微软补丁星期二发布了 114 个漏洞及相关更新下载

简介: 微软补丁星期二发布了 114 个漏洞及相关更新下载

微软补丁星期二发布了 114 个漏洞及相关更新下载

作者主页:sysin.org


Rapid 7 视角:补丁星期二(Patch Tuesday)— 2026 年 1 月

原文来自 Rapid 7 官方博客,经笔者翻译和修改。

2026 年 1 月 14 日

Patch Tuesday - January 2026

概述

在本次 2026 年 1 月补丁星期二中,微软共发布了 114 个漏洞。今日更新内容仅包含 1 个被标记为“已在野外被利用”的漏洞,以及 2 个微软已知存在公开披露的漏洞。本月没有严重级别的远程代码执行或权限提升漏洞。截至目前,微软本月已发布补丁修复了 1 个浏览器漏洞以及大约十多个开源产品中的漏洞,这些并未计入上述补丁星期二的统计数量中。

Windows DWM:已在野外被利用的信息泄露漏洞

Windows 桌面窗口管理器(Desktop Window Manager,DWM)一直是漏洞研究人员和威胁行为者的高价值目标,CVE-2026-20805 是最新一个来自 DWM 的、偶发性 系列 中“已在野外被利用”的零日漏洞 (sysin)。DWM 负责绘制 Windows 系统显示屏上的所有内容,这意味着它同时具备高权限访问和几乎无处不在的可用性,因为几乎任何进程都可能需要显示内容。在本例中,漏洞利用会导致不当披露一个 ALPC 端口区段地址,该地址位于用户模式内存中,是 Windows 组件彼此协调各种操作的区域。

该漏洞的 CVSS v3 评分为 5.5,属于中等严重性,通常并不会让人第一时间想到“必须优先打补丁”。然而,微软在其自有的严重性评级体系中将 CVE-2026-20805 评定为“重要”。信息泄露漏洞由于不会直接影响完整性或可用性,其 CVSS 分数通常偏低。此外,微软的信息泄露漏洞极少被标记为“已在野外被利用”;一旦出现这种情况,往往意味着它是更长攻击链中的一环。在本案例中,很可能是被不当披露的内存地址为攻击者提供了寻找 DWM 进程内存地址的起点,从而绕过地址空间布局随机化(ASLR),并大幅提高为 DWM 开发稳定权限提升漏洞的成功率,而不是只制造不稳定的蓝屏死机。

Windows Agere 调制解调器驱动:公开披露的权限提升漏洞

早在 2025 年 10 月,微软就从所有 Windows 版本中移除了特定的调制解调器驱动程序 ltmdm64.sys,因为它涉及一个已在野外被利用的权限提升漏洞 CVE-2025-24052。今天,出于类似原因,微软又从 Windows 中移除了另外两个调制解调器驱动程序:微软已知存在针对一个非常相似的调制解调器驱动的可用漏洞利用代码,该漏洞编号为 CVE-2023-31096。这并不是笔误;该漏洞最初是在两年多前通过 MITRE 发布的,并且原始研究人员还提供了一篇可信的公开技术分析。今天发布的 Windows 补丁移除了 agrsm64.sys 和 agrsm.sys。这三个调制解调器驱动程序均由同一家如今已不存在的第三方开发,并且已在 Windows 中存在数十年。对大多数用户而言,这些驱动的移除几乎不会被察觉,但在某些环境中仍可能发现正在使用的调制解调器,例如部分工业控制系统。

仍然有两个问题值得关注:在一个已完全打补丁的 Windows 资产中,还存在多少遗留的调制解调器驱动程序?在微软彻底阻断攻击者之前,这些陈旧驱动程序中还会暴露出多少个可将权限提升至 SYSTEM 的漏洞——攻击者此前一直通过利用整类老旧设备驱动来“就地取材”地发动攻击?尽管微软并未声称 CVE-2023-31096 已被实际利用 (sysin),但 2023 年的相关公开分析以及 2025 年对另一款 Agere 调制解调器驱动的移除,已经为任何寻找 Windows 漏洞利用的人提供了两个强烈信号。需要说明的是,即便没有连接任何调制解调器,仅仅是驱动程序的存在就足以使资产处于易受攻击状态。

Secure Boot:关键安全功能绕过漏洞

今天还发布了 CVE-2026-21265,这是一个影响 Windows Secure Boot 的关键安全功能绕过漏洞。在信息安全领域,15 年的时间极其漫长,而自 Stuxnet 时代以来一直用于为 Secure Boot 生态系统中几乎所有组件签名的微软根证书,生命周期也即将走到尽头。微软早在 2023 年就发布了替换证书,并同时发布了 CVE-2023-24932,其中涵盖了相关的 Windows 补丁以及用于修复 被 BlackLotus 启动工具包利用的 Secure Boot 绕过漏洞后续操作步骤

当这些古老的 2011 年证书在今年晚些时候过期后,未安装 2023 年新证书的 Windows 设备将无法再接收 Secure Boot 的安全修复。在更新引导加载程序和 BIOS 时,务必针对所使用的具体操作系统和 BIOS 组合提前做好充分准备,因为错误的修复步骤可能导致系统无法启动。

微软生命周期更新

Visual Studio 2022 LTSC 17.10 于今日结束支持,因此现在是升级到更新的小版本的好时机。Dynamics CRM 2016(亦称 Dynamics 365)也将 达到生命周期终点。本月没有其他重要的微软产品生命周期变更。

按产品系列划分的漏洞

Azure vulnerabilities

CVE Title Exploitation status Publicly disclosed? CVSS v3 base score
CVE-2026-21224 Azure Connected Machine Agent Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-21226 Azure Core shared client library for Python Remote Code Execution Vulnerability Exploitation Less Likely No 7.5
CVE-2026-20965 Windows Admin Center Elevation of Privilege Vulnerability Exploitation Less Likely No 7.5

Developer Tools vulnerabilities

CVE Title Exploitation status Publicly disclosed? CVSS v3 base score
CVE-2026-21219 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Exploitation Unlikely No 7.0

ESU vulnerabilities

CVE Title Exploitation status Publicly disclosed? CVSS v3 base score
CVE-2026-20805 Desktop Window Manager Information Disclosure Vulnerability Exploitation Detected No 5.5
CVE-2026-20847 Microsoft Windows File Explorer Spoofing Vulnerability Exploitation Unlikely (sysin) No 6.5
CVE-2023-31096 MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability Exploitation More Likely Yes 7.8
CVE-2026-20925 NTLM Hash Disclosure Spoofing Vulnerability Exploitation Less Likely No 6.5
CVE-2026-20872 NTLM Hash Disclosure Spoofing Vulnerability Exploitation Less Likely No 6.5
CVE-2026-20821 Remote Procedure Call Information Disclosure Vulnerability Exploitation Unlikely No 6.2
CVE-2026-21265 Secure Boot Certificate Expiration Security Feature Bypass Vulnerability Exploitation Less Likely Yes 6.4
CVE-2026-20831 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20860 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Exploitation More Likely No 7.8
CVE-2026-20839 Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability Exploitation Unlikely No 5.5
CVE-2026-20940 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Exploitation Unlikely No 7.8
CVE-2026-20820 Windows Common Log File System Driver Elevation of Privilege Vulnerability Exploitation More Likely No 7.8
CVE-2026-0386 Windows Deployment Services Remote Code Execution Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20929 Windows HTTP.sys Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20816 Windows Installer Elevation of Privilege Vulnerability Exploitation More Likely No 7.8
CVE-2026-20849 Windows Kerberos Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20833 Windows Kerberos Information Disclosure Vulnerability Exploitation Less Likely No 5.5
CVE-2026-20809 Windows Kernel Memory Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20875 Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability Exploitation Less Likely No 7.5
CVE-2026-20869 Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability Exploitation Less Likely No 7.0
CVE-2024-55414 Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability Exploitation Unlikely No 7.8
CVE-2026-20936 Windows NDIS Information Disclosure Vulnerability Exploitation Unlikely No 4.3
CVE-2026-20840 Windows NTFS Remote Code Execution Vulnerability Exploitation More Likely No 7.8
CVE-2026-20922 Windows NTFS Remote Code Execution Vulnerability Exploitation More Likely No 7.8
CVE-2026-20824 Windows Remote Assistance Security Feature Bypass Vulnerability Exploitation Less Likely No 5.5
CVE-2026-20828 Windows rndismp6.sys Information Disclosure Vulnerability Exploitation Less Likely No 4.6
CVE-2026-20843 Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability Exploitation More Likely No 7.8
CVE-2026-20868 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Exploitation Less Likely No 8.8
CVE-2026-20856 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability Exploitation Less Likely No 8.1
CVE-2026-20927 Windows SMB Server Denial of Service Vulnerability Exploitation Unlikely No 5.3
CVE-2026-20919 Windows SMB Server Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20921 Windows SMB Server Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20926 Windows SMB Server Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20934 Windows SMB Server Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20848 Windows SMB Server Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20834 Windows Spoofing Vulnerability Exploitation Less Likely No 4.6
CVE-2026-20931 Windows Telephony Service Elevation of Privilege Vulnerability Exploitation Unlikely No 8.0

Microsoft Office vulnerabilities

CVE Title Exploitation status Publicly disclosed? CVSS v3 base score
CVE-2026-20946 Microsoft Excel Remote Code Execution Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20955 Microsoft Excel Remote Code Execution Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20956 Microsoft Excel Remote Code Execution Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20950 Microsoft Excel Remote Code Execution Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20957 Microsoft Excel Remote Code Execution Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20949 Microsoft Excel Security Feature Bypass Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20943 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability Exploitation Less Likely No 7.0
CVE-2026-20953 Microsoft Office Remote Code Execution Vulnerability Exploitation Less Likely No 8.4
CVE-2026-20952 Microsoft Office Remote Code Execution Vulnerability Exploitation Less Likely No 8.4
CVE-2026-20958 Microsoft SharePoint Information Disclosure Vulnerability Exploitation Less Likely No 5.4
CVE-2026-20963 Microsoft SharePoint Remote Code Execution Vulnerability Exploitation Less Likely No 8.8
CVE-2026-20951 Microsoft SharePoint Server Remote Code Execution Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20947 Microsoft SharePoint Server Remote Code Execution Vulnerability Exploitation Unlikely No 8.8
CVE-2026-20959 Microsoft SharePoint Server Spoofing Vulnerability Exploitation Less Likely No 4.6
CVE-2026-20944 Microsoft Word Remote Code Execution Vulnerability Exploitation Less Likely No 8.4
CVE-2026-20948 Microsoft Word Remote Code Execution Vulnerability Exploitation Less Likely No 7.8

SQL Server vulnerabilities

CVE Title Exploitation status Publicly disclosed? CVSS v3 base score
CVE-2026-20803 Microsoft SQL Server Elevation of Privilege Vulnerability Exploitation Less Likely No 7.2

Windows vulnerabilities

CVE Title Exploitation status Publicly disclosed? CVSS v3 base score
CVE-2026-20815 Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability Exploitation Less Likely No 7.0
CVE-2026-20830 Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability Exploitation Unlikely No 7.0
CVE-2026-21221 Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability Exploitation Unlikely No 7.0
CVE-2026-20835 Capability Access Management Service (camsvc) Information Disclosure Vulnerability Exploitation Less Likely No 5.5
CVE-2026-20851 Capability Access Management Service (camsvc) Information Disclosure Vulnerability Exploitation Less Likely (sysin) No 6.2
CVE-2026-20805 Desktop Window Manager Information Disclosure Vulnerability Exploitation Detected No 5.5
CVE-2026-20871 Desktop Windows Manager Elevation of Privilege Vulnerability Exploitation More Likely No 7.8
CVE-2026-20814 DirectX Graphics Kernel Elevation of Privilege Vulnerability Exploitation Less Likely No 7.0
CVE-2026-20836 DirectX Graphics Kernel Elevation of Privilege Vulnerability Exploitation Less Likely No 7.0
CVE-2026-20962 Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability Exploitation Less Likely No 4.4
CVE-2026-20941 Host Process for Windows Tasks Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20812 LDAP Tampering Vulnerability Exploitation Less Likely No 6.5
CVE-2026-20842 Microsoft DWM Core Library Elevation of Privilege Vulnerability Exploitation Less Likely No 7.0
CVE-2026-20847 Microsoft Windows File Explorer Spoofing Vulnerability Exploitation Unlikely No 6.5
CVE-2023-31096 MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability Exploitation More Likely Yes 7.8
CVE-2026-20925 NTLM Hash Disclosure Spoofing Vulnerability Exploitation Less Likely No 6.5
CVE-2026-20872 NTLM Hash Disclosure Spoofing Vulnerability Exploitation Less Likely No 6.5
CVE-2026-20821 Remote Procedure Call Information Disclosure Vulnerability Exploitation Unlikely No 6.2
CVE-2026-21265 Secure Boot Certificate Expiration Security Feature Bypass Vulnerability Exploitation Less Likely Yes 6.4
CVE-2026-20826 Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20827 Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability Exploitation Unlikely No 5.5
CVE-2026-20829 TPM Trustlet Information Disclosure Vulnerability Exploitation Less Likely No 5.5
CVE-2026-20811 Win32k Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20920 Win32k Elevation of Privilege Vulnerability Exploitation Unlikely No 7.8
CVE-2026-20863 Win32k Elevation of Privilege Vulnerability Exploitation Less Likely No 7.0
CVE-2026-20810 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20831 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20860 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Exploitation More Likely No 7.8
CVE-2026-20839 Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability Exploitation Unlikely No 5.5
CVE-2026-20844 Windows Clipboard Server Elevation of Privilege Vulnerability Exploitation Less Likely No 7.4
CVE-2026-20857 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Exploitation Unlikely No 7.8
CVE-2026-20940 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Exploitation Unlikely No 7.8
CVE-2026-20820 Windows Common Log File System Driver Elevation of Privilege Vulnerability Exploitation More Likely No 7.8
CVE-2026-20864 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Exploitation Unlikely No 7.8
CVE-2026-0386 Windows Deployment Services Remote Code Execution Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20817 Windows Error Reporting Service Elevation of Privilege Vulnerability Exploitation More Likely No 7.8
CVE-2026-20808 Windows File Explorer Elevation of Privilege Vulnerability Exploitation Less Likely No 7.0
CVE-2026-20823 Windows File Explorer Information Disclosure Vulnerability Exploitation Unlikely No 5.5
CVE-2026-20932 Windows File Explorer Information Disclosure Vulnerability Exploitation Unlikely No 5.5
CVE-2026-20937 Windows File Explorer Information Disclosure Vulnerability Exploitation Unlikely No 5.5
CVE-2026-20939 Windows File Explorer Information Disclosure Vulnerability Exploitation Unlikely No 5.5
CVE-2026-20822 Windows Graphics Component Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20804 Windows Hello Tampering Vulnerability Exploitation Unlikely No 7.7
CVE-2026-20852 Windows Hello Tampering Vulnerability Exploitation Less Likely No 7.7
CVE-2026-20929 Windows HTTP.sys Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20825 Windows Hyper-V Information Disclosure Vulnerability Exploitation Less Likely No 4.4
CVE-2026-20816 Windows Installer Elevation of Privilege Vulnerability Exploitation More Likely No 7.8
CVE-2026-20849 Windows Kerberos Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20833 Windows Kerberos Information Disclosure Vulnerability Exploitation Less Likely No 5.5
CVE-2026-20818 Windows Kernel Information Disclosure Vulnerability Exploitation Unlikely No 6.2
CVE-2026-20838 Windows Kernel Information Disclosure Vulnerability Exploitation Less Likely No 5.5
CVE-2026-20809 Windows Kernel Memory Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20859 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20875 Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability Exploitation Less Likely No 7.5
CVE-2026-20854 Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability Exploitation Less Likely No 7.5
CVE-2026-20869 Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability Exploitation Less Likely No 7.0
CVE-2026-20858 Windows Management Services Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20865 Windows Management Services Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20877 Windows Management Services Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20918 Windows Management Services Elevation of Privilege Vulnerability Exploitation Unlikely No 7.8
CVE-2026-20923 Windows Management Services Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20924 Windows Management Services Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20861 Windows Management Services Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20866 Windows Management Services Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20867 Windows Management Services Elevation of Privilege Vulnerability Exploitation Unlikely No 7.8
CVE-2026-20873 Windows Management Services Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20874 Windows Management Services Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20862 Windows Management Services Information Disclosure Vulnerability Exploitation Unlikely No 5.5
CVE-2026-20837 Windows Media Remote Code Execution Vulnerability Exploitation Less Likely No 7.8
CVE-2024-55414 Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability Exploitation Unlikely No 7.8
CVE-2026-20936 Windows NDIS Information Disclosure Vulnerability Exploitation Unlikely No 4.3
CVE-2026-20840 Windows NTFS Remote Code Execution Vulnerability Exploitation More Likely No 7.8
CVE-2026-20922 Windows NTFS Remote Code Execution Vulnerability Exploitation More Likely No 7.8
CVE-2026-20824 Windows Remote Assistance Security Feature Bypass Vulnerability Exploitation Less Likely No 5.5
CVE-2026-20832 Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20828 Windows rndismp6.sys Information Disclosure Vulnerability Exploitation Less Likely No 4.6
CVE-2026-20843 Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability Exploitation More Likely No 7.8
CVE-2026-20868 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Exploitation Less Likely No 8.8
CVE-2026-20856 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability Exploitation Less Likely No 8.1
CVE-2026-20927 Windows SMB Server Denial of Service Vulnerability Exploitation Unlikely No 5.3
CVE-2026-20919 Windows SMB Server Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20921 Windows SMB Server Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20926 Windows SMB Server Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20934 Windows SMB Server Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20848 Windows SMB Server Elevation of Privilege Vulnerability Exploitation Unlikely No 7.5
CVE-2026-20834 Windows Spoofing Vulnerability Exploitation Less Likely No 4.6
CVE-2026-20931 Windows Telephony Service Elevation of Privilege Vulnerability Exploitation Unlikely No 8.0
CVE-2026-20876 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability Exploitation Less Likely (sysin) No 6.7
CVE-2026-20938 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8
CVE-2026-20819 Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability Exploitation Less Likely No 5.5
CVE-2026-20935 Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability Exploitation Less Likely No 6.2
CVE-2026-20853 Windows WalletService Elevation of Privilege Vulnerability Exploitation Less Likely No 7.4
CVE-2026-20870 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Exploitation Less Likely No 7.8

相关检测工具和修复后的产品下载

Tenable Nessus 10.11.1 (macOS, Linux, Windows) - 漏洞评估解决方案

Nexpose 8.33.0 for Linux & Windows - 漏洞扫描

Windows 下载汇总

更多:HTTP 协议与安全

目录
相关文章
|
5天前
|
Oracle Java 关系型数据库
JDK 18详细安装教程步骤官方正版安装包
JDK是Oracle官方Java开发工具包,含JVM、类库、编译器等,支持Java SE/EE/ME。本文提供JDK 18安装包下载及详细图文安装指南,含解压、管理员运行、环境验证(java -version)等步骤,助你快速配置Java开发环境。(239字)
|
2天前
|
人工智能 网络安全 调度
2026年阿里云OpenClaw(Clawdbot)安装并使用Skills保姆级教程
2026年,OpenClaw(前身为Clawdbot、Moltbot)凭借开源轻量化架构、强大的AI协同能力及完善的插件生态,成为个人、开发者及轻量团队搭建专属AI助手的首选工具[2]。其核心价值在于“自然语言指令+任务自动化”,无需复杂开发,即可实现多场景任务高效执行;而Skills作为OpenClaw的“功能扩展核心”,相当于为AI助手配备了“灵活双手”,通过各类模块化技能插件,让OpenClaw突破纯语言交互的限制,解锁网页自动化、文件处理、代码开发、邮件管理、信息搜索等具象化能力[3]。
233 6
|
1月前
|
数据采集 人工智能 IDE
告别碎片化日志:一套方案采集所有主流 AI 编程工具
本文介绍了一套基于MCP架构的轻量化、多AI工具代码采集方案,支持CLI、IDE等多类工具,实现用户无感、可扩展的数据采集,已对接Aone日志平台,助力AI代码采纳率分析与研发效能提升。
423 46
告别碎片化日志:一套方案采集所有主流 AI 编程工具
|
10天前
|
存储 弹性计算 测试技术
阿里云“99计划”是什么?具体有什么政策?
阿里云“99计划”是面向个人开发者、初创及中小企业的长期普惠云活动,主打2核2G经济型e实例(99元/年)和2核4G通用u1实例(199元/年),支持新购续费同价,搭配建站、数据库、安全等一站式优惠,低价不低质,助力低成本上云。
239 13
|
21天前
|
存储 弹性计算 并行计算
阿里云8核8G云服务器收费标准、实例规格及选配教程
阿里云8核8G云服务器是典型的均衡型配置,CPU与内存配比为1:1,这种配比能兼顾多任务并行计算和常规业务内存需求,既不会像低配置机型那样局限于轻量场景,也不会像高配置机型那样聚焦重度计算,因此广泛适配中小企业核心业务系统、中型网站部署、开发测试环境等场景。该配置仅在ECS云服务器系列中提供,无对应轻量应用服务器版本,2026年的收费标准会根据实例类型、计费方式、地域选择产生明显差异,优惠活动则聚焦长期购买折扣、续费保障及通用补贴,整体定价和福利均贴合不同用户的实际使用需求,无隐性消费和捆绑条件。
124 14
|
27天前
|
安全 关系型数据库 数据库
2026年阿里云针对企业用户有哪些扶持政策?最新中小企业扶持权益解析
2026年阿里云推出多项企业扶持政策,建站方面,提供.com域名1元购、多后缀域名特惠及建站模板、营销推广服务;业务上云推出99元/年经济型e实例、199元/年通用算力型u1实例及云数据库、OSS等特惠产品;协同办公包含无影云电脑59元/3个月特价、钉钉、企业邮箱等优惠;专项补贴涵盖算力补贴(单客户上不封顶)、出海扶持金及创业者计划;企业可免费试用140余款云产品并获专业技术支持,全面降低企业上云成本,提升市场竞争力。
179 8
|
20天前
|
人工智能 自然语言处理 物联网
Qwen-Image 从推理到 LoRA 训练实战教程(AMD GPU × DiffSynth-Studio)
本课程由魔搭社区出品,详解如何在AMD GPU上基于DiffSynth-Studio框架高效部署、微调与训练Qwen-Image系列大模型(860亿参数)。涵盖文生图推理、LoRA画质增强、多语言提示理解、高一致性人像外延及多图融合编辑,并支持从零训练专属LoRA(如定制狗狗生成)。
537 40
|
1月前
|
SQL 人工智能 Java
告别传统 Text-to-SQL:基于 Spring AI Alibaba 的数据分析智能体 DataAgent 深度解析
DataAgent是基于Spring AI Alibaba生态构建的企业级AI数据分析师,融合NL2SQL、多智能体协作与RAG技术,支持多数据源分析、自动纠错与可视化报告生成,让业务人员零代码获取深度数据洞察。
1185 42
告别传统 Text-to-SQL:基于 Spring AI Alibaba 的数据分析智能体 DataAgent 深度解析
|
数据采集 监控 机器人
User-Agent 即用户代理
User-Agent 即用户代理
892 2