产品未授权访问漏洞(CVE-2017-5689)【原理扫描】
Apache Struts2 CookieInterceptor 远程代码执行漏洞(S2-008)(CVE-2012-0392)【原理扫描】
Apache Struts2 ParameterInterceptor 任意文件覆盖漏洞(S2-008)(CVE-2012-0393)【原理扫描】
Apache Struts2 DebuggingInterceptor 远程代码执行漏洞(S2-008)(CVE-2012-0394)【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0103. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0104.

Add plugins:372, mapp:60,ics:244,other plugins 68.

Citrix XenServer Arbitrary File Read Vulnerability (CVE-2018-14007 [Thorough Scan]
OpenMRS Platform Deserialization Vulnerability (CVE-2018-19276) [Thorough Scan]
Joomla! 3.7.0 SQL Injection Vulnerability (CVE-2017-8917) [Thorough Scan]
Multiple Intel Products Unauthorized Access Vulnerabilities (CVE-2017-5689) [Thorough Scan]
Apache Struts2 CookieInterceptor Remote Code Execution Vulnerability (S2-008) (CVE-2012-0392)[Thorough Scan]
Apache Struts2 ParameterInterceptor Any File Overwrite Vulnerability (S2-008) (CVE-2012-0393)[Thorough Scan]
Apache Struts2 DebuggingInterceptor Remote Code Execution Vulnerability (S2-008) (CVE-2012-0394)[Thorough Scan]

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-05-22 12:25:34
名称: iscat-update-vulsys-V1.0R00F00.0100.dat 版本:V1.0R00F00.0100
MD5:b0f0efeb7a49bca24379a8c14e870f0c 大小:49.77M
描述:

本升级包为系统插件升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0100。

新增插件:3905个。

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, After upgrade, the system plug-in version is updated to V1.0R00F00.0100.

Add plugins:3905.

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-05-22 12:22:39
名称: iscat-update-vulsys-V1.0R00F00.0103.dat 版本:V1.0R00F00.0103
MD5:0450d4b41d530c164a149de77a864064 大小:50.46M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0102。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0103。

新增插件:153个,WWW:8个,其他:145个。

NoneCms V1.3 安全漏洞(CVE-2018-20062)【原理扫描】
phpMyAdmin 本地文件包含漏洞(CVE-2018-12613)【原理扫描】
phpMyAdmin 任意文件读取漏洞(CVE-2019-6799)【原理扫描】
Drupal 远程代码执行漏洞(CVE-2019-6340)【原理扫描】
WinRAR等多款压缩软件存在远程执行漏洞

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0102. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0103.

Add plugins:153, www:8, other plugins 145.

NoneCms V1.3 Security Vulnerability (CVE-2018-20062) [Thorough Scan]
PHPMyAdmin Local File Inclusion Vulnerability (CVE-2018-12613) [Thorough Scan]
PHPMyAdmin Arbitrary File Read Vulnerability (CVE-2019-6799) [Thorough Scan]
Drupal Remote Code Execution Vulnerability (CVE-2019-6340) [Thorough Scan]
WinRAR And Other Compression Software Remote Execution Vulnerability

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-05-22 12:24:18
名称: iscat-update-vulsys-V1.0R00F00.0102.dat 版本:V1.0R00F00.0102
MD5:ae50e4ff4bfa7d282345bbe35462f52c 大小:49.93M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0101。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0102。

新增插件:323个,mapp:69个,其他:254个。
ThinkPHP 5.0.23 远程命令执行漏洞【原理扫描】
runC 容器逃逸漏洞(CVE-2019-5736)

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0101. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0102.

Add plugins:323, mapp:69, other plugins 254.

ThinkPHP 5.0.23 remote command execution vulnerability [Thorough Scan]
runC container escape vulnerability(CVE-2019-5736)

Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-05-22 12:23:47
名称: iscat-update-vulsys-V1.0R00F00.0101.dat 版本:V1.0R00F00.0101
MD5:ff8f29a5cec4edee47ea40b11cfe731a 大小:50.18M
描述:

本升级包为系统插件升级包,支持的系统插件版本为V1.0R00F00.0100。升级包为增量升级包,升级后系统版本不变,系统插件版本变更为V1.0R00F00.0101。

新增插件:610个,MAPP:46个,Oracle:68个,其他:496个。
Winbox for MikroTik RouterOS 安全漏洞(CVE-2018-14847)【原理扫描】
Netatalk 缓冲区错误漏洞(CVE-2018-1160)【原理扫描】
海康威视(HiKvision)摄像头检测漏洞【原理扫描】

注意事项:
1. 本升级包升级完成后自动重启引擎生效,升级过程中可能会影响正在使用的功能,请选择在合适的时间进行升级。

This is a system plug-in upgrade package, which supports the system plug-in version of V1.0R00F00.0100. This upgrade package is an incremental upgrade package. After upgrade, the system plug-in version is updated to V1.0R00F00.0101.

Add plugins:610, mapp:46,oracle:68,other plugins 496.
Winbox for MikroTik RouterOS Security Vulnerability(CVE-2018-14847)[Thorough Scan]
Netatalk Buffer Error Vulnerability (CVE-2018-1160)[Thorough Scan]
Hikvision Camera Detection Vulnerability[Thorough Scan]
Notes:
1. When the upgrade is completed, the engine automatically restarts, which will affect functions being used. Please perform the upgrade at an appropriate time.

发布时间:2019-05-22 12:23:15