<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Translations%3ACVE-2016-9299_%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2F1%2Fen</id>
	<title>Translations:CVE-2016-9299 代碼執行漏洞/1/en - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Translations%3ACVE-2016-9299_%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2F1%2Fen"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CVE-2016-9299_%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/1/en&amp;action=history"/>
	<updated>2026-04-05T06:43:48Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CVE-2016-9299_%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/1/en&amp;diff=4531&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==Introduction== The remote processing module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code through elaborate serialization of...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CVE-2016-9299_%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/1/en&amp;diff=4531&amp;oldid=prev"/>
		<updated>2021-06-10T02:43:45Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==Introduction== The remote processing module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code through elaborate serialization of...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==Introduction==&lt;br /&gt;
The remote processing module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code through elaborate serialization of Java objects, thereby triggering LDAP queries to third-party servers.&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>