diff --git a/maxView_Storage_Manager_dynamiccontent.properties.xhtml_RCE.md b/maxView_Storage_Manager_dynamiccontent.properties.xhtml_RCE.md new file mode 100644 index 0000000..bca24b1 --- /dev/null +++ b/maxView_Storage_Manager_dynamiccontent.properties.xhtml_RCE.md @@ -0,0 +1,12 @@ +## maxView Storage Manager dynamiccontent.properties.xhtml RCE + +| **Vulnerability** | **maxView Storage Manager dynamiccontent.properties.xhtml RCE** | +| :----: | :-----| +| **Chinese name** | maxView Storage Manager 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞 | +| **CVSS core** | 9.8 | +| **FOFA Query** (click to view the results directly)| [title=="maxView Storage Manager - Login"](https://en.fofa.info/result?qbase64=dGl0bGU9PSJtYXhWaWV3IFN0b3JhZ2UgTWFuYWdlciAtIExvZ2luIg%3D%3D) | +| **Number of assets affected** | 1465 | +| **Description** | maxView Storage Manager is a management system for enterprise storage and communication solutions.

There is a code execution vulnerability in maxView Storage Manager, an attacker can execute arbitrary code through dynamiccontent.properties.xhtml to gain server privileges. | +| **Impact** | There is a code execution vulnerability in maxView Storage Manager, an attacker can execute arbitrary code through dynamiccontent.properties.xhtml to gain server privileges. | + +![](https://s3.bmp.ovh/imgs/2023/06/09/b3b919992e1c09f1.gif)