Vulnerabilites related to zohocorp - manageengine_opmanager
Vulnerability from fkie_nvd
Published
2014-12-04 17:59
Modified
2024-11-21 02:13
Severity ?
Summary
Directory traversal vulnerability in the FileCollector servlet in ZOHO ManageEngine OpManager 11.4, 11.3, and earlier allows remote attackers to write and execute arbitrary files via a .. (dot dot) in the FILENAME parameter.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66913D18-7CFF-4375-9FAB-3DB0D8802CB4",
              "versionEndIncluding": "11.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in the FileCollector servlet in ZOHO ManageEngine OpManager 11.4, 11.3, and earlier allows remote attackers to write and execute arbitrary files via a .. (dot dot) in the FILENAME parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en el servlet FileCollector en ZOHO ManageEngine OpManager 11.4, 11.3, y anteriores permite a atacantes remotos escribir y ejecutar ficheros arbitrarios a trav\u00e9s de un .. (punto punto) en el par\u00e1metro FILENAME."
    }
  ],
  "id": "CVE-2014-6035",
  "lastModified": "2024-11-21T02:13:38.327",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-04T17:59:03.767",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-08-04 00:29
Modified
2024-11-21 02:39
Severity ?
Summary
Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn't use a per-system key or even a salt; therefore, it's possible to create a universal decryptor.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEC9C04-2DA1-4307-8828-9E91352FB055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD4D0DE-2B11-48AA-A60B-ED6B6DB94020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7D1014-51CF-4A24-9935-BD385E1EE57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD940D38-D057-47D0-98EC-B38B0C781A3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF7ED07-3132-4670-831B-CCD6F34E5C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn\u0027t use a per-system key or even a salt; therefore, it\u0027s possible to create a universal decryptor."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager 11 en su versi\u00f3n 12.2 utiliza un algoritmo de cifrado personalizado para proteger las credenciales utilizadas para acceder a los dispositivos monitorizados. El algoritmo implementado no utiliza una clave para cada sistema o incluso una semilla, por lo que es posible crear un descifrador universal."
    }
  ],
  "id": "CVE-2015-9107",
  "lastModified": "2024-11-21T02:39:48.953",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-08-04T00:29:00.173",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/theguly/DecryptOpManager"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/theguly/DecryptOpManager"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-04-01 19:15
Modified
2024-11-21 05:45
Severity ?
Summary
Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
              "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
              "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
              "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
              "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
              "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
              "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
              "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*",
              "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS."
    },
    {
      "lang": "es",
      "value": "Las compilaciones de Manage Engine OpManager por debajo de 125346, son vulnerables a una vulnerabilidad de denegaci\u00f3n de servicio remota debido a un problema de salto de ruta en el componente spark gateway.\u0026#xa0;Esto permite que un atacante remoto elimine remotamente cualquier directorio o directorios del sistema operativo."
    }
  ],
  "id": "CVE-2021-20078",
  "lastModified": "2024-11-21T05:45:53.147",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-04-01T19:15:13.450",
  "references": [
    {
      "source": "vulnreport@tenable.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/security/research/tra-2021-10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/security/research/tra-2021-10"
    }
  ],
  "sourceIdentifier": "vulnreport@tenable.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-02-04 16:59
Modified
2024-11-21 02:18
Severity ?
Summary
Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35DA35B-6836-41FD-9B1D-E76809D19304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48CA686-28DF-4CE5-A950-1C62D162D987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "504C45FC-1A8C-4C6A-AA55-4B2C21DF5BEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E6403B7-8C3D-40D1-A32B-3A50B2A6D005",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAD3BAD6-58BE-4099-994C-9DBFA2210D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E30D446-E54B-414B-BEB0-E7C2AD6DC092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "900914C7-4A60-45D2-90E1-3488998C77B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE71B7E-88F9-45B3-911C-472B5438D062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEC9C04-2DA1-4307-8828-9E91352FB055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD4D0DE-2B11-48AA-A60B-ED6B6DB94020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7D1014-51CF-4A24-9935-BD385E1EE57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en el servlet FailOverHelperServlet (tambi\u00e9n conocido como FailServlet) en ZOHO ManageEngine OpManager 8 hasta 11.5 build 11400 y IT360 10.5 y anteriores permiten a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro (1) customerName o (2) serverRole en una operaci\u00f3n standbyUpdateInCentral en servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet."
    }
  ],
  "id": "CVE-2014-7864",
  "lastModified": "2024-11-21T02:18:10.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-02-04T16:59:00.060",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2015/Jan/114"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2015/Jan/114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-09-20 07:29
Modified
2024-11-21 03:54
Severity ?
Summary
Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A479DB39-D6A7-4D36-8AE4-76CF1E74D6F4",
              "versionEndExcluding": "12.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection."
    },
    {
      "lang": "es",
      "value": "Global Search en Zoho ManageEngine OpManager en versiones anteriores a la 12.3 123205 permite la inyecci\u00f3n SQL."
    }
  ],
  "id": "CVE-2018-17243",
  "lastModified": "2024-11-21T03:54:08.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-09-20T07:29:00.267",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-08-16 03:15
Modified
2024-11-21 04:28
Severity ?
Summary
An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E60B8B3-E1EC-4EEB-B955-22B410EBAD41",
              "versionEndIncluding": "12.4.034",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The \"username+\u0027@opm\u0027 string is used for the password. For example, if the username is admin, the password is admin@opm."
    },
    {
      "lang": "es",
      "value": "Se ha detectado un problema en Zoho ManageEngine OpManager en compilaciones anteriores a 14310. Se puede omitir el requisito de contrase\u00f1a de usuario y ejecutar comandos en el servidor. Para la contrase\u00f1a se utiliza la cadena \"nombre de usuario+\u0027@opm\u0027. Por ejemplo, si el nombre de usuario es admin, la contrase\u00f1a es admin-opm."
    }
  ],
  "id": "CVE-2019-15106",
  "lastModified": "2024-11-21T04:28:03.667",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-08-16T03:15:11.327",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/47229"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/47229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-12-21 09:29
Modified
2024-11-21 04:01
Summary
Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
              "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
              "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
              "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
              "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
              "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
              "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
              "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
              "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
              "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
              "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
              "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
              "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
              "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
              "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
              "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
              "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
              "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
              "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
              "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
              "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
              "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
              "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
              "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
              "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
              "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
              "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
              "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
              "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
              "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
              "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
              "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
              "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
              "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
              "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
              "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
              "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
              "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
              "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
              "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
              "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
              "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
              "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
              "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
              "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
              "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
              "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
              "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
              "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
              "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
              "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
              "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
              "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
              "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
              "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
              "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
              "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
              "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
              "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
              "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
              "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
              "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
              "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
              "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
              "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
              "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
              "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
              "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
              "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
              "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
              "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
              "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
              "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
              "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
              "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
              "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
              "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
              "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
              "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
              "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
              "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
              "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
              "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
              "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
              "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
              "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
              "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
              "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
              "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
              "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
              "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
              "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
              "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
              "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
              "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
              "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
              "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
              "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
              "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
              "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
              "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
              "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
              "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
              "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
              "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
              "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
              "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
              "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
              "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
              "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
              "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
              "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
              "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
              "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
              "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
              "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
              "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
              "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
              "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
              "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
              "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
              "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
              "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
              "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
              "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
              "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
              "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
              "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
              "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
              "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
              "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
              "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
              "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
              "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
              "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
              "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
              "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
              "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
              "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
              "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*",
              "matchCriteriaId": "F3F7F501-1F21-4825-BD82-23ACA713FFD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*",
              "matchCriteriaId": "422417EA-FF20-428A-AC02-18D4F84DA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*",
              "matchCriteriaId": "59BCAF6B-CAC3-4142-B303-7B85B24C573C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*",
              "matchCriteriaId": "136E1AE8-723C-4A85-AC7A-A5FA557BE66F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*",
              "matchCriteriaId": "19BE3780-3FAB-46C9-9399-62C18EA1A322",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*",
              "matchCriteriaId": "D32CDFC3-8041-426B-BBE0-245703D4D74E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*",
              "matchCriteriaId": "6B95BC46-7679-415E-814B-29DA657A718E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123238:*:*:*:*:*:*",
              "matchCriteriaId": "C4C6D08A-13C8-4BE9-870A-9EB4591F984A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager, en versiones 12.3 anteriores a la build 123239, permite Cross-Site Scripting (XSS) en la columna Notes de la secci\u00f3n Alarms."
    }
  ],
  "id": "CVE-2018-20339",
  "lastModified": "2024-11-21T04:01:16.297",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-12-21T09:29:00.450",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106302"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-06-18 22:15
Modified
2024-11-21 04:22
Summary
Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_analytics_plus:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "14FAD4FD-CD54-4FE7-A849-A4837D3413B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_browser_security_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB71331-CB4A-41FD-AC26-90F833ED9D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_desktop_central:10.0.380:*:*:*:*:*:*:*",
              "matchCriteriaId": "643C7F9E-F838-421C-BB13-ECCFDF073C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:12.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C97619-847C-43B7-ADC8-B9B9833FA5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF81E8-5FEE-4178-9FB0-49CB377329BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_key_manager_plus:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABCFC9E0-7B46-46AB-87D4-596993A15859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:9.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2AF501-8A1A-4BB8-B796-0AFCF379B23A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D0B03D-B7B2-4E45-837A-C29DF895C065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB014B4E-EB9B-4B71-9E9C-EB28E254FBB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_o365_manager_plus:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F7C3D36-6C00-488D-B862-68EC243A9348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B6B47F-EE8C-49C7-B2FF-B886C2D68849",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E409911-AB1C-47CA-9E69-484B7E16FC17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1451EC-1F96-42AF-BEC9-0D370E827643",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_manager_plus:9.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64E8AC1-A456-46B8-8940-A200C328A7EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD30D38-181E-4397-98DF-A7BE8D745A10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "457BE370-7CAF-4010-AC8C-A059F4892408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_vulnerability_manager_plus:9.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50F7EAA-D965-4C81-867C-FE4FC0DC9BB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus."
    },
    {
      "lang": "es",
      "value": "Varios productos Zoho ManageEngine sufren una escalada de privilegios locales debido a permisos inapropiados para el directorio %SYSTEMDRIVE%\\ManageEngine y sus subcarpetas. Adem\u00e1s, los servicios asociados con dichos productos intentan ejecutar archivos binarios como sc.exe desde el directorio actual durante un inicio de sistema. Esto permitir\u00e1 efectivamente a los usuarios no privilegiados escalar sus privilegios a NT AUTHORITY\\SYSTEM. Esto afecta a Desktop Central versi\u00f3n 10.0.380, EventLog Analyzer versi\u00f3n 12.0.2, ServiceDesk Plus versi\u00f3n 10.0.0, SupportCenter Plus versi\u00f3n 8.1, O365 Manager Plus versi\u00f3n 4.0, Mobile Device Manager Plus versi\u00f3n 9.0.0, Patch Connect Plus versi\u00f3n 9.0.0, Vulnerability Manager Plus versi\u00f3n 9.0.0 , Patch Manager Plus versi\u00f3n 9.0.0, OpManager versi\u00f3n 12.3, NetFlow Analyzer versi\u00f3n 11.0, OpUtils versi\u00f3n 11.0, Network Configuration Manager versi\u00f3n 11.0, FireWall  versi\u00f3n 12.0, Key Manager Plus versi\u00f3n 5.6, Password Manager Pro versi\u00f3n 9.9, Analytics Plus versi\u00f3n 1.0 y Browser Security Plus."
    }
  ],
  "id": "CVE-2019-12133",
  "lastModified": "2024-11-21T04:22:17.113",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-06-18T22:15:12.027",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        },
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-12-06 22:29
Modified
2024-11-21 03:58
Summary
Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 11.4
zohocorp manageengine_opmanager 11.5
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 123222
zohocorp manageengine_opmanager 123223
zohocorp manageengine_opmanager 123224
zohocorp manageengine_opmanager 123229
zohocorp manageengine_opmanager 123230
zohocorp manageengine_opmanager 123231



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
              "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
              "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
              "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
              "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
              "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
              "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
              "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
              "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
              "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
              "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
              "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
              "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
              "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
              "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
              "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
              "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
              "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
              "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
              "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
              "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
              "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
              "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
              "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
              "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
              "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
              "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
              "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
              "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
              "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
              "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
              "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
              "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
              "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
              "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
              "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
              "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
              "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
              "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
              "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
              "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
              "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
              "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
              "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
              "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
              "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
              "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
              "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
              "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
              "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
              "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
              "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
              "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
              "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
              "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
              "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
              "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
              "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
              "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
              "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
              "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
              "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
              "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
              "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
              "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
              "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
              "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
              "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
              "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
              "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
              "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
              "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
              "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
              "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
              "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
              "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
              "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
              "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
              "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
              "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
              "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
              "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
              "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
              "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
              "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
              "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
              "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
              "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
              "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
              "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
              "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
              "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
              "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
              "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
              "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
              "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
              "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
              "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
              "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
              "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
              "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
              "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
              "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
              "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
              "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
              "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
              "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
              "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
              "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
              "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
              "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
              "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
              "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
              "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
              "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
              "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
              "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
              "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
              "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
              "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
              "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
              "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
              "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
              "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
              "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
              "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
              "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
              "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
              "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
              "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
              "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
              "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
              "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
              "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
              "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
              "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
              "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
              "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
              "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
              "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*",
              "matchCriteriaId": "CBF58EC7-2DDA-4EC0-8406-F3B711B62974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*",
              "matchCriteriaId": "CD036146-E374-4571-9302-9978CD892805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*",
              "matchCriteriaId": "7112E33A-C694-432D-8880-BB2211EBA5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*",
              "matchCriteriaId": "932A2D27-CC0E-4F33-AD0C-4876984F1F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123219:*:*:*:*:*:*",
              "matchCriteriaId": "2C55FF31-14E0-4D66-9F33-CF907B684C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123220:*:*:*:*:*:*",
              "matchCriteriaId": "4F8BD66B-6AB2-46C9-8133-6677ACBEDC10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123221:*:*:*:*:*:*",
              "matchCriteriaId": "54DA156C-85E1-4A2D-9612-02C05180AB06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123222:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FA72B2A-6915-4665-938A-41F69FBB8644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123223:*:*:*:*:*:*:*",
              "matchCriteriaId": "DABFE658-72C2-43DF-95C6-28C383B58B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123224:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A9948BE-A9FC-47EA-A697-65424628BE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123229:*:*:*:*:*:*:*",
              "matchCriteriaId": "75978426-63A2-413E-8164-A9DCB2DC8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123230:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E56DF0C-7B84-4E42-897B-FD3DEE933BBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123231:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35A7D32-856A-49FE-8896-9006FE4BDA74",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager 12.3 antes de 123237 tiene Cross-Site Scripting (XSS) en el controlador del dominio."
    }
  ],
  "id": "CVE-2018-19921",
  "lastModified": "2024-11-21T03:58:48.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-12-06T22:29:04.723",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-04-22 13:15
Modified
2024-11-21 06:21
Severity ?
Summary
Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
              "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
              "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
              "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
              "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager versiones anteriores a 12.5.329, permite una ejecuci\u00f3n de c\u00f3digo remota no autenticada debido a una omisi\u00f3n general en la clase de deserializaci\u00f3n"
    }
  ],
  "id": "CVE-2021-3287",
  "lastModified": "2024-11-21T06:21:13.537",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-04-22T13:15:07.970",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-502"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-05 23:15
Modified
2024-11-21 06:59
Severity ?
Summary
Zoho ManageEngine OPManager through 125588 allows SQL Injection via a few default reports.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
              "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
              "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
              "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
              "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
              "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
              "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
              "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*",
              "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*",
              "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*",
              "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*",
              "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*",
              "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*",
              "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*",
              "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*",
              "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*",
              "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*",
              "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*",
              "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*",
              "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*",
              "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*",
              "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*",
              "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*",
              "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*",
              "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*",
              "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*",
              "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*",
              "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*",
              "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*",
              "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*",
              "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*",
              "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*",
              "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*",
              "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*",
              "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*",
              "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*",
              "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*",
              "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*",
              "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*",
              "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*",
              "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*",
              "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*",
              "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*",
              "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*",
              "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*",
              "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125457:*:*:*:*:*:*",
              "matchCriteriaId": "BC457292-04FE-4643-8F1D-05DAEF3F70BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*",
              "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*",
              "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*",
              "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125476:*:*:*:*:*:*",
              "matchCriteriaId": "BE930B14-4B22-4299-8DE8-7625342FC4E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*",
              "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*",
              "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*",
              "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*",
              "matchCriteriaId": "7D394493-D690-44F0-B3F0-FD39E46F31C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "AF8CBF57-EF1A-4C84-879B-1A4035F4236A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*",
              "matchCriteriaId": "2F1E924E-8896-41CE-82E2-F22943A02FCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*",
              "matchCriteriaId": "FB058840-E3D0-45FA-B95F-3445A7719118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125604:*:*:*:*:*:*",
              "matchCriteriaId": "913CD99C-8F47-47BD-BD7C-33762861BB08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OPManager through 125588 allows SQL Injection via a few default reports."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OPManager versiones hasta 125588, permite una inyecci\u00f3n SQL por medio de algunos informes por defecto"
    }
  ],
  "id": "CVE-2022-29535",
  "lastModified": "2024-11-21T06:59:16.917",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-05T23:15:09.367",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://manageengine.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://manageengine.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-12-04 17:59
Modified
2024-11-21 02:18
Severity ?
Summary
Multiple SQL injection vulnerabilities in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the (1) OPM_BVNAME parameter in a Delete operation to the APMBVHandler servlet or (2) query parameter in a compare operation to the DataComparisonServlet servlet.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B68292A0-79E4-4CEE-844E-05342994E534",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9176D056-7350-4371-8F7E-87C2521EEBF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C71A803-6D67-4D8F-8072-73C10532BB30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the (1) OPM_BVNAME parameter in a Delete operation to the APMBVHandler servlet or (2) query parameter in a compare operation to the DataComparisonServlet servlet."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en ZOHO ManageEngine OpManager 11.3 y 11.4, IT360 10.3 y 10.4, y Social IT Plus 11.0 permiten a atacantes remotos o usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s de (1) el par\u00e1metro OPM_BVNAME en una operaci\u00f3n de eliminar en el servlet APMBVHandler o (2) el par\u00e1metro query en una operaci\u00f3n de compara en el servlet DataComparisonServlet."
    }
  ],
  "id": "CVE-2014-7868",
  "lastModified": "2024-11-21T02:18:10.457",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-04T17:59:06.720",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Nov/21"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/71002"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Nov/21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/71002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-10-13 23:15
Modified
2024-11-21 06:24
Severity ?
Summary
Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
              "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
              "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
              "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
              "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
              "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
              "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
              "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*",
              "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*",
              "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*",
              "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*",
              "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*",
              "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*",
              "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*",
              "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*",
              "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*",
              "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*",
              "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*",
              "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*",
              "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*",
              "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*",
              "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*",
              "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*",
              "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*",
              "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*",
              "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*",
              "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*",
              "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*",
              "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*",
              "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*",
              "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*",
              "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*",
              "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*",
              "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*",
              "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*",
              "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*",
              "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*",
              "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*",
              "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*",
              "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*",
              "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*",
              "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*",
              "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API."
    },
    {
      "lang": "es",
      "value": "OpManager de Zoho ManageEngine versiones anteriores a 125437, es vulnerable a una inyecci\u00f3n SQL en el m\u00f3dulo de diagn\u00f3sticos de soporte. Esto ocurre por medio del par\u00e1metro pollingObject de la API getDataCollectionFailureReason"
    }
  ],
  "id": "CVE-2021-40493",
  "lastModified": "2024-11-21T06:24:15.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-13T23:15:07.247",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-06-29 12:29
Modified
2024-11-21 03:46
Summary
Incorrect Access Control in FailOverHelperServlet in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows attackers to read certain files on the web server without login by sending a specially crafted request to the server with the operation=copyfile&fileName= substring.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:firewall_analyzer:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFC3545-5EE0-4722-BFB6-58B3AF246F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0940949F-4EB4-460B-8CE9-56B6387250F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1C4C73-FD72-4EE7-BE63-D83C373E6A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91373406-389A-404C-81A1-BA994B0C06DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AE5990D-D4B9-4D55-B221-20A9BF765C0A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incorrect Access Control in FailOverHelperServlet in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows attackers to read certain files on the web server without login by sending a specially crafted request to the server with the operation=copyfile\u0026fileName= substring."
    },
    {
      "lang": "es",
      "value": "Control de acceso incorrecto en FailOverHelperServlet en Zoho ManageEngine Netflow Analyzer antes de la build123137, Network Configuration Manager antes de la build 123128, OpManager antes de la build 123148, OpUtils antes de la build 123161 y Firewall Analyzer antes de la build 123147 permite a los atacantes leer determinados archivos en el servidor web sin necesidad de iniciar sesi\u00f3n mediante el env\u00edo de una petici\u00f3n especialmente manipulada al servidor con la subcadena operation=copyfilefileName=."
    }
  ],
  "id": "CVE-2018-12997",
  "lastModified": "2024-11-21T03:46:13.037",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-06-29T12:29:00.437",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Jul/73"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/unh3x/just4cve/issues/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Jul/73"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/unh3x/just4cve/issues/8"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-10-09 14:59
Modified
2024-11-21 02:37
Severity ?
Summary
ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of "plugin" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 11.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of \"plugin\" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password."
    },
    {
      "lang": "es",
      "value": "ZOHO ManageEngine OpManager 11.5 build 11600 y anteriores utiliza una contrase\u00f1a de \u0027plugin\u0027 embebida para la cuenta IntegrationUser, lo que permite a usuarios remotos autenticados obtener acceso de administrador aprovechando su conocimiento de esa contrase\u00f1a."
    }
  ],
  "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/798.html\" target=\"_blank\"\u003eCWE-798: Use of Hard-coded Credentials\u003c/a\u003e",
  "id": "CVE-2015-7765",
  "lastModified": "2024-11-21T02:37:21.880",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-10-09T14:59:06.670",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2015/Sep/66"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.exploit-db.com/exploits/38221/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2015/Sep/66"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.exploit-db.com/exploits/38221/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-10-09 14:59
Modified
2024-11-21 02:37
Severity ?
Summary
PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47242C01-A219-4236-BC5A-FD55707B879E",
              "versionEndIncluding": "11.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD940D38-D057-47D0-98EC-B38B0C781A3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by \"INSERT/**/INTO.\""
    },
    {
      "lang": "es",
      "value": "PGSQL:SubmitQuery.do en ZOHO ManageEngine OpManager 11.6, 11.5 y anteriores permite a administradores remotos eludir las restricciones de consulta SQL a trav\u00e9s de un comentario en la consulta a api/json/admin/SubmitQuery, seg\u00fan lo demostrado por \u0027INSERT/**/INTO\u0027."
    }
  ],
  "id": "CVE-2015-7766",
  "lastModified": "2024-11-21T02:37:22.020",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-10-09T14:59:08.390",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2015/Sep/66"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.exploit-db.com/exploits/38221/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2015/Sep/66"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.exploit-db.com/exploits/38221/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-10 20:16
Modified
2024-11-21 07:14
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution.
Impacted products
Vendor Product Version
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager_msp 12.5
zohocorp manageengine_opmanager_msp 12.5
zohocorp manageengine_opmanager_msp 12.5
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_plus 12.5
zohocorp manageengine_opmanager_plus 12.5
zohocorp manageengine_opmanager_plus 12.5
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "95767F18-02DA-4B39-941E-3111639A8295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "3D6B8568-FCE8-4283-A41A-98DDA07B3631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "D6CF42CA-ED4F-4184-B392-B9BA6846A7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "2AFC22CB-4540-498A-AAA1-0F6D1676F290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "6585CDEA-9649-45A3-8965-E2CEAB1ADFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "5D9F4070-68B1-4444-991A-A2CB0063442A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "EF7CDF11-A00E-47B6-B8E3-512998134656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "A0B3AA58-0D48-4152-BF08-357D4A2098AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "22171713-63E5-42F8-BD7B-835447371595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "D42A5730-622F-4903-991D-B54881349ABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "EC69DF45-45F8-4C7B-8457-666270C95895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "A33E48DB-3CC9-43FD-85F8-0F3C389B961E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "389CF8B9-F431-4369-A581-4BFBA1305A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "DBD1E3BA-4112-4AD5-A616-BCFD2D5C5FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "4FFD8500-5E07-4B3E-88EC-27C403A9B44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "0BED22ED-D040-4439-AEC6-8CCD74F29217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "4D1C56BB-D28D-48B6-BA6B-7B403E248648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "A49349AE-4EA2-4CE4-B8B9-326D44264B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "BEC805D2-CFDC-40DE-AA70-42A91461BEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "4767BF5A-B867-44BB-B152-E2AFA63B06D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "5855C471-07AB-4A96-9631-26C6C8B01F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "5075910F-3676-439A-879A-5CBE2C734347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "20808F91-7F08-4BA9-9075-C54337EC68E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "C700CE3B-31B5-4B4D-A378-70EC26D6F88B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "574117B3-2785-4971-ABBE-55C08010E16B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "8C4AA98C-BFFE-46E9-A3C3-D37298A8F6F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "B907FD6F-BA43-4D8D-90C4-F51CD693E9B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "B6CF111E-B976-46D1-A246-B7D1750FFC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "36CBCAF8-B7FE-4611-A9DE-C82BCDE81A86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "33D8FC4D-0EF1-4C5B-A677-7269FFF068C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "C510DE4D-B2AB-404D-BA49-3CE09FAECB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "6594EF08-E72F-4A59-86DB-B63E0CCE4463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "219B0F9E-A087-4AA2-B723-E3D68BEC9D21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "852A63FF-F97B-4BB9-869F-383E9FABE929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "FA6C4793-6913-4C51-A2D4-B906D2CBEA94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "3AF232D9-6735-4296-91C8-A451A1801287",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "855EA944-CB73-4193-94E0-9D706FF554C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "002FDBC8-72DE-46C6-A84B-B4A51F3228F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "AABA0E18-790D-4A86-91C4-1C50D2B6167C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "797C3F7A-E5CE-48B7-9BC1-4A637131C061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "7EE387F3-24C8-4933-A25E-D9C4026469D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "2D219374-C6A2-4A28-AF41-ABC633D8C9ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "88C4DF20-F8A7-4673-9639-42522C6BB3C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "722ACCC8-EC9C-4700-A5D0-5C6EFE8E36AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "FC0970ED-62DC-442B-AA29-618ADBD66E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "8D6852F2-14B0-4EAE-B420-67A0103C10EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "BF0CBE7F-B124-4ABD-82F5-CB85341CAC86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "08A4CCDD-0892-4FF3-8E17-41D6AB8FC747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "2DB6B15E-6513-4590-A5C1-A949341411F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "C1DF8B30-1820-4DA1-AB30-996FCC99192B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "09C0FF80-AF4C-47F9-B35C-12A7F2843D0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "6445A4A5-E41D-4B60-88E7-0E5B66C2A096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "645D9C07-A2F4-4E8B-B2FD-39330CD7BE14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "63739B14-BBAF-4F12-A178-36CE2C0F6B5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "1C14D389-AA7A-4CD3-A0B5-EF052907FEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "48C09D5D-BC77-42DC-9A72-00A71F8C1A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "14269E88-7186-4F2C-B770-964D0AD7D414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "C46D091F-095F-4F1D-8D16-1021E15BC963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "2AE780F5-EF56-45F3-A5E7-805A24C04A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "212A00BA-ED01-45F3-9E9C-9E6B75B82CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "CBFA159F-0293-4E44-BB20-173021991107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "27D49B1C-1140-4CA7-B10A-9B59ACE69208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "1979F66B-749E-41F8-9CBD-E4AD4483B500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "BC5A1967-8D4F-4090-A2BA-5FFCEAA2EFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "50D85F0C-201C-44D3-92C7-261095B4B03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "36B6C5A9-FC13-4AB0-BE8B-9DFA8FDB0C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "342D59C3-B7A8-44AF-8298-743F5487CD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "9A6D1AC1-8480-42C9-90C6-F47E58B7E44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "F31C74BA-085E-482C-A1E8-D6E9A69462B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "5D3E1BC5-7D01-45E9-A92D-7F2D623F1C4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "B15B6E60-9DF9-4524-8387-8CF0B2B6D0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "06AEE3B8-3A71-466D-880F-B39E6E4D9899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "C7E2FFFB-975D-4FFF-A54E-01336B2687BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "4C1FB9D8-1DA7-486C-9418-9C00F4D184D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "F78374E4-E4AF-4E77-9AE6-BEC58DCAB6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "989668B0-0AEB-4E8B-AC51-42058CC6AC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "DC747248-7154-440A-BCD7-2E0F8ACFC042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "F4791DD2-AD34-4239-85CB-D87080D97AA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "F6E1060D-0E32-4330-BB0A-C35D5E11BCE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "FB7DAAA8-6A7B-41EF-8783-7EFDEE747332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "EA101FBC-D697-4A7E-B539-79097228B735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "4CC9EF3C-6768-4976-94C8-3FBEE6093ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "B5934D8A-C10F-47BC-BB73-45B8CB71C686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "59E334B0-6BF6-4674-9D9D-7E9C988BAB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "2BF85206-863D-493C-88F4-15B0BA5276A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "3C9DE996-1DEC-4AF0-89FD-1E3DA3967BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "75FF4D85-97C8-4DF4-ADE6-EDE8EC2DD5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "9CAC6467-19F7-4CB2-A5FC-B57A14F4636C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "60EB56E2-7367-4488-A00D-41464E86B06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "3E315636-0897-4421-882D-E8196F7ACAD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "E3552F71-C708-41A4-9168-5673C086F507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "9505C545-2540-4554-B774-6ECCD64D6115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "06CF15AE-51A6-4FB4-A0DA-6097F0B2BE98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "11A17B44-C69A-424A-A305-0AD61DCDA2A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "8600CCB2-4642-4760-AE10-854446251673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "087A0139-FA4B-4C85-BAAD-1BDCF7B5F91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "2F3B1A89-93A9-43F1-9246-E2081F26DBBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "9A7C64F7-9B85-4C7F-95B9-468200D2EA7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "1EE78F81-5F9D-4B98-BA82-24EE281041C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "298A1371-E23E-4954-8C16-B0F70A575A77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "BA174B71-5D43-4783-8744-1A4020A157C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "ADB451D9-106E-40DA-A499-B1D8DB1B78BC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer y OpUtils versiones anteriores a 29-07-2022 hasta 30-07-2022 ( 125658, 126003, 126105 y 126120) permiten a usuarios autenticados realizar cambios en la base de datos que conllevan a una ejecuci\u00f3n de c\u00f3digo remota"
    }
  ],
  "id": "CVE-2022-37024",
  "lastModified": "2024-11-21T07:14:18.503",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-10T20:16:05.147",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-03-30 17:15
Modified
2024-11-21 07:26
Summary
A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve a malicious XML payload to trigger this vulnerability.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager_plus *
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_msp *
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30BF0F86-635A-4637-A5F9-9FA122845610",
              "versionEndExcluding": "12.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "48C09D5D-BC77-42DC-9A72-00A71F8C1A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "14269E88-7186-4F2C-B770-964D0AD7D414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126002:*:*:*:*:*:*",
              "matchCriteriaId": "31498701-6732-40E4-8F3D-55EE8A77D61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126004:*:*:*:*:*:*",
              "matchCriteriaId": "B740E757-147B-4DEB-89C5-59EB9FFBD6BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126005:*:*:*:*:*:*",
              "matchCriteriaId": "BE1CA16B-558F-426A-B87B-23D47681F1AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "C46D091F-095F-4F1D-8D16-1021E15BC963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "2AE780F5-EF56-45F3-A5E7-805A24C04A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "212A00BA-ED01-45F3-9E9C-9E6B75B82CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "CBFA159F-0293-4E44-BB20-173021991107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126104:*:*:*:*:*:*",
              "matchCriteriaId": "356504E5-BE0A-4F54-8713-AC9EA29D189C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126107:*:*:*:*:*:*",
              "matchCriteriaId": "DBDA89CD-3D30-488F-9EE6-92E84507B95D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126108:*:*:*:*:*:*",
              "matchCriteriaId": "A535E330-A6ED-4E51-A3C0-5A6D04B024C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126109:*:*:*:*:*:*",
              "matchCriteriaId": "A231F874-62DD-4BAC-B115-CD6D61F23873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126110:*:*:*:*:*:*",
              "matchCriteriaId": "2E6C0DE1-8B37-496C-90AF-38C0B189150E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "27D49B1C-1140-4CA7-B10A-9B59ACE69208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "1979F66B-749E-41F8-9CBD-E4AD4483B500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "BC5A1967-8D4F-4090-A2BA-5FFCEAA2EFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "50D85F0C-201C-44D3-92C7-261095B4B03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "36B6C5A9-FC13-4AB0-BE8B-9DFA8FDB0C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126118:*:*:*:*:*:*",
              "matchCriteriaId": "B621572C-448C-43C4-AF8E-EEBCFADF3630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126119:*:*:*:*:*:*",
              "matchCriteriaId": "AAAF3692-3979-494B-831A-D8BFE127A6C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126120:*:*:*:*:*:*",
              "matchCriteriaId": "EE7B18B3-87AD-4960-8FBE-D90BE5FF6776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126121:*:*:*:*:*:*",
              "matchCriteriaId": "79F88190-237F-4D39-B70E-FC0CBCE65DE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126122:*:*:*:*:*:*",
              "matchCriteriaId": "3C6640CC-4BF7-4D7E-A128-0F36CC0DD3DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126130:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D7B9C-AE06-4A1C-8C88-FDAD9AADF73B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126131:*:*:*:*:*:*",
              "matchCriteriaId": "014DEAE0-EB0F-43BB-A922-5ED346E774A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126132:*:*:*:*:*:*",
              "matchCriteriaId": "3D63BDBE-E10F-4E57-8F26-C6D31A6CAB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126134:*:*:*:*:*:*",
              "matchCriteriaId": "614916D2-74A2-45F5-BF8D-E0FD8F0000B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126135:*:*:*:*:*:*",
              "matchCriteriaId": "B0C9C18E-C143-46AF-8126-FB0A71E4E4CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126136:*:*:*:*:*:*",
              "matchCriteriaId": "5B93668B-4988-424B-BB81-6A18355F8624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126139:*:*:*:*:*:*",
              "matchCriteriaId": "56EB1279-627C-43E1-80D7-A09BF047757E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126141:*:*:*:*:*:*",
              "matchCriteriaId": "F06D655C-29AC-4FDB-B22F-148743C469F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126147:*:*:*:*:*:*",
              "matchCriteriaId": "D2790B5B-F0F4-4B3B-8747-34685D988024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126148:*:*:*:*:*:*",
              "matchCriteriaId": "BD572C9F-3B99-4A1D-AC18-AF7163F06FA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126149:*:*:*:*:*:*",
              "matchCriteriaId": "AA0872FB-4491-45BA-9429-BEBDB7AA4B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126150:*:*:*:*:*:*",
              "matchCriteriaId": "1940E42F-0F5D-4262-888F-FD23830E73ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126151:*:*:*:*:*:*",
              "matchCriteriaId": "F3251E9C-8E78-464F-991C-3966B3E2E36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126154:*:*:*:*:*:*",
              "matchCriteriaId": "6428F23E-AFC0-47F8-9059-655D2FF5AF11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126155:*:*:*:*:*:*",
              "matchCriteriaId": "33577344-B3FC-4E14-8C76-C5A542FF5598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126162:*:*:*:*:*:*",
              "matchCriteriaId": "5BECCAD7-9F39-4849-8327-96BA17414418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126163:*:*:*:*:*:*",
              "matchCriteriaId": "3B4472BF-9646-4575-A440-8A11B7C5C090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126164:*:*:*:*:*:*",
              "matchCriteriaId": "89A06D36-31CE-43DD-9E55-EFC78FA1D252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126165:*:*:*:*:*:*",
              "matchCriteriaId": "17154C40-0DBC-405F-B68E-76672F28A700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126166:*:*:*:*:*:*",
              "matchCriteriaId": "FAC1EB6D-CEA0-4B98-B988-448FB844B488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126167:*:*:*:*:*:*",
              "matchCriteriaId": "7ECC8CA3-28B8-48BC-944E-0F9503382C5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126168:*:*:*:*:*:*",
              "matchCriteriaId": "4F2863D4-D448-4843-9B99-1442A0A3C2FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7ACDA3-D9A0-4C03-B42A-5DE2517DCB65",
              "versionEndExcluding": "12.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "FB7DAAA8-6A7B-41EF-8783-7EFDEE747332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126002:*:*:*:*:*:*",
              "matchCriteriaId": "87907DDD-12AF-435A-A005-893FED115AAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "EA101FBC-D697-4A7E-B539-79097228B735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "4CC9EF3C-6768-4976-94C8-3FBEE6093ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126104:*:*:*:*:*:*",
              "matchCriteriaId": "362871E6-BF7C-46D4-8EFE-C87E96C71799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126107:*:*:*:*:*:*",
              "matchCriteriaId": "B352D823-74D2-401A-97A2-8B2A6391545F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "B5934D8A-C10F-47BC-BB73-45B8CB71C686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "59E334B0-6BF6-4674-9D9D-7E9C988BAB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126119:*:*:*:*:*:*",
              "matchCriteriaId": "E866F2AE-FB51-4270-A673-B1299C7CD2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126122:*:*:*:*:*:*",
              "matchCriteriaId": "823014A6-D8F5-430C-A813-373292450006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126139:*:*:*:*:*:*",
              "matchCriteriaId": "E755C6A6-14DA-4AA5-A549-366E4E64F9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126140:*:*:*:*:*:*",
              "matchCriteriaId": "A7009FB6-8594-4115-BD9B-CC50CE186E30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126141:*:*:*:*:*:*",
              "matchCriteriaId": "1F495163-C813-4CE5-95AE-EAA700AD05DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126154:*:*:*:*:*:*",
              "matchCriteriaId": "4136C288-60F2-455B-8A6B-C602294AFADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126155:*:*:*:*:*:*",
              "matchCriteriaId": "6037DF2D-1B68-45B6-A72C-C0AE37E2F29A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126264:*:*:*:*:*:*",
              "matchCriteriaId": "AAE8929C-4D00-4DCB-8605-82B86AC9CBDD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74946AD-F68D-474A-8634-DB6CEF999302",
              "versionEndExcluding": "12.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "B15B6E60-9DF9-4524-8387-8CF0B2B6D0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126002:*:*:*:*:*:*",
              "matchCriteriaId": "DEB00990-C73C-4B46-B87D-80E3B5B39302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "06AEE3B8-3A71-466D-880F-B39E6E4D9899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "C7E2FFFB-975D-4FFF-A54E-01336B2687BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126104:*:*:*:*:*:*",
              "matchCriteriaId": "34A43740-26B4-4D73-BC53-7D14529BA78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126107:*:*:*:*:*:*",
              "matchCriteriaId": "037A9312-321F-4A22-B17E-83B6A2BA9BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "4C1FB9D8-1DA7-486C-9418-9C00F4D184D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "F78374E4-E4AF-4E77-9AE6-BEC58DCAB6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126119:*:*:*:*:*:*",
              "matchCriteriaId": "8912068D-3412-47E5-A790-0CDB29E05F20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126122:*:*:*:*:*:*",
              "matchCriteriaId": "39C96D52-9AD6-42B8-AE99-3F6C1D520DF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126139:*:*:*:*:*:*",
              "matchCriteriaId": "BED90D90-615E-4E7B-9C02-CBE942589BF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126140:*:*:*:*:*:*",
              "matchCriteriaId": "30957BC1-C180-405E-A4D4-818F67819C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126141:*:*:*:*:*:*",
              "matchCriteriaId": "DD11A46A-8C7C-4AC0-B353-34C149AF4951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126154:*:*:*:*:*:*",
              "matchCriteriaId": "B598B209-B85F-4968-8C49-B52B9D1D2BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126155:*:*:*:*:*:*",
              "matchCriteriaId": "6AB5E114-0705-41D3-8C40-D0F583180E5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126264:*:*:*:*:*:*",
              "matchCriteriaId": "840B07B8-E0BE-4D34-B511-B7C593AFDDD5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve \r\na malicious XML payload to trigger this vulnerability."
    }
  ],
  "id": "CVE-2022-43473",
  "lastModified": "2024-11-21T07:26:33.497",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 3.7,
        "source": "talos-cna@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-03-30T17:15:06.750",
  "references": [
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1685"
    }
  ],
  "sourceIdentifier": "talos-cna@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-611"
        }
      ],
      "source": "talos-cna@cisco.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-02-08 17:15
Modified
2024-11-21 02:18
Summary
The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet.
References
cve@mitre.orghttp://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.htmlExploit, Third Party Advisory, VDB Entry
cve@mitre.orghttp://seclists.org/fulldisclosure/2015/Jan/114Exploit
cve@mitre.orghttp://www.securityfocus.com/archive/1/archive/1/534575/100/0/threadedBroken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/100554Third Party Advisory, VDB Entry
cve@mitre.orghttps://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txtBroken Link
cve@mitre.orghttps://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservletExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2015/Jan/114Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threadedBroken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/100554Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txtBroken Link
af854a3a-2127-422b-91ae-364da2661108https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservletExploit, Vendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26B406C4-8301-4D81-B59E-D35965300845",
              "versionEndIncluding": "11.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1A4045-C496-430F-91AA-142165AC14F9",
              "versionEndIncluding": "10.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A06A75D-BDDF-4D26-AA17-325C2C64859B",
              "versionEndIncluding": "11.5",
              "versionStartIncluding": "8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet."
    },
    {
      "lang": "es",
      "value": "El servlet FailOverHelperServlet (tambi\u00e9n se conoce como FailServlet) en ZOHO ManageEngine Applications Manager versiones anteriores a 11.9 build 11912, OpManager versiones 8 hasta 11.5 build 11400 e IT360 versiones 10.5 y anteriores, no restringe el acceso apropiadamente, lo que permite a atacantes remotos y a usuarios autenticados remotos (1) leer archivos arbitrarios por medio del par\u00e1metro fileName en una operaci\u00f3n copyfile u (2) obtener informaci\u00f3n confidencial por medio de un listado de directorio en una operaci\u00f3n listdirectory en servlet/FailOverHelperServlet."
    }
  ],
  "id": "CVE-2014-7863",
  "lastModified": "2024-11-21T02:18:09.847",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-08T17:15:10.980",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2015/Jan/114"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2015/Jan/114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-10-15 21:15
Modified
2024-11-21 04:32
Severity ?
Summary
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC6C8B88-B295-48DB-859A-7AF8E9027F62",
              "versionEndExcluding": "12.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "B666DF1F-0EF8-41F0-9EA0-EB104F87405F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124000:*:*:*:*:*:*",
              "matchCriteriaId": "5B7042C9-FD7C-4A83-A755-1429D3CEF91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124011:*:*:*:*:*:*",
              "matchCriteriaId": "86F61865-FB7B-4F12-B8EF-81A1DFB5E7E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124012:*:*:*:*:*:*",
              "matchCriteriaId": "5D81E915-18CC-4419-879D-A2D90472F526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124013:*:*:*:*:*:*",
              "matchCriteriaId": "4B9314BA-7CA4-46C2-9ADD-AA15101081FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124014:*:*:*:*:*:*",
              "matchCriteriaId": "4A94FB0E-7487-4E18-A7AD-19E47B03BF1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124015:*:*:*:*:*:*",
              "matchCriteriaId": "D99A8A01-8EDC-4AE6-8ED9-C7AF12DEDA62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124016:*:*:*:*:*:*",
              "matchCriteriaId": "44A9BF34-7B3B-4B5F-AEFD-AA7434C6A682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124022:*:*:*:*:*:*",
              "matchCriteriaId": "33068139-B994-4145-B73A-2344A699A0A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124023:*:*:*:*:*:*",
              "matchCriteriaId": "B798718E-3E01-4F3D-AD43-9BA7939E2EE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124024:*:*:*:*:*:*",
              "matchCriteriaId": "E0C42019-0D5A-4938-87AB-F787C55E9834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124025:*:*:*:*:*:*",
              "matchCriteriaId": "373AA6C3-DA45-4CCD-88EF-859858732FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124026:*:*:*:*:*:*",
              "matchCriteriaId": "13E24695-F223-4F62-B344-4CCB0BBE1050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124027:*:*:*:*:*:*",
              "matchCriteriaId": "C8EDB65B-34E1-4F89-B2E0-CEE13F39DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124030:*:*:*:*:*:*",
              "matchCriteriaId": "B8F7F90C-57BB-4E2F-BD79-1F56375A4E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124033:*:*:*:*:*:*",
              "matchCriteriaId": "A1343F39-5FAA-4EB7-B95A-5D5133AD5717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124037:*:*:*:*:*:*",
              "matchCriteriaId": "C23F2AB2-714D-4548-B9F9-315CE31CF573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124039:*:*:*:*:*:*",
              "matchCriteriaId": "AC8CDE36-EC3C-4F61-872C-8DD33688E0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124040:*:*:*:*:*:*",
              "matchCriteriaId": "D790A131-CA15-42A1-8F35-3DCF27D51060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124041:*:*:*:*:*:*",
              "matchCriteriaId": "C91F973F-3910-41E6-9D2F-3506E8EF5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124042:*:*:*:*:*:*",
              "matchCriteriaId": "471FFC26-5DE7-42C6-B30B-EF5D1E1A35C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124043:*:*:*:*:*:*",
              "matchCriteriaId": "C5407B79-C1DF-481E-83A3-BCE36BEE29E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124051:*:*:*:*:*:*",
              "matchCriteriaId": "F09EF7FD-47EB-4989-8805-74EC075F91AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124053:*:*:*:*:*:*",
              "matchCriteriaId": "F91FCCC4-C8C0-49B2-86C7-B2896D72F019",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124054:*:*:*:*:*:*",
              "matchCriteriaId": "F7679A19-1874-4E97-87A5-60903A549A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124056:*:*:*:*:*:*",
              "matchCriteriaId": "D3B991A7-452F-46C6-AB37-78137A7B27CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124058:*:*:*:*:*:*",
              "matchCriteriaId": "66A7CEE9-8647-462A-8F50-9159132E01FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124065:*:*:*:*:*:*",
              "matchCriteriaId": "28D368E2-FBB1-4DC2-BDBF-7A4F994A14F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124066:*:*:*:*:*:*",
              "matchCriteriaId": "A9F3220A-D461-4412-9F73-B74EB299DBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124067:*:*:*:*:*:*",
              "matchCriteriaId": "7442E3D2-83CC-4F75-89E3-64BAE5937722",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124069:*:*:*:*:*:*",
              "matchCriteriaId": "07B87F17-6AF0-4545-9527-154E0C6483C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124070:*:*:*:*:*:*",
              "matchCriteriaId": "B565B110-9A53-4BA1-BAB9-C6C16DEECD2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124071:*:*:*:*:*:*",
              "matchCriteriaId": "AA46F3B7-0650-4630-9005-1FAC1EC22EE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124074:*:*:*:*:*:*",
              "matchCriteriaId": "8706C9CD-0D79-4661-B0C5-AB1813DE1F0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124075:*:*:*:*:*:*",
              "matchCriteriaId": "2BACB527-2F9E-4C6B-8C7B-696EAD5251FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124081:*:*:*:*:*:*",
              "matchCriteriaId": "CC9D8F85-EFB8-4D0E-BD8F-6DBE239559F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124082:*:*:*:*:*:*",
              "matchCriteriaId": "0297A0EA-43F2-4AD0-BC73-E6014F1F74BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124085:*:*:*:*:*:*",
              "matchCriteriaId": "CA5F1F18-247B-4081-8B53-E34B1512D47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124086:*:*:*:*:*:*",
              "matchCriteriaId": "2B8F85FF-78A7-4BF4-83C2-FC3ABFBC8715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124087:*:*:*:*:*:*",
              "matchCriteriaId": "1C1A1836-D054-4B96-890E-E837050D6202",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en Zoho ManageEngine OpManager versiones anteriores a 12.4 build 124089. El servlet OPMDeviceDetailsServlet es propenso a la inyecci\u00f3n SQL. Dependiendo de la configuraci\u00f3n, esta vulnerabilidad podr\u00eda ser explotada no autenticado o autenticado."
    }
  ],
  "id": "CVE-2019-17602",
  "lastModified": "2024-11-21T04:32:37.210",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-10-15T21:15:11.127",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-09-30 19:15
Modified
2024-11-21 06:25
Severity ?
Summary
Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF536B6C-4394-4CF7-813D-BE9E9DF84DBA",
              "versionEndIncluding": "12.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
              "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
              "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
              "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
              "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
              "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
              "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
              "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*",
              "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*",
              "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*",
              "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*",
              "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*",
              "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*",
              "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*",
              "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*",
              "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*",
              "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*",
              "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*",
              "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*",
              "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*",
              "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*",
              "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*",
              "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*",
              "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*",
              "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*",
              "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*",
              "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*",
              "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*",
              "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*",
              "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*",
              "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*",
              "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*",
              "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*",
              "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*",
              "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*",
              "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*",
              "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*",
              "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*",
              "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*",
              "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*",
              "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*",
              "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*",
              "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*",
              "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*",
              "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*",
              "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*",
              "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager versi\u00f3n 125466 y por debajo, es vulnerable a una inyecci\u00f3n SQL en la API getReportData"
    }
  ],
  "id": "CVE-2021-41288",
  "lastModified": "2024-11-21T06:25:58.207",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-30T19:15:07.430",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-05-23 18:29
Modified
2024-11-21 03:08
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF7ED07-3132-4670-831B-CCD6F34E5C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application."
    },
    {
      "lang": "es",
      "value": "Fue encontrado un problema en ZOHO ManageEngine OpManager 12.2. Al agregar un Google Map a la aplicaci\u00f3n, un usuario autenticado puede cargar un archivo HTML. Este archivo HTML se procesa en varias ubicaciones de la aplicaci\u00f3n. JavaScript dentro del HTML cargado tambi\u00e9n es interpretado por la aplicaci\u00f3n. Por lo tanto, un atacante puede inyectar una carga maliciosa de JavaScript dentro del archivo HTML y cargarlo a la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2017-11560",
  "lastModified": "2024-11-21T03:08:01.283",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-23T18:29:00.637",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://manageengine.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "http://opmanager.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://manageengine.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "http://opmanager.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-12-17 08:29
Modified
2024-11-21 04:01
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
              "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
              "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
              "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
              "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
              "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
              "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
              "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
              "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
              "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
              "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
              "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
              "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
              "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
              "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
              "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
              "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
              "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
              "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
              "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
              "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
              "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
              "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
              "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
              "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
              "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
              "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
              "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
              "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
              "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
              "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
              "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
              "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
              "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
              "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
              "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
              "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
              "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
              "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
              "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
              "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
              "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
              "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
              "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
              "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
              "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
              "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
              "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
              "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
              "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
              "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
              "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
              "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
              "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
              "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
              "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
              "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
              "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
              "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
              "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
              "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
              "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
              "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
              "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
              "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
              "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
              "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
              "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
              "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
              "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
              "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
              "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
              "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
              "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
              "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
              "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
              "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
              "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*",
              "matchCriteriaId": "F3F7F501-1F21-4825-BD82-23ACA713FFD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*",
              "matchCriteriaId": "422417EA-FF20-428A-AC02-18D4F84DA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*",
              "matchCriteriaId": "59BCAF6B-CAC3-4142-B303-7B85B24C573C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*",
              "matchCriteriaId": "136E1AE8-723C-4A85-AC7A-A5FA557BE66F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*",
              "matchCriteriaId": "19BE3780-3FAB-46C9-9399-62C18EA1A322",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*",
              "matchCriteriaId": "D32CDFC3-8041-426B-BBE0-245703D4D74E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*",
              "matchCriteriaId": "6B95BC46-7679-415E-814B-29DA657A718E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager en versiones 12.3 anteriores a la 123238 permite una inyecci\u00f3n SQL mediante la API getGraphData."
    }
  ],
  "id": "CVE-2018-20173",
  "lastModified": "2024-11-21T04:01:00.650",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-12-17T08:29:01.213",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-10-23 21:30
Modified
2024-11-21 03:55
Severity ?
Summary
Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
              "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
              "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
              "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
              "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
              "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
              "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
              "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
              "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
              "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
              "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
              "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
              "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
              "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
              "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
              "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
              "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
              "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
              "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
              "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
              "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
              "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
              "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
              "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
              "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
              "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
              "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
              "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
              "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
              "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
              "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
              "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
              "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
              "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
              "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
              "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
              "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
              "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
              "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
              "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
              "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
              "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
              "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
              "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
              "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
              "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
              "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
              "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
              "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
              "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
              "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
              "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
              "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
              "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
              "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
              "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
              "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
              "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
              "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
              "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
              "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
              "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
              "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
              "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
              "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
              "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
              "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
              "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
              "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
              "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
              "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
              "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
              "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
              "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
              "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
              "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
              "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
              "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
              "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
              "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
              "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
              "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
              "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
              "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
              "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
              "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
              "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
              "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
              "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
              "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
              "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
              "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
              "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
              "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
              "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
              "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
              "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
              "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
              "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
              "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
              "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
              "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
              "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
              "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
              "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
              "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
              "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
              "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
              "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
              "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
              "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
              "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
              "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
              "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
              "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
              "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
              "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
              "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
              "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
              "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
              "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
              "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
              "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
              "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
              "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
              "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
              "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
              "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
              "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
              "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
              "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
              "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
              "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
              "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
              "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
              "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
              "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
              "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
              "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager en versiones anteriores a la 12.3 build 123214 permite la subida de archivos arbitrarios sin restricci\u00f3n."
    }
  ],
  "id": "CVE-2018-18475",
  "lastModified": "2024-11-21T03:55:59.970",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-10-23T21:30:54.347",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Oct/42"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Oct/42"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-434"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-06 04:29
Modified
2024-11-21 03:56
Summary
An XML External Entity injection (XXE) vulnerability exists in Zoho ManageEngine Network Configuration Manager and OpManager before 12.3.214 via the RequestXML parameter in a /devices/ProcessRequest.do GET request. For example, the attacker can trigger the transmission of local files to an arbitrary remote FTP server.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDAFA1E5-424D-48E1-B782-B3856F50B5E7",
              "versionEndExcluding": "12.3.214",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE88E18-E01A-4FEF-B500-C68463E2BEAE",
              "versionEndExcluding": "12.3.214",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An XML External Entity injection (XXE) vulnerability exists in Zoho ManageEngine Network Configuration Manager and OpManager before 12.3.214 via the RequestXML parameter in a /devices/ProcessRequest.do GET request. For example, the attacker can trigger the transmission of local files to an arbitrary remote FTP server."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad XEE (XML External Entity) en Zoho ManageEngine Network Configuration Manager y OpManager en versiones anteriores a la 12.3.214 mediante el par\u00e1metro RequestXML en una petici\u00f3n GET en /devices/ProcessRequest.do. Por ejemplo, el atacante puede desencadenar la transmisi\u00f3n de archivos locales a un servidor FTP remoto arbitrario."
    }
  ],
  "id": "CVE-2018-18980",
  "lastModified": "2024-11-21T03:56:58.647",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-06T04:29:00.347",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/x-f1v3/ForCve/issues/5"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/x-f1v3/ForCve/issues/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-611"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-15 06:29
Modified
2024-11-21 03:57
Summary
Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 11.4
zohocorp manageengine_opmanager 11.5
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
              "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
              "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
              "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
              "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
              "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
              "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
              "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
              "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
              "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
              "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
              "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
              "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
              "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
              "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
              "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
              "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
              "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
              "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
              "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
              "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
              "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
              "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
              "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
              "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
              "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
              "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
              "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
              "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
              "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
              "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
              "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
              "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
              "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
              "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
              "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
              "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
              "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
              "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
              "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
              "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
              "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
              "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
              "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
              "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
              "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
              "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
              "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
              "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
              "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
              "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
              "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
              "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
              "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
              "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
              "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
              "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
              "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
              "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
              "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
              "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
              "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
              "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
              "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
              "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
              "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
              "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
              "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
              "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
              "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
              "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
              "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
              "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
              "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
              "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
              "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
              "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
              "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
              "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
              "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
              "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
              "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
              "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
              "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
              "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
              "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
              "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
              "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
              "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
              "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
              "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
              "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
              "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
              "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
              "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
              "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
              "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
              "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
              "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
              "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
              "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
              "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
              "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
              "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
              "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
              "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
              "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
              "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
              "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
              "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
              "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
              "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
              "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
              "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
              "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
              "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
              "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
              "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
              "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
              "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
              "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
              "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
              "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
              "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
              "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
              "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
              "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
              "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
              "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
              "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
              "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
              "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
              "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
              "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
              "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
              "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
              "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
              "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
              "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
              "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*",
              "matchCriteriaId": "CBF58EC7-2DDA-4EC0-8406-F3B711B62974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*",
              "matchCriteriaId": "CD036146-E374-4571-9302-9978CD892805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*",
              "matchCriteriaId": "7112E33A-C694-432D-8880-BB2211EBA5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*",
              "matchCriteriaId": "932A2D27-CC0E-4F33-AD0C-4876984F1F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123219:*:*:*:*:*:*",
              "matchCriteriaId": "2C55FF31-14E0-4D66-9F33-CF907B684C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123220:*:*:*:*:*:*",
              "matchCriteriaId": "4F8BD66B-6AB2-46C9-8133-6677ACBEDC10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123221:*:*:*:*:*:*",
              "matchCriteriaId": "54DA156C-85E1-4A2D-9612-02C05180AB06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager 12.3 antes de la build 123223 tiene Cross-Site Scripting (XSS) mediante la API updateWidget."
    }
  ],
  "id": "CVE-2018-19288",
  "lastModified": "2024-11-21T03:57:41.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-15T06:29:00.357",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105960"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105960"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-12-10 18:59
Modified
2024-11-21 02:18
Severity ?
Summary
Multiple directory traversal vulnerabilities in ZOHO ManageEngine OpManager 8 (build 88xx) through 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to write and execute arbitrary files via a .. (dot dot) in the (1) fileName parameter to the MigrateLEEData servlet or (2) zipFileName parameter in a downloadFileFromProbe operation to the MigrateCentralData servlet.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B68292A0-79E4-4CEE-844E-05342994E534",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9176D056-7350-4371-8F7E-87C2521EEBF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C71A803-6D67-4D8F-8072-73C10532BB30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35DA35B-6836-41FD-9B1D-E76809D19304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48CA686-28DF-4CE5-A950-1C62D162D987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "504C45FC-1A8C-4C6A-AA55-4B2C21DF5BEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E6403B7-8C3D-40D1-A32B-3A50B2A6D005",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAD3BAD6-58BE-4099-994C-9DBFA2210D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E30D446-E54B-414B-BEB0-E7C2AD6DC092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "900914C7-4A60-45D2-90E1-3488998C77B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE71B7E-88F9-45B3-911C-472B5438D062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEC9C04-2DA1-4307-8828-9E91352FB055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD4D0DE-2B11-48AA-A60B-ED6B6DB94020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7D1014-51CF-4A24-9935-BD385E1EE57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple directory traversal vulnerabilities in ZOHO ManageEngine OpManager 8 (build 88xx) through 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to write and execute arbitrary files via a .. (dot dot) in the (1) fileName parameter to the MigrateLEEData servlet or (2) zipFileName parameter in a downloadFileFromProbe operation to the MigrateCentralData servlet."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de salto de directorio en ZOHO ManageEngine OpManager 8 (build 88xx) hasta 11.4, IT360 10.3 y 10.4, y Social IT Plus 11.0 permiten a atacantes remotos o usuarios remotos autenticados escribir y ejecutar ficheros arbitrarios a trav\u00e9s de un .. (punto punto) en (1) el par\u00e1metro fileName en el servlet MigrateLEEData o (2) el par\u00e1metro zipFileName en una operaci\u00f3n downloadFileFromProbe en el servlet MigrateCentralData."
    }
  ],
  "id": "CVE-2014-7866",
  "lastModified": "2024-11-21T02:18:10.173",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-10T18:59:00.077",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Nov/21"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Nov/21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-04 02:15
Modified
2025-01-29 20:15
Summary
Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30BF0F86-635A-4637-A5F9-9FA122845610",
              "versionEndExcluding": "12.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "48C09D5D-BC77-42DC-9A72-00A71F8C1A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "14269E88-7186-4F2C-B770-964D0AD7D414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126002:*:*:*:*:*:*",
              "matchCriteriaId": "31498701-6732-40E4-8F3D-55EE8A77D61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126004:*:*:*:*:*:*",
              "matchCriteriaId": "B740E757-147B-4DEB-89C5-59EB9FFBD6BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126005:*:*:*:*:*:*",
              "matchCriteriaId": "BE1CA16B-558F-426A-B87B-23D47681F1AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "C46D091F-095F-4F1D-8D16-1021E15BC963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "2AE780F5-EF56-45F3-A5E7-805A24C04A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "212A00BA-ED01-45F3-9E9C-9E6B75B82CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "CBFA159F-0293-4E44-BB20-173021991107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126104:*:*:*:*:*:*",
              "matchCriteriaId": "356504E5-BE0A-4F54-8713-AC9EA29D189C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126107:*:*:*:*:*:*",
              "matchCriteriaId": "DBDA89CD-3D30-488F-9EE6-92E84507B95D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126108:*:*:*:*:*:*",
              "matchCriteriaId": "A535E330-A6ED-4E51-A3C0-5A6D04B024C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126109:*:*:*:*:*:*",
              "matchCriteriaId": "A231F874-62DD-4BAC-B115-CD6D61F23873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126110:*:*:*:*:*:*",
              "matchCriteriaId": "2E6C0DE1-8B37-496C-90AF-38C0B189150E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "27D49B1C-1140-4CA7-B10A-9B59ACE69208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "1979F66B-749E-41F8-9CBD-E4AD4483B500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "BC5A1967-8D4F-4090-A2BA-5FFCEAA2EFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "50D85F0C-201C-44D3-92C7-261095B4B03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "36B6C5A9-FC13-4AB0-BE8B-9DFA8FDB0C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126118:*:*:*:*:*:*",
              "matchCriteriaId": "B621572C-448C-43C4-AF8E-EEBCFADF3630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126119:*:*:*:*:*:*",
              "matchCriteriaId": "AAAF3692-3979-494B-831A-D8BFE127A6C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126120:*:*:*:*:*:*",
              "matchCriteriaId": "EE7B18B3-87AD-4960-8FBE-D90BE5FF6776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126121:*:*:*:*:*:*",
              "matchCriteriaId": "79F88190-237F-4D39-B70E-FC0CBCE65DE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126122:*:*:*:*:*:*",
              "matchCriteriaId": "3C6640CC-4BF7-4D7E-A128-0F36CC0DD3DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126130:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D7B9C-AE06-4A1C-8C88-FDAD9AADF73B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126131:*:*:*:*:*:*",
              "matchCriteriaId": "014DEAE0-EB0F-43BB-A922-5ED346E774A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126132:*:*:*:*:*:*",
              "matchCriteriaId": "3D63BDBE-E10F-4E57-8F26-C6D31A6CAB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126134:*:*:*:*:*:*",
              "matchCriteriaId": "614916D2-74A2-45F5-BF8D-E0FD8F0000B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126135:*:*:*:*:*:*",
              "matchCriteriaId": "B0C9C18E-C143-46AF-8126-FB0A71E4E4CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126136:*:*:*:*:*:*",
              "matchCriteriaId": "5B93668B-4988-424B-BB81-6A18355F8624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126139:*:*:*:*:*:*",
              "matchCriteriaId": "56EB1279-627C-43E1-80D7-A09BF047757E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126141:*:*:*:*:*:*",
              "matchCriteriaId": "F06D655C-29AC-4FDB-B22F-148743C469F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126147:*:*:*:*:*:*",
              "matchCriteriaId": "D2790B5B-F0F4-4B3B-8747-34685D988024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126148:*:*:*:*:*:*",
              "matchCriteriaId": "BD572C9F-3B99-4A1D-AC18-AF7163F06FA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126149:*:*:*:*:*:*",
              "matchCriteriaId": "AA0872FB-4491-45BA-9429-BEBDB7AA4B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126150:*:*:*:*:*:*",
              "matchCriteriaId": "1940E42F-0F5D-4262-888F-FD23830E73ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126151:*:*:*:*:*:*",
              "matchCriteriaId": "F3251E9C-8E78-464F-991C-3966B3E2E36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126154:*:*:*:*:*:*",
              "matchCriteriaId": "6428F23E-AFC0-47F8-9059-655D2FF5AF11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126155:*:*:*:*:*:*",
              "matchCriteriaId": "33577344-B3FC-4E14-8C76-C5A542FF5598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126162:*:*:*:*:*:*",
              "matchCriteriaId": "5BECCAD7-9F39-4849-8327-96BA17414418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126163:*:*:*:*:*:*",
              "matchCriteriaId": "3B4472BF-9646-4575-A440-8A11B7C5C090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126164:*:*:*:*:*:*",
              "matchCriteriaId": "89A06D36-31CE-43DD-9E55-EFC78FA1D252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126165:*:*:*:*:*:*",
              "matchCriteriaId": "17154C40-0DBC-405F-B68E-76672F28A700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126166:*:*:*:*:*:*",
              "matchCriteriaId": "FAC1EB6D-CEA0-4B98-B988-448FB844B488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126167:*:*:*:*:*:*",
              "matchCriteriaId": "7ECC8CA3-28B8-48BC-944E-0F9503382C5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126168:*:*:*:*:*:*",
              "matchCriteriaId": "4F2863D4-D448-4843-9B99-1442A0A3C2FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126169:*:*:*:*:*:*",
              "matchCriteriaId": "5006325E-308B-4E08-95F5-15B9412A2BF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126262:*:*:*:*:*:*",
              "matchCriteriaId": "99CA6453-8D99-41A8-AF04-6FB2FCA0A4AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126264:*:*:*:*:*:*",
              "matchCriteriaId": "435229C9-FC8B-4C93-ABFE-C98518B60FB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126275:*:*:*:*:*:*",
              "matchCriteriaId": "1DD61A2F-88D7-45A0-9319-47192344EA36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126276:*:*:*:*:*:*",
              "matchCriteriaId": "DC4B331D-1FCA-4BD2-A630-6FBCC48B3599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126277:*:*:*:*:*:*",
              "matchCriteriaId": "28B7BD39-A958-4C25-BECB-BEB94A83F553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126278:*:*:*:*:*:*",
              "matchCriteriaId": "DE818DF8-FA7E-4B61-85A1-6D06CF1C2382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126279:*:*:*:*:*:*",
              "matchCriteriaId": "FF4B34EF-B68F-4EAB-8CB3-90E83AA1CAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126280:*:*:*:*:*:*",
              "matchCriteriaId": "CA19FF74-8725-4144-8AC9-07C770CE1ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126283:*:*:*:*:*:*",
              "matchCriteriaId": "C22463C3-B9BA-4A21-BB66-23903AFDB56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126284:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9EA3A-5FC5-43E6-8B29-2B62549617D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126285:*:*:*:*:*:*",
              "matchCriteriaId": "2D5A86EC-53FD-4F85-BAB8-3F89880AD59E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126290:*:*:*:*:*:*",
              "matchCriteriaId": "0420517B-9660-458B-83A6-F08889A07F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126293:*:*:*:*:*:*",
              "matchCriteriaId": "93E003DB-D44B-4278-931D-A0321DABE732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126294:*:*:*:*:*:*",
              "matchCriteriaId": "6051DD96-3EB1-4C54-94B4-7D6D19DDFC21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126295:*:*:*:*:*:*",
              "matchCriteriaId": "F08902C5-6C2F-4791-BBB7-57BE3C6704B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126306:*:*:*:*:*:*",
              "matchCriteriaId": "DED80530-0627-487E-96C5-A6BE3EDFB925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126308:*:*:*:*:*:*",
              "matchCriteriaId": "1E6CB40F-CA89-4C99-8E14-0209F5F889EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126310:*:*:*:*:*:*",
              "matchCriteriaId": "7FDF215D-73B3-41E9-86FB-01B3A6EA1AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126311:*:*:*:*:*:*",
              "matchCriteriaId": "DEB0DC3F-E57F-4E69-AA89-B8502C010404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126322:*:*:*:*:*:*",
              "matchCriteriaId": "1D34DF7D-F85F-4209-92ED-9E165E9C37F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126323:*:*:*:*:*:*",
              "matchCriteriaId": "3FBF6438-3A78-4527-9CE2-BAB5F91FF3FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers."
    }
  ],
  "id": "CVE-2023-31099",
  "lastModified": "2025-01-29T20:15:33.377",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-05-04T02:15:19.437",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://manageengine.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://manageengine.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-03 16:15
Modified
2024-11-21 05:23
Severity ?
Summary
Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager Stable build anterior a 125203 (y compilaci\u00f3n Publicada anterior a 125233) permite una ejecuci\u00f3n de c\u00f3digo remota por medio del servlet Smart Update Manager (SUM)"
    }
  ],
  "id": "CVE-2020-28653",
  "lastModified": "2024-11-21T05:23:06.663",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-03T16:15:13.557",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-05 09:29
Modified
2024-11-21 03:56
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 11.4
zohocorp manageengine_opmanager 11.5
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
              "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
              "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
              "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
              "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
              "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
              "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
              "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
              "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
              "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
              "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
              "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
              "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
              "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
              "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
              "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
              "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
              "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
              "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
              "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
              "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
              "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
              "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
              "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
              "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
              "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
              "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
              "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
              "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
              "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
              "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
              "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
              "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
              "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
              "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
              "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
              "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
              "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
              "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
              "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
              "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
              "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
              "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
              "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
              "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
              "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
              "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
              "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
              "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
              "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
              "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
              "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
              "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
              "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
              "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
              "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
              "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
              "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
              "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
              "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
              "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
              "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
              "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
              "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
              "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
              "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
              "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
              "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
              "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
              "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
              "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
              "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
              "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
              "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
              "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
              "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
              "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
              "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
              "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
              "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
              "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
              "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
              "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
              "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
              "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
              "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
              "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
              "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
              "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
              "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
              "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
              "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
              "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
              "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
              "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
              "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
              "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
              "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
              "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
              "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
              "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
              "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
              "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
              "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
              "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
              "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
              "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
              "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
              "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
              "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
              "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
              "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
              "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
              "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
              "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
              "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
              "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
              "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
              "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
              "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
              "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
              "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
              "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
              "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
              "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
              "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
              "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
              "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
              "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
              "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
              "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
              "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
              "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
              "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
              "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
              "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
              "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
              "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
              "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
              "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*",
              "matchCriteriaId": "CBF58EC7-2DDA-4EC0-8406-F3B711B62974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*",
              "matchCriteriaId": "CD036146-E374-4571-9302-9978CD892805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*",
              "matchCriteriaId": "7112E33A-C694-432D-8880-BB2211EBA5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*",
              "matchCriteriaId": "932A2D27-CC0E-4F33-AD0C-4876984F1F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123219:*:*:*:*:*:*",
              "matchCriteriaId": "2C55FF31-14E0-4D66-9F33-CF907B684C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123220:*:*:*:*:*:*",
              "matchCriteriaId": "4F8BD66B-6AB2-46C9-8133-6677ACBEDC10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123221:*:*:*:*:*:*",
              "matchCriteriaId": "54DA156C-85E1-4A2D-9612-02C05180AB06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings."
    },
    {
      "lang": "es",
      "value": "KindEditor hasta la versi\u00f3n 4.1.11 tiene una vulnerabilidad de salto de directorio en php/upload_json.php. Cualquiera puede buscar un archivo o directorio en la carpeta kindeditor/attached/ mediante el par\u00e1metro path sin autenticaci\u00f3n."
    }
  ],
  "id": "CVE-2018-18949",
  "lastModified": "2024-11-21T03:56:55.797",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-05T09:29:00.667",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-12-04 17:59
Modified
2024-11-21 02:13
Severity ?
Summary
Directory traversal vulnerability in the multipartRequest servlet in ZOHO ManageEngine OpManager 11.3 and earlier, Social IT Plus 11.0, and IT360 10.3, 10.4, and earlier allows remote attackers or remote authenticated users to delete arbitrary files via a .. (dot dot) in the fileName parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66913D18-7CFF-4375-9FAB-3DB0D8802CB4",
              "versionEndIncluding": "11.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA5A84F-8B14-4BC4-8CBD-37178AE42DB8",
              "versionEndIncluding": "10.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9176D056-7350-4371-8F7E-87C2521EEBF2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B68292A0-79E4-4CEE-844E-05342994E534",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in the multipartRequest servlet in ZOHO ManageEngine OpManager 11.3 and earlier, Social IT Plus 11.0, and IT360 10.3, 10.4, and earlier allows remote attackers or remote authenticated users to delete arbitrary files via a .. (dot dot) in the fileName parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en el servlet multipartRequest en ZOHO ManageEngine OpManager 11.3 y anteriores, Social IT Plus 11.0, y IT360 10.3, 10.4, anteriores permite a atacantes remotos o usuarios remotos autenticados eliminar ficheros arbitrarios a trav\u00e9s de un .. (punto punto) en el par\u00e1metro fileName."
    }
  ],
  "id": "CVE-2014-6036",
  "lastModified": "2024-11-21T02:13:38.467",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-04T17:59:04.673",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-05-23 16:29
Modified
2024-11-21 03:08
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the "Group Chat" or "Alarm" section. This functionality can be abused by a malicious user by uploading a web shell.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF7ED07-3132-4670-831B-CCD6F34E5C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the \"Group Chat\" or \"Alarm\" section. This functionality can be abused by a malicious user by uploading a web shell."
    },
    {
      "lang": "es",
      "value": "Fue encontrado un problema en ZOHO ManageEngine OpManager versi\u00f3n 12.2. Un usuario autenticado puede cargar cualquier archivo que desee compartir en la secci\u00f3n \"Group Chat\" or \"Alarm\". Un usuario malicioso puede abusar de esta funcionalidad cargando un Web Shell ."
    }
  ],
  "id": "CVE-2017-11561",
  "lastModified": "2024-11-21T03:08:01.430",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-23T16:29:08.073",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://manageengine.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "http://opmanager.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://manageengine.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "http://opmanager.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-434"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-04-20 21:15
Modified
2024-11-21 04:58
Summary
Zoho ManageEngine OpManager before 125120 allows an unauthenticated user to retrieve an API key via a servlet call.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager before 125120 allows an unauthenticated user to retrieve an API key via a servlet call."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager versiones anteriores a la versi\u00f3n  125120, permite a un usuario no autenticado recuperar una clave de la API por medio de una llamada del servlet."
    }
  ],
  "id": "CVE-2020-11946",
  "lastModified": "2024-11-21T04:58:57.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-04-20T21:15:13.367",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cwe.mitre.org/data/definitions/306.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cwe.mitre.org/data/definitions/306.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-10-13 23:15
Modified
2024-11-21 06:25
Severity ?
Summary
The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
              "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
              "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
              "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
              "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
              "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
              "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
              "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*",
              "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*",
              "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*",
              "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*",
              "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*",
              "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*",
              "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*",
              "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*",
              "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*",
              "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*",
              "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*",
              "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*",
              "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*",
              "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*",
              "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*",
              "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*",
              "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*",
              "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*",
              "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*",
              "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*",
              "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*",
              "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*",
              "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*",
              "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*",
              "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*",
              "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*",
              "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*",
              "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*",
              "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*",
              "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*",
              "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*",
              "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*",
              "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*",
              "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*",
              "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*",
              "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*",
              "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*",
              "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*",
              "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API."
    },
    {
      "lang": "es",
      "value": "El analizador de NetFlow en Zoho ManageEngine OpManger versiones anteriores a 125455, es vulnerable a una inyecci\u00f3n SQL en la API del m\u00f3dulo de ataques"
    }
  ],
  "id": "CVE-2021-41075",
  "lastModified": "2024-11-21T06:25:23.673",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-13T23:15:07.327",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-18 13:15
Modified
2024-11-21 06:56
Summary
Zoho ManageEngine OpManager before 125588 (and before 125603) is vulnerable to authenticated SQL Injection in the Inventory Reports module.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
              "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
              "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
              "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
              "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
              "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
              "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
              "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*",
              "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*",
              "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*",
              "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*",
              "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*",
              "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*",
              "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*",
              "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*",
              "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*",
              "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*",
              "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*",
              "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*",
              "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*",
              "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*",
              "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*",
              "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*",
              "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*",
              "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*",
              "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*",
              "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*",
              "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*",
              "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*",
              "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*",
              "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*",
              "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*",
              "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*",
              "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*",
              "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*",
              "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*",
              "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*",
              "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*",
              "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*",
              "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*",
              "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*",
              "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*",
              "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*",
              "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*",
              "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*",
              "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*",
              "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*",
              "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*",
              "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*",
              "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*",
              "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*",
              "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*",
              "matchCriteriaId": "7D394493-D690-44F0-B3F0-FD39E46F31C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "AF8CBF57-EF1A-4C84-879B-1A4035F4236A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*",
              "matchCriteriaId": "2F1E924E-8896-41CE-82E2-F22943A02FCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*",
              "matchCriteriaId": "FB058840-E3D0-45FA-B95F-3445A7719118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125589:*:*:*:*:*:*",
              "matchCriteriaId": "FD9B23C4-3458-4E6C-B1AB-D4A36BE8FFA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager before 125588 (and before 125603) is vulnerable to authenticated SQL Injection in the Inventory Reports module."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager versiones anteriores a 125588 (y antes de 125603) es vulnerable a una inyecci\u00f3n SQL autenticada en el m\u00f3dulo de informes de inventario"
    }
  ],
  "id": "CVE-2022-27908",
  "lastModified": "2024-11-21T06:56:27.113",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-18T13:15:08.177",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-10-17 14:29
Modified
2024-11-21 03:55
Summary
Zoho ManageEngine OpManager 12.3 before build 123214 has XSS.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
              "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
              "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
              "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
              "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
              "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
              "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
              "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
              "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
              "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
              "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
              "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
              "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
              "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
              "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
              "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
              "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
              "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
              "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
              "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
              "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
              "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
              "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
              "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
              "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
              "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
              "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
              "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
              "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
              "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
              "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
              "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
              "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
              "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
              "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
              "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
              "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
              "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
              "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
              "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
              "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
              "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
              "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
              "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
              "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
              "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
              "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
              "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
              "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
              "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
              "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
              "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
              "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
              "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
              "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
              "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
              "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
              "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
              "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
              "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
              "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
              "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
              "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
              "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
              "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
              "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
              "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
              "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
              "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
              "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
              "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
              "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
              "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
              "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
              "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
              "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
              "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
              "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
              "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
              "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
              "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
              "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
              "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
              "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
              "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
              "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
              "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
              "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
              "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
              "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
              "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
              "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
              "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
              "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
              "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
              "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
              "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
              "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
              "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
              "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
              "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
              "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
              "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
              "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
              "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
              "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
              "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
              "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
              "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
              "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
              "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
              "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
              "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
              "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
              "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
              "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
              "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
              "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
              "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
              "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
              "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
              "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
              "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
              "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
              "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
              "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
              "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
              "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
              "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
              "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
              "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
              "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
              "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
              "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
              "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
              "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
              "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
              "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
              "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
              "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager 12.3 before build 123214 has XSS."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager 12.3 antes de la build 123214 tiene Cross-Site Scripting (XSS)."
    }
  ],
  "id": "CVE-2018-18262",
  "lastModified": "2024-11-21T03:55:37.330",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-10-17T14:29:01.350",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Oct/34"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Oct/34"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-29 21:15
Modified
2024-11-21 07:17
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature.
Impacted products
Vendor Product Version
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager_msp 12.5
zohocorp manageengine_opmanager_msp 12.5
zohocorp manageengine_opmanager_msp 12.5
zohocorp manageengine_opmanager_msp 12.5
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_plus 12.5
zohocorp manageengine_opmanager_plus 12.5
zohocorp manageengine_opmanager_plus 12.5
zohocorp manageengine_opmanager_plus 12.5
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "BEC805D2-CFDC-40DE-AA70-42A91461BEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "4767BF5A-B867-44BB-B152-E2AFA63B06D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "5855C471-07AB-4A96-9631-26C6C8B01F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "5075910F-3676-439A-879A-5CBE2C734347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "20808F91-7F08-4BA9-9075-C54337EC68E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "C700CE3B-31B5-4B4D-A378-70EC26D6F88B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125459:*:*:*:*:*:*",
              "matchCriteriaId": "A05AFF4D-4EF9-4939-81CC-0AB55DA596F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125464:*:*:*:*:*:*",
              "matchCriteriaId": "86C3E31F-87E2-459F-8D1B-C6D1A237960D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "A3E7FC26-0000-4D4B-B489-DF0E2CD2B13C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "13E6E0F9-9D03-4665-9C89-6BE62ADCB39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125471:*:*:*:*:*:*",
              "matchCriteriaId": "0DE52003-E959-420F-89A1-C86D8FB12DBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125476:*:*:*:*:*:*",
              "matchCriteriaId": "6E9C9051-7FDE-4DEE-85DC-0798524DC17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "5BE3598F-CEB4-4553-BB50-AA778BBF8BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "4C71852D-D529-469A-9111-6D4DB8381BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125484:*:*:*:*:*:*",
              "matchCriteriaId": "EC3F7DA9-3FBF-4D67-8BA5-2643E706F64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "53E2DF01-9A39-4E50-BEDE-D49988CE5CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "0015664D-11BC-4DEE-BC5B-DB3D1FE8DF82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125490:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F887-4574-4B3C-A8A7-57F75B27447F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125557:*:*:*:*:*:*",
              "matchCriteriaId": "C1E93E4D-0E54-41DF-843A-E8AE94EAD0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125566:*:*:*:*:*:*",
              "matchCriteriaId": "1617ADAD-2E13-4910-B600-3EC7E59B087C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "4E7B4955-F688-47DE-B1FF-D417EBDFF9C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125582:*:*:*:*:*:*",
              "matchCriteriaId": "5F982932-5513-411A-9CBF-3082C7ECEF0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125584:*:*:*:*:*:*",
              "matchCriteriaId": "0B5378E9-D011-4B12-8DEE-442F22789C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125585:*:*:*:*:*:*",
              "matchCriteriaId": "8232CBA1-55DA-4F3C-A9E5-A204A25231C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125606:*:*:*:*:*:*",
              "matchCriteriaId": "253569A5-4A2E-4163-88DC-C0FE6B79E06E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "A30281F3-4DE2-4ED3-91A7-AE7A091C31E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125647:*:*:*:*:*:*",
              "matchCriteriaId": "F76B196B-B5F8-4E84-9BBE-9D45A2FB2A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "F267C53D-6F27-4DFF-BB3C-7B299E07F487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125657:*:*:*:*:*:*",
              "matchCriteriaId": "954239B1-B0FD-43EA-AAF7-ECB55E395E9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "574117B3-2785-4971-ABBE-55C08010E16B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "8C4AA98C-BFFE-46E9-A3C3-D37298A8F6F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "B907FD6F-BA43-4D8D-90C4-F51CD693E9B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "B6CF111E-B976-46D1-A246-B7D1750FFC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "36CBCAF8-B7FE-4611-A9DE-C82BCDE81A86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "33D8FC4D-0EF1-4C5B-A677-7269FFF068C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "6594EF08-E72F-4A59-86DB-B63E0CCE4463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "219B0F9E-A087-4AA2-B723-E3D68BEC9D21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "852A63FF-F97B-4BB9-869F-383E9FABE929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "FA6C4793-6913-4C51-A2D4-B906D2CBEA94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "3AF232D9-6735-4296-91C8-A451A1801287",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126118:*:*:*:*:*:*",
              "matchCriteriaId": "11ACA60F-055A-44F5-8FE2-7FA61AE6F3CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126119:*:*:*:*:*:*",
              "matchCriteriaId": "9EC35E5A-0C46-458C-AF33-5B699B8F5EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "855EA944-CB73-4193-94E0-9D706FF554C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "002FDBC8-72DE-46C6-A84B-B4A51F3228F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "AABA0E18-790D-4A86-91C4-1C50D2B6167C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "797C3F7A-E5CE-48B7-9BC1-4A637131C061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "7EE387F3-24C8-4933-A25E-D9C4026469D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "2D219374-C6A2-4A28-AF41-ABC633D8C9ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125459:*:*:*:*:*:*",
              "matchCriteriaId": "0C67D5FC-5965-4AC1-80A5-931BE60B5E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125465:*:*:*:*:*:*",
              "matchCriteriaId": "139E25D9-A4C8-4041-ADF7-4618DFEEE8C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "6A65F3F7-45D3-49EB-9784-1F13FA2CBB0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125471:*:*:*:*:*:*",
              "matchCriteriaId": "3795D2DE-622F-4C82-B133-0993A01AC1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125475:*:*:*:*:*:*",
              "matchCriteriaId": "C0DB9896-BC25-46E3-AA6F-496A442BE525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "CE56A949-74AC-4138-8AD3-31F5763860EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "4A3DB867-FD46-46EB-AEF0-2B6E79371AF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "7881FBB4-AC09-4EB9-B02F-3EA19237E095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "F391E432-98B8-4D97-8AD4-FB1A84FAF774",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125490:*:*:*:*:*:*",
              "matchCriteriaId": "61D908B2-446E-48EC-9F6B-91E8BF0F6A38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125565:*:*:*:*:*:*",
              "matchCriteriaId": "FD5F28B0-580E-4CD4-917A-496D35AD271A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "F0FC96AA-F2F4-4C35-8BF7-6318A2F624A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125583:*:*:*:*:*:*",
              "matchCriteriaId": "6EA008F1-4E47-4753-8506-769B29AB5BA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125584:*:*:*:*:*:*",
              "matchCriteriaId": "7ED68CDE-1096-4490-8E6B-78F4AC2BB729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125598:*:*:*:*:*:*",
              "matchCriteriaId": "34F8D9B7-3BD7-44C0-A292-162928729F36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125612:*:*:*:*:*:*",
              "matchCriteriaId": "7446678C-E2DB-4EA2-BC9B-430C8EC7804B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "33C57314-5503-48BD-9ED2-D76517C9C0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125617:*:*:*:*:*:*",
              "matchCriteriaId": "AC201C68-2C1D-4E75-9443-C5F853A37AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125646:*:*:*:*:*:*",
              "matchCriteriaId": "FBC08E48-51FA-497F-B5EB-349081888402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125650:*:*:*:*:*:*",
              "matchCriteriaId": "FD78483C-8AC8-46B3-A1FB-2DA04468BCEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "D1DBA938-81D2-4CF8-B1F2-B71C4B82835D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125657:*:*:*:*:*:*",
              "matchCriteriaId": "187ADAD1-1AEC-447D-8818-C02AE12C4505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "88C4DF20-F8A7-4673-9639-42522C6BB3C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "722ACCC8-EC9C-4700-A5D0-5C6EFE8E36AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "FC0970ED-62DC-442B-AA29-618ADBD66E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126002:*:*:*:*:*:*",
              "matchCriteriaId": "B09FDE60-23E6-4738-857C-8E4A974BDED6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "8D6852F2-14B0-4EAE-B420-67A0103C10EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "BF0CBE7F-B124-4ABD-82F5-CB85341CAC86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "08A4CCDD-0892-4FF3-8E17-41D6AB8FC747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "2DB6B15E-6513-4590-A5C1-A949341411F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126104:*:*:*:*:*:*",
              "matchCriteriaId": "F7367402-515B-4055-B19F-2FF7699C2C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "C1DF8B30-1820-4DA1-AB30-996FCC99192B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "09C0FF80-AF4C-47F9-B35C-12A7F2843D0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "6445A4A5-E41D-4B60-88E7-0E5B66C2A096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "645D9C07-A2F4-4E8B-B2FD-39330CD7BE14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "63739B14-BBAF-4F12-A178-36CE2C0F6B5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126118:*:*:*:*:*:*",
              "matchCriteriaId": "B4E90D5B-95BB-4443-B7A6-8083245677B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126119:*:*:*:*:*:*",
              "matchCriteriaId": "229795D9-D38B-4EAE-8725-208D245E02FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125457:*:*:*:*:*:*",
              "matchCriteriaId": "BC457292-04FE-4643-8F1D-05DAEF3F70BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*",
              "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*",
              "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*",
              "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125476:*:*:*:*:*:*",
              "matchCriteriaId": "BE930B14-4B22-4299-8DE8-7625342FC4E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*",
              "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*",
              "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*",
              "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*",
              "matchCriteriaId": "7D394493-D690-44F0-B3F0-FD39E46F31C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "AF8CBF57-EF1A-4C84-879B-1A4035F4236A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*",
              "matchCriteriaId": "2F1E924E-8896-41CE-82E2-F22943A02FCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*",
              "matchCriteriaId": "FB058840-E3D0-45FA-B95F-3445A7719118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125589:*:*:*:*:*:*",
              "matchCriteriaId": "FD9B23C4-3458-4E6C-B1AB-D4A36BE8FFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125597:*:*:*:*:*:*",
              "matchCriteriaId": "D2A7AA89-7233-4624-894A-B2B996D1D270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125598:*:*:*:*:*:*",
              "matchCriteriaId": "B6B402ED-8B64-4FB0-B9E7-76E499A4115F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125599:*:*:*:*:*:*",
              "matchCriteriaId": "4E8B01F2-0A03-48CF-8BAE-556A9C3D88FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125601:*:*:*:*:*:*",
              "matchCriteriaId": "3C07E022-B75C-4491-8A30-9A1532D0472C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125603:*:*:*:*:*:*",
              "matchCriteriaId": "00E92DB5-8D53-4129-92D0-AD1DA0F1FEB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125604:*:*:*:*:*:*",
              "matchCriteriaId": "913CD99C-8F47-47BD-BD7C-33762861BB08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125605:*:*:*:*:*:*",
              "matchCriteriaId": "67B7F52E-7D7A-4AA9-9241-FFCC3DD49BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125611:*:*:*:*:*:*",
              "matchCriteriaId": "D02650C3-1A7F-4889-B6CB-11994054B5F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125612:*:*:*:*:*:*",
              "matchCriteriaId": "01FEA1CA-351B-4E2B-A78E-60338682F97F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125613:*:*:*:*:*:*",
              "matchCriteriaId": "04C9E097-FE04-42BD-96C8-2A3A9FD50B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125614:*:*:*:*:*:*",
              "matchCriteriaId": "94F895DB-C865-4AED-A1D9-CE69C0EF52FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "8B565B12-283F-4323-9C88-FD3CF5646DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125616:*:*:*:*:*:*",
              "matchCriteriaId": "9FDC3394-293E-44CF-A83F-FE047A4E4DE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125617:*:*:*:*:*:*",
              "matchCriteriaId": "01846F8F-D7D6-4CD9-B83E-41B70C691761",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125628:*:*:*:*:*:*",
              "matchCriteriaId": "CAE013FC-357D-42DA-B223-D40B3C813089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125629:*:*:*:*:*:*",
              "matchCriteriaId": "E4BA87E9-5E37-41EE-835C-13F68ABC9C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125630:*:*:*:*:*:*",
              "matchCriteriaId": "D2034E17-2DB9-4229-B7D4-D14761CEE699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125631:*:*:*:*:*:*",
              "matchCriteriaId": "39FBAFB9-5703-4EEA-BFF3-45B958E0805F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125632:*:*:*:*:*:*",
              "matchCriteriaId": "775D060A-773F-40BE-8FF3-6353EEA6A6BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125634:*:*:*:*:*:*",
              "matchCriteriaId": "D8326A48-9DDB-4502-B97F-ABCB151E2C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125635:*:*:*:*:*:*",
              "matchCriteriaId": "94ACC068-8260-4331-8B1C-E19B66D0738B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125638:*:*:*:*:*:*",
              "matchCriteriaId": "FE3C3B0A-BD28-4291-BD28-61A1EEB7AE17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125639:*:*:*:*:*:*",
              "matchCriteriaId": "94A96109-2BDE-4836-B1BF-FC90003DC018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125645:*:*:*:*:*:*",
              "matchCriteriaId": "E1303424-7BCA-4445-BDBC-B4B546E0ED05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125648:*:*:*:*:*:*",
              "matchCriteriaId": "EFFB585B-80EB-4EA3-BEC6-4E34FE952948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125649:*:*:*:*:*:*",
              "matchCriteriaId": "8D7B62B9-AAD9-4021-A806-21E61719E437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125651:*:*:*:*:*:*",
              "matchCriteriaId": "F1BF50D1-031E-4E39-9D15-FFC2CFB636D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125652:*:*:*:*:*:*",
              "matchCriteriaId": "F045D3C8-315C-42AB-B9D0-4B5267E70417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125653:*:*:*:*:*:*",
              "matchCriteriaId": "AC4FD2D6-9BA7-4889-96A2-DC946831469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125654:*:*:*:*:*:*",
              "matchCriteriaId": "3D86914B-49B5-4002-A4C7-3712C87F7626",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125655:*:*:*:*:*:*",
              "matchCriteriaId": "9B2EBC6B-0C4D-40A7-A1B7-4AC7BF98A744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "2C5ED401-A964-44D5-AB2F-C07D35BD96D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125657:*:*:*:*:*:*",
              "matchCriteriaId": "E424B820-3C4E-45C0-B74F-470E1E331127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "1C14D389-AA7A-4CD3-A0B5-EF052907FEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "48C09D5D-BC77-42DC-9A72-00A71F8C1A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "14269E88-7186-4F2C-B770-964D0AD7D414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126002:*:*:*:*:*:*",
              "matchCriteriaId": "31498701-6732-40E4-8F3D-55EE8A77D61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "C46D091F-095F-4F1D-8D16-1021E15BC963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "2AE780F5-EF56-45F3-A5E7-805A24C04A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "212A00BA-ED01-45F3-9E9C-9E6B75B82CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "CBFA159F-0293-4E44-BB20-173021991107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126104:*:*:*:*:*:*",
              "matchCriteriaId": "356504E5-BE0A-4F54-8713-AC9EA29D189C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "27D49B1C-1140-4CA7-B10A-9B59ACE69208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "1979F66B-749E-41F8-9CBD-E4AD4483B500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "BC5A1967-8D4F-4090-A2BA-5FFCEAA2EFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "50D85F0C-201C-44D3-92C7-261095B4B03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "36B6C5A9-FC13-4AB0-BE8B-9DFA8FDB0C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126118:*:*:*:*:*:*",
              "matchCriteriaId": "B621572C-448C-43C4-AF8E-EEBCFADF3630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126119:*:*:*:*:*:*",
              "matchCriteriaId": "AAAF3692-3979-494B-831A-D8BFE127A6C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "342D59C3-B7A8-44AF-8298-743F5487CD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "9A6D1AC1-8480-42C9-90C6-F47E58B7E44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125657:*:*:*:*:*:*",
              "matchCriteriaId": "8BBD4797-AC5A-4CBE-8878-067116BB8E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "F31C74BA-085E-482C-A1E8-D6E9A69462B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "5D3E1BC5-7D01-45E9-A92D-7F2D623F1C4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "B15B6E60-9DF9-4524-8387-8CF0B2B6D0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126002:*:*:*:*:*:*",
              "matchCriteriaId": "DEB00990-C73C-4B46-B87D-80E3B5B39302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "06AEE3B8-3A71-466D-880F-B39E6E4D9899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "C7E2FFFB-975D-4FFF-A54E-01336B2687BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126104:*:*:*:*:*:*",
              "matchCriteriaId": "34A43740-26B4-4D73-BC53-7D14529BA78B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "4C1FB9D8-1DA7-486C-9418-9C00F4D184D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "F78374E4-E4AF-4E77-9AE6-BEC58DCAB6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126119:*:*:*:*:*:*",
              "matchCriteriaId": "8912068D-3412-47E5-A790-0CDB29E05F20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "989668B0-0AEB-4E8B-AC51-42058CC6AC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "DC747248-7154-440A-BCD7-2E0F8ACFC042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125657:*:*:*:*:*:*",
              "matchCriteriaId": "6A811C73-AE4A-4B56-841E-A8F2649463E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "F4791DD2-AD34-4239-85CB-D87080D97AA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "F6E1060D-0E32-4330-BB0A-C35D5E11BCE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "FB7DAAA8-6A7B-41EF-8783-7EFDEE747332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126002:*:*:*:*:*:*",
              "matchCriteriaId": "87907DDD-12AF-435A-A005-893FED115AAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "EA101FBC-D697-4A7E-B539-79097228B735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "4CC9EF3C-6768-4976-94C8-3FBEE6093ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126104:*:*:*:*:*:*",
              "matchCriteriaId": "362871E6-BF7C-46D4-8EFE-C87E96C71799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "B5934D8A-C10F-47BC-BB73-45B8CB71C686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "59E334B0-6BF6-4674-9D9D-7E9C988BAB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126119:*:*:*:*:*:*",
              "matchCriteriaId": "E866F2AE-FB51-4270-A673-B1299C7CD2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "2BF85206-863D-493C-88F4-15B0BA5276A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "3C9DE996-1DEC-4AF0-89FD-1E3DA3967BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "75FF4D85-97C8-4DF4-ADE6-EDE8EC2DD5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "9CAC6467-19F7-4CB2-A5FC-B57A14F4636C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "60EB56E2-7367-4488-A00D-41464E86B06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "3E315636-0897-4421-882D-E8196F7ACAD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125657:*:*:*:*:*:*",
              "matchCriteriaId": "6DC52F3E-EC5F-404B-ABD7-615B8AB522A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "E3552F71-C708-41A4-9168-5673C086F507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "9505C545-2540-4554-B774-6ECCD64D6115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "06CF15AE-51A6-4FB4-A0DA-6097F0B2BE98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126002:*:*:*:*:*:*",
              "matchCriteriaId": "7B97826F-4765-4D11-972E-EEA0E23CE7CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "11A17B44-C69A-424A-A305-0AD61DCDA2A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "8600CCB2-4642-4760-AE10-854446251673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "087A0139-FA4B-4C85-BAAD-1BDCF7B5F91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "2F3B1A89-93A9-43F1-9246-E2081F26DBBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126104:*:*:*:*:*:*",
              "matchCriteriaId": "D24EB0A7-64AB-4203-BDAC-57867083FF6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "9A7C64F7-9B85-4C7F-95B9-468200D2EA7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "1EE78F81-5F9D-4B98-BA82-24EE281041C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "298A1371-E23E-4954-8C16-B0F70A575A77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "BA174B71-5D43-4783-8744-1A4020A157C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "ADB451D9-106E-40DA-A499-B1D8DB1B78BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126119:*:*:*:*:*:*",
              "matchCriteriaId": "156225CC-1B65-4AB2-80CE-806491E0E973",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer y OpUtils versiones anteriores a 125658, 126003, 126105 y 126120, permiten a usuarios autenticados realizar cambios en la base de datos que conllevan a una ejecuci\u00f3n de c\u00f3digo remota en la funci\u00f3n NMAP"
    }
  ],
  "id": "CVE-2022-38772",
  "lastModified": "2024-11-21T07:17:03.677",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-29T21:15:09.227",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://manageengine.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://manageengine.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-12-04 17:59
Modified
2024-11-21 02:13
Severity ?
Summary
Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B68292A0-79E4-4CEE-844E-05342994E534",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA5A84F-8B14-4BC4-8CBD-37178AE42DB8",
              "versionEndIncluding": "10.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35DA35B-6836-41FD-9B1D-E76809D19304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48CA686-28DF-4CE5-A950-1C62D162D987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "504C45FC-1A8C-4C6A-AA55-4B2C21DF5BEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E6403B7-8C3D-40D1-A32B-3A50B2A6D005",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAD3BAD6-58BE-4099-994C-9DBFA2210D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E30D446-E54B-414B-BEB0-E7C2AD6DC092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "900914C7-4A60-45D2-90E1-3488998C77B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE71B7E-88F9-45B3-911C-472B5438D062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEC9C04-2DA1-4307-8828-9E91352FB055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD4D0DE-2B11-48AA-A60B-ED6B6DB94020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7D1014-51CF-4A24-9935-BD385E1EE57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en el servlet com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector en ZOHO ManageEngine OpManager 8.8 hasta 11.3, Social IT Plus 11.0, y IT360 10.4 y anteriores permite a atacantes remotos o usuarios remotos autenticados escribir y ejecutar ficheros WAR arbitrarios a trav\u00e9s de un .. (punto punto) en el par\u00e1metro regionID."
    }
  ],
  "id": "CVE-2014-6034",
  "lastModified": "2024-11-21T02:13:38.180",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-04T17:59:02.863",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-04-04 17:15
Modified
2024-11-21 04:58
Summary
In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC6C8B88-B295-48DB-859A-7AF8E9027F62",
              "versionEndExcluding": "12.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "B666DF1F-0EF8-41F0-9EA0-EB104F87405F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124000:*:*:*:*:*:*",
              "matchCriteriaId": "5B7042C9-FD7C-4A83-A755-1429D3CEF91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124011:*:*:*:*:*:*",
              "matchCriteriaId": "86F61865-FB7B-4F12-B8EF-81A1DFB5E7E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124012:*:*:*:*:*:*",
              "matchCriteriaId": "5D81E915-18CC-4419-879D-A2D90472F526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124013:*:*:*:*:*:*",
              "matchCriteriaId": "4B9314BA-7CA4-46C2-9ADD-AA15101081FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124014:*:*:*:*:*:*",
              "matchCriteriaId": "4A94FB0E-7487-4E18-A7AD-19E47B03BF1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124015:*:*:*:*:*:*",
              "matchCriteriaId": "D99A8A01-8EDC-4AE6-8ED9-C7AF12DEDA62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124016:*:*:*:*:*:*",
              "matchCriteriaId": "44A9BF34-7B3B-4B5F-AEFD-AA7434C6A682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124022:*:*:*:*:*:*",
              "matchCriteriaId": "33068139-B994-4145-B73A-2344A699A0A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124023:*:*:*:*:*:*",
              "matchCriteriaId": "B798718E-3E01-4F3D-AD43-9BA7939E2EE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124024:*:*:*:*:*:*",
              "matchCriteriaId": "E0C42019-0D5A-4938-87AB-F787C55E9834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124025:*:*:*:*:*:*",
              "matchCriteriaId": "373AA6C3-DA45-4CCD-88EF-859858732FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124026:*:*:*:*:*:*",
              "matchCriteriaId": "13E24695-F223-4F62-B344-4CCB0BBE1050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124027:*:*:*:*:*:*",
              "matchCriteriaId": "C8EDB65B-34E1-4F89-B2E0-CEE13F39DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124030:*:*:*:*:*:*",
              "matchCriteriaId": "B8F7F90C-57BB-4E2F-BD79-1F56375A4E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124033:*:*:*:*:*:*",
              "matchCriteriaId": "A1343F39-5FAA-4EB7-B95A-5D5133AD5717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124037:*:*:*:*:*:*",
              "matchCriteriaId": "C23F2AB2-714D-4548-B9F9-315CE31CF573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124039:*:*:*:*:*:*",
              "matchCriteriaId": "AC8CDE36-EC3C-4F61-872C-8DD33688E0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124040:*:*:*:*:*:*",
              "matchCriteriaId": "D790A131-CA15-42A1-8F35-3DCF27D51060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124041:*:*:*:*:*:*",
              "matchCriteriaId": "C91F973F-3910-41E6-9D2F-3506E8EF5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124042:*:*:*:*:*:*",
              "matchCriteriaId": "471FFC26-5DE7-42C6-B30B-EF5D1E1A35C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124043:*:*:*:*:*:*",
              "matchCriteriaId": "C5407B79-C1DF-481E-83A3-BCE36BEE29E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124051:*:*:*:*:*:*",
              "matchCriteriaId": "F09EF7FD-47EB-4989-8805-74EC075F91AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124053:*:*:*:*:*:*",
              "matchCriteriaId": "F91FCCC4-C8C0-49B2-86C7-B2896D72F019",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124054:*:*:*:*:*:*",
              "matchCriteriaId": "F7679A19-1874-4E97-87A5-60903A549A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124056:*:*:*:*:*:*",
              "matchCriteriaId": "D3B991A7-452F-46C6-AB37-78137A7B27CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124058:*:*:*:*:*:*",
              "matchCriteriaId": "66A7CEE9-8647-462A-8F50-9159132E01FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124065:*:*:*:*:*:*",
              "matchCriteriaId": "28D368E2-FBB1-4DC2-BDBF-7A4F994A14F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124066:*:*:*:*:*:*",
              "matchCriteriaId": "A9F3220A-D461-4412-9F73-B74EB299DBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124067:*:*:*:*:*:*",
              "matchCriteriaId": "7442E3D2-83CC-4F75-89E3-64BAE5937722",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124069:*:*:*:*:*:*",
              "matchCriteriaId": "07B87F17-6AF0-4545-9527-154E0C6483C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124070:*:*:*:*:*:*",
              "matchCriteriaId": "B565B110-9A53-4BA1-BAB9-C6C16DEECD2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124071:*:*:*:*:*:*",
              "matchCriteriaId": "AA46F3B7-0650-4630-9005-1FAC1EC22EE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124074:*:*:*:*:*:*",
              "matchCriteriaId": "8706C9CD-0D79-4661-B0C5-AB1813DE1F0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124075:*:*:*:*:*:*",
              "matchCriteriaId": "2BACB527-2F9E-4C6B-8C7B-696EAD5251FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124081:*:*:*:*:*:*",
              "matchCriteriaId": "CC9D8F85-EFB8-4D0E-BD8F-6DBE239559F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124082:*:*:*:*:*:*",
              "matchCriteriaId": "0297A0EA-43F2-4AD0-BC73-E6014F1F74BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124085:*:*:*:*:*:*",
              "matchCriteriaId": "CA5F1F18-247B-4081-8B53-E34B1512D47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124086:*:*:*:*:*:*",
              "matchCriteriaId": "2B8F85FF-78A7-4BF4-83C2-FC3ABFBC8715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124087:*:*:*:*:*:*",
              "matchCriteriaId": "1C1A1836-D054-4B96-890E-E837050D6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124089:*:*:*:*:*:*",
              "matchCriteriaId": "25CD5A10-84D3-4EE6-B2A3-2F7B2E7D7CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124095:*:*:*:*:*:*",
              "matchCriteriaId": "57245302-3114-408E-AE0B-8A2B0E1CC16E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124096:*:*:*:*:*:*",
              "matchCriteriaId": "570DF8F0-FEE0-48D2-B4B5-9A42AC710BEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124097:*:*:*:*:*:*",
              "matchCriteriaId": "D3A1D662-A800-4CD4-AA9C-A9A5806547AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124098:*:*:*:*:*:*",
              "matchCriteriaId": "597EFA52-C830-472F-966A-DE6E0CF5C013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124099:*:*:*:*:*:*",
              "matchCriteriaId": "6CD48702-4DA4-452C-8225-A37A57EF0B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124100:*:*:*:*:*:*",
              "matchCriteriaId": "05ED4A61-EECA-4B98-AACC-0203BE796885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124101:*:*:*:*:*:*",
              "matchCriteriaId": "C6E5D010-9928-4AD6-84DD-8B9DE39B220F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124102:*:*:*:*:*:*",
              "matchCriteriaId": "384D799A-4E16-494B-BA57-52245B25E718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124168:*:*:*:*:*:*",
              "matchCriteriaId": "3A48C69B-4AA3-445F-B8B4-608F372712FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124169:*:*:*:*:*:*",
              "matchCriteriaId": "84A6CE26-B08A-4EDF-8F00-EEBCDC326F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124175:*:*:*:*:*:*",
              "matchCriteriaId": "162FB7D6-19DF-4701-A969-496166ED1A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124176:*:*:*:*:*:*",
              "matchCriteriaId": "5623BBD0-4FED-4D66-8446-FB67824536F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124178:*:*:*:*:*:*",
              "matchCriteriaId": "7F459491-376E-46D2-A396-31E76FCD84AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files."
    },
    {
      "lang": "es",
      "value": "En Zoho ManageEngine OpManager versiones anteriores a 12.4.181, un atacante remoto no autenticado puede enviar un URI especialmente dise\u00f1ado para leer archivos arbitrarios."
    }
  ],
  "id": "CVE-2020-11527",
  "lastModified": "2024-11-21T04:58:04.810",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-04-04T17:15:14.047",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-06-04 13:15
Modified
2024-11-21 05:01
Summary
In Zoho ManageEngine OpManager before 125144, when <cachestart> is used, directory traversal validation can be bypassed.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Zoho ManageEngine OpManager before 125144, when \u003ccachestart\u003e is used, directory traversal validation can be bypassed."
    },
    {
      "lang": "es",
      "value": "En Zoho ManageEngine OpManager versiones anteriores a 125144, cuando es usado (cachestart), una comprobaci\u00f3n de salto de directorio puede ser omitida"
    }
  ],
  "id": "CVE-2020-13818",
  "lastModified": "2024-11-21T05:01:55.843",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-04T13:15:11.117",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-23 14:15
Modified
2024-12-19 20:21
Summary
Zohocorp ManageEngine OpManager and Remote Monitoring and Management versions 128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36BBC867-6304-4D20-B700-AF90A6E9AD92",
              "versionEndIncluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.8:build128102:*:*:*:*:*:*",
              "matchCriteriaId": "EFEEB6AC-CE71-4F6A-BF9A-745AE8AA659B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.8:build128103:*:*:*:*:*:*",
              "matchCriteriaId": "6E4D7FF9-8DBC-472A-B9E7-3190E4EDFE07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.8:build128104:*:*:*:*:*:*",
              "matchCriteriaId": "8333DEF5-F041-496D-9762-CF7CB86CB730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.8:build128186:*:*:*:*:*:*",
              "matchCriteriaId": "04C88F59-5059-4FF5-A9A7-B4539418003C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.8:build128187:*:*:*:*:*:*",
              "matchCriteriaId": "7E824E22-6F35-4B19-98B6-E2D7295D3B88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB1F9C1-FB50-451E-B2D1-D907F1A36276",
              "versionEndIncluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.8:build128102:*:*:*:*:*:*",
              "matchCriteriaId": "E611698E-49FD-48FA-8B23-32C4D3F655E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.8:build128103:*:*:*:*:*:*",
              "matchCriteriaId": "54F928AD-C6AD-4CCC-8ACF-3DE93EB6DD13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.8:build128104:*:*:*:*:*:*",
              "matchCriteriaId": "E73E5594-3491-4373-806C-A0E8335F4E93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.8:build128186:*:*:*:*:*:*",
              "matchCriteriaId": "BA04AF9C-D59B-4CE0-82F6-65621E2C0058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.8:build128187:*:*:*:*:*:*",
              "matchCriteriaId": "50067B64-1E4D-4A4E-BAE0-7940FC025C1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A855895-5EEC-406D-B3ED-7BF3318368F0",
              "versionEndIncluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.8:build128102:*:*:*:*:*:*",
              "matchCriteriaId": "E4538191-BBDC-4E82-9C4B-A00E9D845CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.8:build128103:*:*:*:*:*:*",
              "matchCriteriaId": "0E6D15B3-EF3D-4278-9231-9D4B3292EC84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.8:build128104:*:*:*:*:*:*",
              "matchCriteriaId": "E307E12D-316E-481E-A9BC-CF91FF4FE15B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.8:build128186:*:*:*:*:*:*",
              "matchCriteriaId": "750D9A65-423C-48B1-9DC6-2C75AD115535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.8:build128187:*:*:*:*:*:*",
              "matchCriteriaId": "17A772EF-75E0-43DB-95B8-6D1A00C76101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_remote_monitoring_and_management_central:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1704E80-F82B-4205-94B3-0EC5F6C78415",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zohocorp ManageEngine OpManager and\u00a0Remote Monitoring and Management versions\u00a0128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option."
    },
    {
      "lang": "es",
      "value": "Zohocorp ManageEngine OpManager y Remote Monitoring and Management versiones 128329 e inferiores son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo autenticado en la opci\u00f3n de implementaci\u00f3n del agente."
    }
  ],
  "id": "CVE-2024-5466",
  "lastModified": "2024-12-19T20:21:12.243",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "0fc0942c-577d-436f-ae8e-945763c79b02",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-23T14:15:11.073",
  "references": [
    {
      "source": "0fc0942c-577d-436f-ae8e-945763c79b02",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2024-5466.html"
    }
  ],
  "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "0fc0942c-577d-436f-ae8e-945763c79b02",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-12-04 17:59
Modified
2024-11-21 02:18
Severity ?
Summary
SQL injection vulnerability in the com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus servlet in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the probeName parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B68292A0-79E4-4CEE-844E-05342994E534",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9176D056-7350-4371-8F7E-87C2521EEBF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C71A803-6D67-4D8F-8072-73C10532BB30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus servlet in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the probeName parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en el servlet com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus en ZOHO ManageEngine OpManager 11.3 y 11.4, IT360 10.3 y 10.4, y Social IT Plus 11.0 permite a atacantes remotos o usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro probeName."
    }
  ],
  "id": "CVE-2014-7867",
  "lastModified": "2024-11-21T02:18:10.323",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-04T17:59:05.737",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-10 20:16
Modified
2024-11-21 07:14
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user's API key, and then access external APIs.
Impacted products
Vendor Product Version
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_firewall_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_netflow_analyzer 12.6
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_network_configuration_manager 12.6
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager 12.6
zohocorp manageengine_opmanager_msp 12.5
zohocorp manageengine_opmanager_msp 12.5
zohocorp manageengine_opmanager_msp 12.5
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_msp 12.6
zohocorp manageengine_opmanager_plus 12.5
zohocorp manageengine_opmanager_plus 12.5
zohocorp manageengine_opmanager_plus 12.5
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_opmanager_plus 12.6
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6
zohocorp manageengine_oputils 12.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "95767F18-02DA-4B39-941E-3111639A8295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "3D6B8568-FCE8-4283-A41A-98DDA07B3631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "D6CF42CA-ED4F-4184-B392-B9BA6846A7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "2AFC22CB-4540-498A-AAA1-0F6D1676F290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "6585CDEA-9649-45A3-8965-E2CEAB1ADFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "5D9F4070-68B1-4444-991A-A2CB0063442A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "EF7CDF11-A00E-47B6-B8E3-512998134656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "A0B3AA58-0D48-4152-BF08-357D4A2098AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "22171713-63E5-42F8-BD7B-835447371595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "D42A5730-622F-4903-991D-B54881349ABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "EC69DF45-45F8-4C7B-8457-666270C95895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "A33E48DB-3CC9-43FD-85F8-0F3C389B961E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "389CF8B9-F431-4369-A581-4BFBA1305A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "DBD1E3BA-4112-4AD5-A616-BCFD2D5C5FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "4FFD8500-5E07-4B3E-88EC-27C403A9B44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "0BED22ED-D040-4439-AEC6-8CCD74F29217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "4D1C56BB-D28D-48B6-BA6B-7B403E248648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "A49349AE-4EA2-4CE4-B8B9-326D44264B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "BEC805D2-CFDC-40DE-AA70-42A91461BEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "4767BF5A-B867-44BB-B152-E2AFA63B06D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "5855C471-07AB-4A96-9631-26C6C8B01F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "5075910F-3676-439A-879A-5CBE2C734347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "20808F91-7F08-4BA9-9075-C54337EC68E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "C700CE3B-31B5-4B4D-A378-70EC26D6F88B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "574117B3-2785-4971-ABBE-55C08010E16B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "8C4AA98C-BFFE-46E9-A3C3-D37298A8F6F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "B907FD6F-BA43-4D8D-90C4-F51CD693E9B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "B6CF111E-B976-46D1-A246-B7D1750FFC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "36CBCAF8-B7FE-4611-A9DE-C82BCDE81A86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "33D8FC4D-0EF1-4C5B-A677-7269FFF068C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "C510DE4D-B2AB-404D-BA49-3CE09FAECB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "6594EF08-E72F-4A59-86DB-B63E0CCE4463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "219B0F9E-A087-4AA2-B723-E3D68BEC9D21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "852A63FF-F97B-4BB9-869F-383E9FABE929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "FA6C4793-6913-4C51-A2D4-B906D2CBEA94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "3AF232D9-6735-4296-91C8-A451A1801287",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "855EA944-CB73-4193-94E0-9D706FF554C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "002FDBC8-72DE-46C6-A84B-B4A51F3228F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "AABA0E18-790D-4A86-91C4-1C50D2B6167C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "797C3F7A-E5CE-48B7-9BC1-4A637131C061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "7EE387F3-24C8-4933-A25E-D9C4026469D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "2D219374-C6A2-4A28-AF41-ABC633D8C9ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "88C4DF20-F8A7-4673-9639-42522C6BB3C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "722ACCC8-EC9C-4700-A5D0-5C6EFE8E36AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "FC0970ED-62DC-442B-AA29-618ADBD66E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "8D6852F2-14B0-4EAE-B420-67A0103C10EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "BF0CBE7F-B124-4ABD-82F5-CB85341CAC86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "08A4CCDD-0892-4FF3-8E17-41D6AB8FC747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "2DB6B15E-6513-4590-A5C1-A949341411F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "C1DF8B30-1820-4DA1-AB30-996FCC99192B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "09C0FF80-AF4C-47F9-B35C-12A7F2843D0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "6445A4A5-E41D-4B60-88E7-0E5B66C2A096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "645D9C07-A2F4-4E8B-B2FD-39330CD7BE14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "63739B14-BBAF-4F12-A178-36CE2C0F6B5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "1C14D389-AA7A-4CD3-A0B5-EF052907FEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "48C09D5D-BC77-42DC-9A72-00A71F8C1A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "14269E88-7186-4F2C-B770-964D0AD7D414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "C46D091F-095F-4F1D-8D16-1021E15BC963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "2AE780F5-EF56-45F3-A5E7-805A24C04A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "212A00BA-ED01-45F3-9E9C-9E6B75B82CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "CBFA159F-0293-4E44-BB20-173021991107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "27D49B1C-1140-4CA7-B10A-9B59ACE69208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "1979F66B-749E-41F8-9CBD-E4AD4483B500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "BC5A1967-8D4F-4090-A2BA-5FFCEAA2EFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "50D85F0C-201C-44D3-92C7-261095B4B03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "36B6C5A9-FC13-4AB0-BE8B-9DFA8FDB0C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "342D59C3-B7A8-44AF-8298-743F5487CD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "9A6D1AC1-8480-42C9-90C6-F47E58B7E44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "F31C74BA-085E-482C-A1E8-D6E9A69462B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "5D3E1BC5-7D01-45E9-A92D-7F2D623F1C4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "B15B6E60-9DF9-4524-8387-8CF0B2B6D0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "06AEE3B8-3A71-466D-880F-B39E6E4D9899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "C7E2FFFB-975D-4FFF-A54E-01336B2687BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "4C1FB9D8-1DA7-486C-9418-9C00F4D184D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "F78374E4-E4AF-4E77-9AE6-BEC58DCAB6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "989668B0-0AEB-4E8B-AC51-42058CC6AC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "DC747248-7154-440A-BCD7-2E0F8ACFC042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "F4791DD2-AD34-4239-85CB-D87080D97AA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "F6E1060D-0E32-4330-BB0A-C35D5E11BCE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "FB7DAAA8-6A7B-41EF-8783-7EFDEE747332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "EA101FBC-D697-4A7E-B539-79097228B735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "4CC9EF3C-6768-4976-94C8-3FBEE6093ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "B5934D8A-C10F-47BC-BB73-45B8CB71C686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "59E334B0-6BF6-4674-9D9D-7E9C988BAB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "2BF85206-863D-493C-88F4-15B0BA5276A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "3C9DE996-1DEC-4AF0-89FD-1E3DA3967BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "75FF4D85-97C8-4DF4-ADE6-EDE8EC2DD5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "9CAC6467-19F7-4CB2-A5FC-B57A14F4636C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "60EB56E2-7367-4488-A00D-41464E86B06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "3E315636-0897-4421-882D-E8196F7ACAD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "E3552F71-C708-41A4-9168-5673C086F507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126000:*:*:*:*:*:*",
              "matchCriteriaId": "9505C545-2540-4554-B774-6ECCD64D6115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126001:*:*:*:*:*:*",
              "matchCriteriaId": "06CF15AE-51A6-4FB4-A0DA-6097F0B2BE98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126100:*:*:*:*:*:*",
              "matchCriteriaId": "11A17B44-C69A-424A-A305-0AD61DCDA2A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126101:*:*:*:*:*:*",
              "matchCriteriaId": "8600CCB2-4642-4760-AE10-854446251673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126102:*:*:*:*:*:*",
              "matchCriteriaId": "087A0139-FA4B-4C85-BAAD-1BDCF7B5F91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126103:*:*:*:*:*:*",
              "matchCriteriaId": "2F3B1A89-93A9-43F1-9246-E2081F26DBBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126113:*:*:*:*:*:*",
              "matchCriteriaId": "9A7C64F7-9B85-4C7F-95B9-468200D2EA7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126114:*:*:*:*:*:*",
              "matchCriteriaId": "1EE78F81-5F9D-4B98-BA82-24EE281041C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126115:*:*:*:*:*:*",
              "matchCriteriaId": "298A1371-E23E-4954-8C16-B0F70A575A77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126116:*:*:*:*:*:*",
              "matchCriteriaId": "BA174B71-5D43-4783-8744-1A4020A157C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126117:*:*:*:*:*:*",
              "matchCriteriaId": "ADB451D9-106E-40DA-A499-B1D8DB1B78BC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user\u0027s API key, and then access external APIs."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer y OpUtils versiones anteriores a 27-07-2022 hasta 28-07-2022 (125657, 126002, 126104 y 126118) permiten a atacantes no autenticados obtener la clave API de un usuario y luego acceder a APIs externas"
    }
  ],
  "id": "CVE-2022-36923",
  "lastModified": "2024-11-21T07:14:05.603",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-10T20:16:03.343",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-755"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-06-29 12:29
Modified
2024-11-21 03:46
Summary
A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:firewall_analyzer:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFC3545-5EE0-4722-BFB6-58B3AF246F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0940949F-4EB4-460B-8CE9-56B6387250F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1C4C73-FD72-4EE7-BE63-D83C373E6A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91373406-389A-404C-81A1-BA994B0C06DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AE5990D-D4B9-4D55-B221-20A9BF765C0A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter \u0027operation\u0027 to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad Cross-Site Scripting (XSS) reflejado en Zoho ManageEngine Netflow Analyzer antes de la build 123137, Network Configuration Manager antes de la build 123128, OpManager antes de la build 123148, OpUtils antes de la build 123161, y Firewall Analyzer antes de la build 123147 permite a los atacantes remotos inyectar scripts web o HTML arbitrarios a trav\u00e9s del par\u00e1metro \"operation\" en /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet."
    }
  ],
  "id": "CVE-2018-12998",
  "lastModified": "2024-11-21T03:46:13.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-06-29T12:29:00.500",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Jul/75"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/unh3x/just4cve/issues/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Jul/75"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/unh3x/just4cve/issues/10"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-12-21 09:29
Modified
2024-11-21 04:01
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
              "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
              "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
              "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
              "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
              "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
              "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
              "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
              "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
              "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
              "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
              "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
              "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
              "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
              "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
              "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
              "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
              "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
              "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
              "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
              "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
              "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
              "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
              "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
              "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
              "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
              "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
              "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
              "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
              "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
              "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
              "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
              "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
              "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
              "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
              "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
              "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
              "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
              "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
              "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
              "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
              "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
              "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
              "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
              "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
              "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
              "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
              "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
              "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
              "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
              "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
              "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
              "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
              "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
              "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
              "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
              "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
              "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
              "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
              "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
              "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
              "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
              "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
              "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
              "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
              "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
              "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
              "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
              "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
              "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
              "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
              "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
              "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
              "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
              "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
              "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
              "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
              "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
              "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
              "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
              "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
              "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
              "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
              "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
              "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
              "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
              "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
              "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
              "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
              "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
              "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
              "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
              "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
              "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
              "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
              "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
              "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
              "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
              "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
              "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
              "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
              "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
              "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
              "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
              "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
              "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
              "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
              "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
              "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
              "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
              "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
              "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
              "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
              "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
              "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
              "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
              "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
              "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
              "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
              "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
              "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
              "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
              "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
              "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
              "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
              "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
              "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
              "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
              "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
              "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
              "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
              "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
              "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
              "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
              "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
              "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
              "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
              "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
              "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
              "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*",
              "matchCriteriaId": "F3F7F501-1F21-4825-BD82-23ACA713FFD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*",
              "matchCriteriaId": "422417EA-FF20-428A-AC02-18D4F84DA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*",
              "matchCriteriaId": "59BCAF6B-CAC3-4142-B303-7B85B24C573C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*",
              "matchCriteriaId": "136E1AE8-723C-4A85-AC7A-A5FA557BE66F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*",
              "matchCriteriaId": "19BE3780-3FAB-46C9-9399-62C18EA1A322",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*",
              "matchCriteriaId": "D32CDFC3-8041-426B-BBE0-245703D4D74E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*",
              "matchCriteriaId": "6B95BC46-7679-415E-814B-29DA657A718E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123238:*:*:*:*:*:*",
              "matchCriteriaId": "C4C6D08A-13C8-4BE9-870A-9EB4591F984A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager, en versiones 12.3 anteriores a la build 123239, permite una inyecci\u00f3n SQL en la secci\u00f3n Alarms."
    }
  ],
  "id": "CVE-2018-20338",
  "lastModified": "2024-11-21T04:01:16.120",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-12-21T09:29:00.403",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106302"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-05-07 20:15
Modified
2024-11-21 04:59
Summary
Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.4
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD5FAEF6-F6BD-4624-A0E6-E2AE4E515D48",
              "versionEndIncluding": "12.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "B666DF1F-0EF8-41F0-9EA0-EB104F87405F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124000:*:*:*:*:*:*",
              "matchCriteriaId": "5B7042C9-FD7C-4A83-A755-1429D3CEF91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124011:*:*:*:*:*:*",
              "matchCriteriaId": "86F61865-FB7B-4F12-B8EF-81A1DFB5E7E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124012:*:*:*:*:*:*",
              "matchCriteriaId": "5D81E915-18CC-4419-879D-A2D90472F526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124013:*:*:*:*:*:*",
              "matchCriteriaId": "4B9314BA-7CA4-46C2-9ADD-AA15101081FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124014:*:*:*:*:*:*",
              "matchCriteriaId": "4A94FB0E-7487-4E18-A7AD-19E47B03BF1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124015:*:*:*:*:*:*",
              "matchCriteriaId": "D99A8A01-8EDC-4AE6-8ED9-C7AF12DEDA62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124016:*:*:*:*:*:*",
              "matchCriteriaId": "44A9BF34-7B3B-4B5F-AEFD-AA7434C6A682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124022:*:*:*:*:*:*",
              "matchCriteriaId": "33068139-B994-4145-B73A-2344A699A0A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124023:*:*:*:*:*:*",
              "matchCriteriaId": "B798718E-3E01-4F3D-AD43-9BA7939E2EE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124024:*:*:*:*:*:*",
              "matchCriteriaId": "E0C42019-0D5A-4938-87AB-F787C55E9834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124025:*:*:*:*:*:*",
              "matchCriteriaId": "373AA6C3-DA45-4CCD-88EF-859858732FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124026:*:*:*:*:*:*",
              "matchCriteriaId": "13E24695-F223-4F62-B344-4CCB0BBE1050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124027:*:*:*:*:*:*",
              "matchCriteriaId": "C8EDB65B-34E1-4F89-B2E0-CEE13F39DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124030:*:*:*:*:*:*",
              "matchCriteriaId": "B8F7F90C-57BB-4E2F-BD79-1F56375A4E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124033:*:*:*:*:*:*",
              "matchCriteriaId": "A1343F39-5FAA-4EB7-B95A-5D5133AD5717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124037:*:*:*:*:*:*",
              "matchCriteriaId": "C23F2AB2-714D-4548-B9F9-315CE31CF573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124039:*:*:*:*:*:*",
              "matchCriteriaId": "AC8CDE36-EC3C-4F61-872C-8DD33688E0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124040:*:*:*:*:*:*",
              "matchCriteriaId": "D790A131-CA15-42A1-8F35-3DCF27D51060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124041:*:*:*:*:*:*",
              "matchCriteriaId": "C91F973F-3910-41E6-9D2F-3506E8EF5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124042:*:*:*:*:*:*",
              "matchCriteriaId": "471FFC26-5DE7-42C6-B30B-EF5D1E1A35C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124043:*:*:*:*:*:*",
              "matchCriteriaId": "C5407B79-C1DF-481E-83A3-BCE36BEE29E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124051:*:*:*:*:*:*",
              "matchCriteriaId": "F09EF7FD-47EB-4989-8805-74EC075F91AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124053:*:*:*:*:*:*",
              "matchCriteriaId": "F91FCCC4-C8C0-49B2-86C7-B2896D72F019",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124054:*:*:*:*:*:*",
              "matchCriteriaId": "F7679A19-1874-4E97-87A5-60903A549A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124056:*:*:*:*:*:*",
              "matchCriteriaId": "D3B991A7-452F-46C6-AB37-78137A7B27CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124058:*:*:*:*:*:*",
              "matchCriteriaId": "66A7CEE9-8647-462A-8F50-9159132E01FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124065:*:*:*:*:*:*",
              "matchCriteriaId": "28D368E2-FBB1-4DC2-BDBF-7A4F994A14F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124066:*:*:*:*:*:*",
              "matchCriteriaId": "A9F3220A-D461-4412-9F73-B74EB299DBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124067:*:*:*:*:*:*",
              "matchCriteriaId": "7442E3D2-83CC-4F75-89E3-64BAE5937722",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124069:*:*:*:*:*:*",
              "matchCriteriaId": "07B87F17-6AF0-4545-9527-154E0C6483C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124070:*:*:*:*:*:*",
              "matchCriteriaId": "B565B110-9A53-4BA1-BAB9-C6C16DEECD2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124071:*:*:*:*:*:*",
              "matchCriteriaId": "AA46F3B7-0650-4630-9005-1FAC1EC22EE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124072:*:*:*:*:*:*",
              "matchCriteriaId": "3A3F721D-209A-41B3-850F-6464E4D611D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124074:*:*:*:*:*:*",
              "matchCriteriaId": "8706C9CD-0D79-4661-B0C5-AB1813DE1F0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124075:*:*:*:*:*:*",
              "matchCriteriaId": "2BACB527-2F9E-4C6B-8C7B-696EAD5251FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124081:*:*:*:*:*:*",
              "matchCriteriaId": "CC9D8F85-EFB8-4D0E-BD8F-6DBE239559F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124082:*:*:*:*:*:*",
              "matchCriteriaId": "0297A0EA-43F2-4AD0-BC73-E6014F1F74BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124085:*:*:*:*:*:*",
              "matchCriteriaId": "CA5F1F18-247B-4081-8B53-E34B1512D47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124086:*:*:*:*:*:*",
              "matchCriteriaId": "2B8F85FF-78A7-4BF4-83C2-FC3ABFBC8715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124087:*:*:*:*:*:*",
              "matchCriteriaId": "1C1A1836-D054-4B96-890E-E837050D6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124089:*:*:*:*:*:*",
              "matchCriteriaId": "25CD5A10-84D3-4EE6-B2A3-2F7B2E7D7CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124095:*:*:*:*:*:*",
              "matchCriteriaId": "57245302-3114-408E-AE0B-8A2B0E1CC16E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124096:*:*:*:*:*:*",
              "matchCriteriaId": "570DF8F0-FEE0-48D2-B4B5-9A42AC710BEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124097:*:*:*:*:*:*",
              "matchCriteriaId": "D3A1D662-A800-4CD4-AA9C-A9A5806547AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124098:*:*:*:*:*:*",
              "matchCriteriaId": "597EFA52-C830-472F-966A-DE6E0CF5C013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124099:*:*:*:*:*:*",
              "matchCriteriaId": "6CD48702-4DA4-452C-8225-A37A57EF0B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124100:*:*:*:*:*:*",
              "matchCriteriaId": "05ED4A61-EECA-4B98-AACC-0203BE796885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124101:*:*:*:*:*:*",
              "matchCriteriaId": "C6E5D010-9928-4AD6-84DD-8B9DE39B220F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124102:*:*:*:*:*:*",
              "matchCriteriaId": "384D799A-4E16-494B-BA57-52245B25E718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124168:*:*:*:*:*:*",
              "matchCriteriaId": "3A48C69B-4AA3-445F-B8B4-608F372712FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124169:*:*:*:*:*:*",
              "matchCriteriaId": "84A6CE26-B08A-4EDF-8F00-EEBCDC326F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124175:*:*:*:*:*:*",
              "matchCriteriaId": "162FB7D6-19DF-4701-A969-496166ED1A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124176:*:*:*:*:*:*",
              "matchCriteriaId": "5623BBD0-4FED-4D66-8446-FB67824536F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124178:*:*:*:*:*:*",
              "matchCriteriaId": "7F459491-376E-46D2-A396-31E76FCD84AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124181:*:*:*:*:*:*",
              "matchCriteriaId": "B2B042D9-E237-46EB-ABAB-EADD34B454F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124182:*:*:*:*:*:*",
              "matchCriteriaId": "7F94D4CC-A8C9-4D8D-BBBE-1F4A33F8A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124183:*:*:*:*:*:*",
              "matchCriteriaId": "62313BC2-EC7E-4B8A-B0AD-29EBB7F68D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124189:*:*:*:*:*:*",
              "matchCriteriaId": "A435381D-0006-4768-901D-86D09A7696A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124190:*:*:*:*:*:*",
              "matchCriteriaId": "910F065E-6DD1-4551-B6B6-A89991E91FD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124191:*:*:*:*:*:*",
              "matchCriteriaId": "F57577CF-FC3E-48BE-9459-ACA39A29B4C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager Stable build anterior a 124196 y Released build anterior a 125125, permite a un atacante no autenticado leer archivos arbitrarios en el servidor mediante el env\u00edo de una petici\u00f3n dise\u00f1ada."
    }
  ],
  "id": "CVE-2020-12116",
  "lastModified": "2024-11-21T04:59:16.790",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-07T20:15:12.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-21 15:15
Modified
2024-11-21 04:32
Summary
Incorrect file permissions on the packaged Nipper executable file in Zoho ManageEngine OpManager 12.4.072 and Firewall Analyzer 12.4.072 allow local users to elevate privileges to root by overwriting this file with a malicious payload.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.4:124072:*:*:*:*:*:*",
              "matchCriteriaId": "6EF981EA-1C02-49C7-BA1B-0E4896B8F8AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124072:*:*:*:*:*:*",
              "matchCriteriaId": "3A3F721D-209A-41B3-850F-6464E4D611D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incorrect file permissions on the packaged Nipper executable file in Zoho ManageEngine OpManager 12.4.072 and Firewall Analyzer 12.4.072 allow local users to elevate privileges to root by overwriting this file with a malicious payload."
    },
    {
      "lang": "es",
      "value": "Los permisos de archivo incorrectos en el archivo ejecutable Nipper empaquetado en Zoho ManageEngine OpManager versi\u00f3n 12.4.072 y Firewall Analyzer versi\u00f3n 12.4.072, permiten a usuarios locales elevar los privilegios de root al sobrescribir este archivo con una carga maliciosa."
    }
  ],
  "id": "CVE-2019-17421",
  "lastModified": "2024-11-21T04:32:18.050",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-21T15:15:14.790",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://twitter.com/va_start"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://twitter.com/va_start"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-07-18 13:15
Modified
2024-11-21 07:11
Summary
ManageEngine Password Manager Pro 12100 and prior and OPManager 126100 and prior are vulnerable to unauthorized file and directory creation on a server machine.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_network_configuration_manager *
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_netflow_analyzer *
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_firewall_analyzer *
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
              "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
              "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
              "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
              "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
              "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
              "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
              "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*",
              "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*",
              "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*",
              "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*",
              "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*",
              "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*",
              "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*",
              "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*",
              "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*",
              "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*",
              "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*",
              "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*",
              "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*",
              "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*",
              "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*",
              "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*",
              "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*",
              "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*",
              "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*",
              "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*",
              "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*",
              "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*",
              "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*",
              "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*",
              "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*",
              "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*",
              "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*",
              "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*",
              "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*",
              "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*",
              "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*",
              "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*",
              "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*",
              "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*",
              "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*",
              "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*",
              "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*",
              "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*",
              "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125457:*:*:*:*:*:*",
              "matchCriteriaId": "BC457292-04FE-4643-8F1D-05DAEF3F70BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*",
              "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*",
              "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*",
              "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125476:*:*:*:*:*:*",
              "matchCriteriaId": "BE930B14-4B22-4299-8DE8-7625342FC4E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*",
              "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*",
              "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*",
              "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*",
              "matchCriteriaId": "7D394493-D690-44F0-B3F0-FD39E46F31C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "AF8CBF57-EF1A-4C84-879B-1A4035F4236A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*",
              "matchCriteriaId": "2F1E924E-8896-41CE-82E2-F22943A02FCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*",
              "matchCriteriaId": "FB058840-E3D0-45FA-B95F-3445A7719118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125589:*:*:*:*:*:*",
              "matchCriteriaId": "FD9B23C4-3458-4E6C-B1AB-D4A36BE8FFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125597:*:*:*:*:*:*",
              "matchCriteriaId": "D2A7AA89-7233-4624-894A-B2B996D1D270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125598:*:*:*:*:*:*",
              "matchCriteriaId": "B6B402ED-8B64-4FB0-B9E7-76E499A4115F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125599:*:*:*:*:*:*",
              "matchCriteriaId": "4E8B01F2-0A03-48CF-8BAE-556A9C3D88FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125601:*:*:*:*:*:*",
              "matchCriteriaId": "3C07E022-B75C-4491-8A30-9A1532D0472C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125603:*:*:*:*:*:*",
              "matchCriteriaId": "00E92DB5-8D53-4129-92D0-AD1DA0F1FEB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125604:*:*:*:*:*:*",
              "matchCriteriaId": "913CD99C-8F47-47BD-BD7C-33762861BB08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125605:*:*:*:*:*:*",
              "matchCriteriaId": "67B7F52E-7D7A-4AA9-9241-FFCC3DD49BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125611:*:*:*:*:*:*",
              "matchCriteriaId": "D02650C3-1A7F-4889-B6CB-11994054B5F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125612:*:*:*:*:*:*",
              "matchCriteriaId": "01FEA1CA-351B-4E2B-A78E-60338682F97F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125613:*:*:*:*:*:*",
              "matchCriteriaId": "04C9E097-FE04-42BD-96C8-2A3A9FD50B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125614:*:*:*:*:*:*",
              "matchCriteriaId": "94F895DB-C865-4AED-A1D9-CE69C0EF52FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "8B565B12-283F-4323-9C88-FD3CF5646DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125616:*:*:*:*:*:*",
              "matchCriteriaId": "9FDC3394-293E-44CF-A83F-FE047A4E4DE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125617:*:*:*:*:*:*",
              "matchCriteriaId": "01846F8F-D7D6-4CD9-B83E-41B70C691761",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125628:*:*:*:*:*:*",
              "matchCriteriaId": "CAE013FC-357D-42DA-B223-D40B3C813089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125629:*:*:*:*:*:*",
              "matchCriteriaId": "E4BA87E9-5E37-41EE-835C-13F68ABC9C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125630:*:*:*:*:*:*",
              "matchCriteriaId": "D2034E17-2DB9-4229-B7D4-D14761CEE699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125631:*:*:*:*:*:*",
              "matchCriteriaId": "39FBAFB9-5703-4EEA-BFF3-45B958E0805F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125632:*:*:*:*:*:*",
              "matchCriteriaId": "775D060A-773F-40BE-8FF3-6353EEA6A6BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125634:*:*:*:*:*:*",
              "matchCriteriaId": "D8326A48-9DDB-4502-B97F-ABCB151E2C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125635:*:*:*:*:*:*",
              "matchCriteriaId": "94ACC068-8260-4331-8B1C-E19B66D0738B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125638:*:*:*:*:*:*",
              "matchCriteriaId": "FE3C3B0A-BD28-4291-BD28-61A1EEB7AE17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125645:*:*:*:*:*:*",
              "matchCriteriaId": "E1303424-7BCA-4445-BDBC-B4B546E0ED05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125648:*:*:*:*:*:*",
              "matchCriteriaId": "EFFB585B-80EB-4EA3-BEC6-4E34FE952948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125649:*:*:*:*:*:*",
              "matchCriteriaId": "8D7B62B9-AAD9-4021-A806-21E61719E437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125651:*:*:*:*:*:*",
              "matchCriteriaId": "F1BF50D1-031E-4E39-9D15-FFC2CFB636D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125652:*:*:*:*:*:*",
              "matchCriteriaId": "F045D3C8-315C-42AB-B9D0-4B5267E70417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125653:*:*:*:*:*:*",
              "matchCriteriaId": "AC4FD2D6-9BA7-4889-96A2-DC946831469F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125654:*:*:*:*:*:*",
              "matchCriteriaId": "3D86914B-49B5-4002-A4C7-3712C87F7626",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "2C5ED401-A964-44D5-AB2F-C07D35BD96D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125657:*:*:*:*:*:*",
              "matchCriteriaId": "E424B820-3C4E-45C0-B74F-470E1E331127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "1C14D389-AA7A-4CD3-A0B5-EF052907FEE6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB0C7A9-5511-4AC9-B5E4-74AAE6973E34",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "D6268D81-10E3-4BD0-A593-3639B2745577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "BDA5DDA4-A67C-4370-B41D-02755FCF1F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "3D99CD97-1D6B-4C67-A909-E1CE28A78E10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "70FEC14F-A53C-437C-981A-214B867142E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125115:*:*:*:*:*:*",
              "matchCriteriaId": "895E57EA-A8F6-425B-9D08-654E03B92B30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "9EE0C771-B2F6-4766-82FD-203967CE37D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "0DCD6102-19F7-42D2-A81B-C85824CA351D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "3C2C0A08-66BF-4FDC-A209-769234438844",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "8DDC3649-12A9-41F3-A27D-646B5DF05E93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125129:*:*:*:*:*:*",
              "matchCriteriaId": "4F037A2A-4B9A-4EBC-94E2-87502960FF20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "B15E99A3-989F-4EFD-BA26-DEC6992BD1CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125142:*:*:*:*:*:*",
              "matchCriteriaId": "B85BF117-503B-435F-8667-481D9AC7A788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125149:*:*:*:*:*:*",
              "matchCriteriaId": "3AC2A038-F59B-4137-B02F-4C26E2EB9152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "F605C78F-8BE4-4E02-A7FB-CA9D24AFE7E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "15557A07-E0E9-40DB-B013-0F4AD9556BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125199:*:*:*:*:*:*",
              "matchCriteriaId": "79082C84-9F25-4A63-86AF-18CC4ADF71CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "A88678CE-DB64-4D66-8F2A-3C60058DC5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "88009BAC-1ECF-4BA3-855F-96C8789E476E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "E64F7B54-6B09-4B7E-B2AB-5EA73FD8E0AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "2B94DFD2-374C-47A9-9D54-3FDB63197FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "9B0330D9-1276-4228-BA7E-B9E3B828E5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "89736956-D05D-437B-BC7A-850AA459C123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125234:*:*:*:*:*:*",
              "matchCriteriaId": "63B26424-7292-4F37-B86F-2A4E0AD32B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "2D2629FB-0A83-43CC-8C83-444036D05F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125325:*:*:*:*:*:*",
              "matchCriteriaId": "4CFD99D1-CB43-437B-8E7D-6712DA5C9835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125327:*:*:*:*:*:*",
              "matchCriteriaId": "6FEBA58F-E5B4-4B91-B78F-620C6EB9D3BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "F9F9D406-FE99-45C0-B1C0-4DEB5E843FE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "F4B86974-C598-4E1A-9FF0-5AF9638C1AD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125345:*:*:*:*:*:*",
              "matchCriteriaId": "C2838623-6F3F-417A-A644-FA226CCD8BB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125358:*:*:*:*:*:*",
              "matchCriteriaId": "454EDD2A-E79A-4D46-B841-BE5EC12C63D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "1557A740-D19D-4220-9B3E-395EFCB86F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125363:*:*:*:*:*:*",
              "matchCriteriaId": "9C7DB404-A5C7-4EDB-BCB2-079A41E31428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125378:*:*:*:*:*:*",
              "matchCriteriaId": "B738952C-DE7B-4C3D-85B9-ADBEDF007AFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125392:*:*:*:*:*:*",
              "matchCriteriaId": "897D140C-20FF-454D-8928-B11FFC84C016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "18F93D7C-E8FC-4D4C-AEA0-C1187FB6D9D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125417:*:*:*:*:*:*",
              "matchCriteriaId": "2E799367-7DC7-478D-948A-17D717507DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125436:*:*:*:*:*:*",
              "matchCriteriaId": "F63F4324-8D54-43A9-8172-1BC6960146B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125445:*:*:*:*:*:*",
              "matchCriteriaId": "74A5591E-75A4-4ACA-9C34-4907D645AA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "7EE387F3-24C8-4933-A25E-D9C4026469D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125459:*:*:*:*:*:*",
              "matchCriteriaId": "0C67D5FC-5965-4AC1-80A5-931BE60B5E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125465:*:*:*:*:*:*",
              "matchCriteriaId": "139E25D9-A4C8-4041-ADF7-4618DFEEE8C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "6A65F3F7-45D3-49EB-9784-1F13FA2CBB0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125471:*:*:*:*:*:*",
              "matchCriteriaId": "3795D2DE-622F-4C82-B133-0993A01AC1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125475:*:*:*:*:*:*",
              "matchCriteriaId": "C0DB9896-BC25-46E3-AA6F-496A442BE525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "CE56A949-74AC-4138-8AD3-31F5763860EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "4A3DB867-FD46-46EB-AEF0-2B6E79371AF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "7881FBB4-AC09-4EB9-B02F-3EA19237E095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "F391E432-98B8-4D97-8AD4-FB1A84FAF774",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125490:*:*:*:*:*:*",
              "matchCriteriaId": "61D908B2-446E-48EC-9F6B-91E8BF0F6A38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125565:*:*:*:*:*:*",
              "matchCriteriaId": "FD5F28B0-580E-4CD4-917A-496D35AD271A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "F0FC96AA-F2F4-4C35-8BF7-6318A2F624A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125583:*:*:*:*:*:*",
              "matchCriteriaId": "6EA008F1-4E47-4753-8506-769B29AB5BA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125584:*:*:*:*:*:*",
              "matchCriteriaId": "7ED68CDE-1096-4490-8E6B-78F4AC2BB729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125598:*:*:*:*:*:*",
              "matchCriteriaId": "34F8D9B7-3BD7-44C0-A292-162928729F36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125612:*:*:*:*:*:*",
              "matchCriteriaId": "7446678C-E2DB-4EA2-BC9B-430C8EC7804B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "33C57314-5503-48BD-9ED2-D76517C9C0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125617:*:*:*:*:*:*",
              "matchCriteriaId": "AC201C68-2C1D-4E75-9443-C5F853A37AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125646:*:*:*:*:*:*",
              "matchCriteriaId": "FBC08E48-51FA-497F-B5EB-349081888402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125650:*:*:*:*:*:*",
              "matchCriteriaId": "FD78483C-8AC8-46B3-A1FB-2DA04468BCEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "D1DBA938-81D2-4CF8-B1F2-B71C4B82835D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "88C4DF20-F8A7-4673-9639-42522C6BB3C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "340D8561-6110-49D8-BCDC-78A762FCD3E6",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "6280B6AB-C233-480A-95E6-E03D58AA7B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "C61E9B3D-A39D-428E-A82F-5C4C225906C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "423D3372-F910-4006-9FE8-49A6B730AEBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125109:*:*:*:*:*:*",
              "matchCriteriaId": "02B0ED3C-4729-4C70-8F06-6B507ED75BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125115:*:*:*:*:*:*",
              "matchCriteriaId": "3CE0B4B2-CC4C-4F0F-B97E-A90C84377989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "DC2E4C62-9867-4D14-85B3-95F359BD0551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "356A4F91-FA5B-4A09-841E-A380F580BA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125129:*:*:*:*:*:*",
              "matchCriteriaId": "CBBDC611-498B-4175-9A88-5914ED6D3A9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125141:*:*:*:*:*:*",
              "matchCriteriaId": "10F3C9AD-9C1B-4FBD-8325-B56FCF96FFE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125149:*:*:*:*:*:*",
              "matchCriteriaId": "F4EE5C24-C4AE-4F9D-B808-8930102A1389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125160:*:*:*:*:*:*",
              "matchCriteriaId": "E0F45A48-5006-4748-B683-6C7CB469286A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125179:*:*:*:*:*:*",
              "matchCriteriaId": "9796C62A-8FCA-4E1E-855E-7D67F77C9AD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "1A1AC2FD-91BA-4B78-BB14-B9F2CEB09071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125200:*:*:*:*:*:*",
              "matchCriteriaId": "A4B99FDC-EC68-4006-B359-E845AEF72FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "240A8575-F963-4DB4-B9C6-BE584A2F8271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "B97F1BEE-F3C0-4DDD-B767-23C4BE9054AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125217:*:*:*:*:*:*",
              "matchCriteriaId": "3B3482FA-9483-4EC7-9B09-E1BB63F02790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "2600FBC5-8358-4126-88F2-00F3BEE9B537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "FDD47CB0-3680-4ED9-821C-B673EACB953D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "D27B76C3-B8C8-48A6-AEF3-E9145B57EDA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125357:*:*:*:*:*:*",
              "matchCriteriaId": "6D77C576-035E-403B-A2B3-992496FAD202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "70608921-F02A-4121-BE90-919DD68DD0D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "93C50660-6ECF-4353-A15A-4F7B0F06D33A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "06D8864A-E6CC-4742-A2CF-B060E8DFA740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125393:*:*:*:*:*:*",
              "matchCriteriaId": "D2572B3B-3BC4-4A83-92D5-8D7579821F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "0DD78F90-5231-4848-8971-9AB5ABBD2C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125412:*:*:*:*:*:*",
              "matchCriteriaId": "7C94C142-168F-421C-B00B-3F42AA1CC9D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125429:*:*:*:*:*:*",
              "matchCriteriaId": "77CE4835-6540-4CF6-A31C-255DA52BB073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125447:*:*:*:*:*:*",
              "matchCriteriaId": "E0544AE8-92B3-43A7-8F42-299AED1A40CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125459:*:*:*:*:*:*",
              "matchCriteriaId": "A05AFF4D-4EF9-4939-81CC-0AB55DA596F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125464:*:*:*:*:*:*",
              "matchCriteriaId": "86C3E31F-87E2-459F-8D1B-C6D1A237960D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "A3E7FC26-0000-4D4B-B489-DF0E2CD2B13C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125471:*:*:*:*:*:*",
              "matchCriteriaId": "0DE52003-E959-420F-89A1-C86D8FB12DBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125476:*:*:*:*:*:*",
              "matchCriteriaId": "6E9C9051-7FDE-4DEE-85DC-0798524DC17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "5BE3598F-CEB4-4553-BB50-AA778BBF8BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "4C71852D-D529-469A-9111-6D4DB8381BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125484:*:*:*:*:*:*",
              "matchCriteriaId": "EC3F7DA9-3FBF-4D67-8BA5-2643E706F64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "53E2DF01-9A39-4E50-BEDE-D49988CE5CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "0015664D-11BC-4DEE-BC5B-DB3D1FE8DF82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125490:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F887-4574-4B3C-A8A7-57F75B27447F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125557:*:*:*:*:*:*",
              "matchCriteriaId": "C1E93E4D-0E54-41DF-843A-E8AE94EAD0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125566:*:*:*:*:*:*",
              "matchCriteriaId": "1617ADAD-2E13-4910-B600-3EC7E59B087C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125582:*:*:*:*:*:*",
              "matchCriteriaId": "5F982932-5513-411A-9CBF-3082C7ECEF0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125585:*:*:*:*:*:*",
              "matchCriteriaId": "8232CBA1-55DA-4F3C-A9E5-A204A25231C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "A30281F3-4DE2-4ED3-91A7-AE7A091C31E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125647:*:*:*:*:*:*",
              "matchCriteriaId": "F76B196B-B5F8-4E84-9BBE-9D45A2FB2A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125656:*:*:*:*:*:*",
              "matchCriteriaId": "F267C53D-6F27-4DFF-BB3C-7B299E07F487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "574117B3-2785-4971-ABBE-55C08010E16B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9FF3515-61C7-4A7A-9781-6D4A0340B2EC",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "52CC9C40-3F01-424F-84FB-C9CC20427D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "77AA96FD-5AF0-4F80-8402-BAB460FF8B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125003:*:*:*:*:*:*",
              "matchCriteriaId": "3095B4D1-170A-48B0-8C4A-7A7A54E42149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8CE4267C-DAAE-4CEC-A6E3-D2213AA5EE57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125109:*:*:*:*:*:*",
              "matchCriteriaId": "92EB7DC6-F227-40B3-A093-4D9495BBE272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125115:*:*:*:*:*:*",
              "matchCriteriaId": "40C478D3-7C1C-4FCE-99FA-976EE2754680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "DE6C88E4-D382-4729-AF5D-5697DCE26A67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125122:*:*:*:*:*:*",
              "matchCriteriaId": "6447F4D8-0943-4C8C-BBA7-42BECC181D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "422B8CB6-3A14-4452-9192-F4CD5BF5D030",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125141:*:*:*:*:*:*",
              "matchCriteriaId": "41AB6C1A-CBEC-4DC1-94A4-9D14E82BA542",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125142:*:*:*:*:*:*",
              "matchCriteriaId": "6A2C060F-770B-4245-8490-5D2EB970FCA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125149:*:*:*:*:*:*",
              "matchCriteriaId": "16E635CC-1591-4535-89EA-B8470BD885F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125150:*:*:*:*:*:*",
              "matchCriteriaId": "D5F9E623-A42D-446D-ADDD-5F3C8F7BD9B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125160:*:*:*:*:*:*",
              "matchCriteriaId": "1E235AF0-4453-4439-A25D-FF78A89BB117",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125179:*:*:*:*:*:*",
              "matchCriteriaId": "620E40E9-9D83-4E14-8898-10C0718B1A1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "1D72F651-BD8C-4564-AC1A-84A91F21EADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "19DD9FF2-583B-4079-9375-E1643FF9A54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125200:*:*:*:*:*:*",
              "matchCriteriaId": "69EDC39C-68EE-488D-B740-9E45229BDF2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "EC374820-208A-40EF-965C-50C19467BD82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "397B1FAC-EB6E-4F17-B5D7-CBD47D581DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125217:*:*:*:*:*:*",
              "matchCriteriaId": "E771BCA5-9E65-4C8B-BF36-E90F641D2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125221:*:*:*:*:*:*",
              "matchCriteriaId": "A658460A-FAE0-4487-8CD6-FB3384664F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "6F104D17-7D08-42A5-BAF3-DEA475308FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "9F875BFA-18C2-42BF-8BC4-D02E15B395E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "3BBD9D22-7E92-4648-972E-E17D9472E08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125357:*:*:*:*:*:*",
              "matchCriteriaId": "7219F9A0-CD1D-4BB4-A5E1-FA0495B49114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125361:*:*:*:*:*:*",
              "matchCriteriaId": "0CBB0F67-9C81-44BC-9836-DE5FE40DDBBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "6D7C0250-52DA-423D-B061-0CDF39D15068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "6FC34D3F-FED3-4266-AB29-98FFC2002507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "DD1460AC-A719-4B75-B28B-748B6C262A87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "B9024FE1-536C-4180-8115-6D97E7C324D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125410:*:*:*:*:*:*",
              "matchCriteriaId": "8CD6EB21-3DC6-47A7-939A-AA3C8EFE278F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125429:*:*:*:*:*:*",
              "matchCriteriaId": "3A5911F7-7A45-499D-B345-D9C082932BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125447:*:*:*:*:*:*",
              "matchCriteriaId": "CBBD7A90-4F97-4DFD-B8E6-F24A9B72A1C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125459:*:*:*:*:*:*",
              "matchCriteriaId": "87C6DCE0-5F40-4F50-8538-29CFF2DCC9EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125464:*:*:*:*:*:*",
              "matchCriteriaId": "BECA9FA7-887B-4ECC-AA23-F75F96E42CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "CFD6D448-337E-4A63-8BE2-4DFC50AE7413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125475:*:*:*:*:*:*",
              "matchCriteriaId": "33F2625D-0750-4ED1-8BA7-8141D8B7FB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6DD58-62F3-4727-9AC1-E6B5EA71BB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "33991587-174F-48D9-821D-BF44CF24924D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125484:*:*:*:*:*:*",
              "matchCriteriaId": "18B8D15F-0286-4D64-96F8-D213E241813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "EB8483C1-6586-4936-8BF8-ECE3F0F4D5F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "A9318551-C41F-46E9-A196-5C01EAE276F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125490:*:*:*:*:*:*",
              "matchCriteriaId": "5030E129-0401-457B-B4FB-974AD5A0A948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125557:*:*:*:*:*:*",
              "matchCriteriaId": "74DAFF5A-7090-427F-A69E-2E90456485C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "8EB26A23-108E-4F39-84E3-2F1C197C8CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125582:*:*:*:*:*:*",
              "matchCriteriaId": "DF57D557-B1B9-4B2E-81A5-B23C1A8521E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125605:*:*:*:*:*:*",
              "matchCriteriaId": "E37E20B2-B678-45C1-9EF9-7D65172B485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "17CC4F0C-E69E-4FA5-8119-D71AD9C13E63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125621:*:*:*:*:*:*",
              "matchCriteriaId": "B8DA03F6-8EF8-48E1-B4CF-A2B0CB6F1DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125647:*:*:*:*:*:*",
              "matchCriteriaId": "CA595DC9-C13C-4545-985E-DC1D611147E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125648:*:*:*:*:*:*",
              "matchCriteriaId": "48F8E2D7-67A6-42EA-85DD-DD6488D267BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "EF7CDF11-A00E-47B6-B8E3-512998134656",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ManageEngine Password Manager Pro 12100 and prior and OPManager 126100 and prior are vulnerable to unauthorized file and directory creation on a server machine."
    },
    {
      "lang": "es",
      "value": "ManageEngine Password Manager Pro versiones 12100 y anteriores y OPManager versiones 126100 y anteriores son vulnerables a una creaci\u00f3n no autorizada de archivos y directorios en un equipo servidor"
    }
  ],
  "id": "CVE-2022-35404",
  "lastModified": "2024-11-21T07:11:06.367",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-18T13:15:10.510",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://manageengine.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://manageengine.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-20 19:29
Modified
2024-11-21 03:56
Summary
Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 11.4
zohocorp manageengine_opmanager 11.5
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
              "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
              "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
              "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
              "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
              "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
              "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
              "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
              "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
              "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
              "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
              "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
              "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
              "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
              "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
              "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
              "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
              "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
              "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
              "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
              "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
              "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
              "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
              "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
              "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
              "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
              "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
              "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
              "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
              "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
              "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
              "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
              "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
              "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
              "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
              "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
              "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
              "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
              "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
              "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
              "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
              "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
              "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
              "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
              "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
              "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
              "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
              "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
              "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
              "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
              "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
              "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
              "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
              "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
              "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
              "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
              "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
              "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
              "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
              "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
              "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
              "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
              "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
              "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
              "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
              "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
              "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
              "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
              "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
              "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
              "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
              "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
              "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
              "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
              "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
              "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
              "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
              "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
              "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
              "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
              "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
              "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
              "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
              "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
              "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
              "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
              "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
              "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
              "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
              "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
              "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
              "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
              "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
              "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
              "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
              "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
              "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
              "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
              "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
              "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
              "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
              "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
              "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
              "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
              "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
              "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
              "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
              "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
              "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
              "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
              "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
              "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
              "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
              "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
              "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
              "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
              "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
              "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
              "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
              "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
              "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
              "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
              "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
              "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
              "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
              "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
              "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
              "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
              "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
              "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
              "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
              "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
              "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
              "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
              "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
              "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
              "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
              "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
              "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
              "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*",
              "matchCriteriaId": "CBF58EC7-2DDA-4EC0-8406-F3B711B62974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*",
              "matchCriteriaId": "CD036146-E374-4571-9302-9978CD892805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*",
              "matchCriteriaId": "7112E33A-C694-432D-8880-BB2211EBA5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*",
              "matchCriteriaId": "932A2D27-CC0E-4F33-AD0C-4876984F1F26",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager 12.3 antes de la build 123219 tiene una vulnerabilidad Self Cross-Site Scripting (XSS)."
    }
  ],
  "id": "CVE-2018-18716",
  "lastModified": "2024-11-21T03:56:26.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-20T19:29:01.150",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Nov/6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2018/Oct/61"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Nov/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2018/Oct/61"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-20 19:29
Modified
2024-11-21 03:56
Summary
Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3
zohocorp manageengine_opmanager 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
              "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
              "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
              "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
              "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
              "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
              "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
              "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
              "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
              "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
              "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
              "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
              "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
              "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
              "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
              "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
              "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
              "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
              "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
              "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
              "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
              "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
              "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
              "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
              "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
              "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
              "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
              "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
              "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
              "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
              "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
              "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
              "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
              "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
              "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
              "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
              "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
              "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
              "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
              "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
              "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
              "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
              "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
              "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
              "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
              "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
              "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
              "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
              "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
              "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
              "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
              "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
              "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
              "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
              "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
              "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
              "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
              "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
              "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
              "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
              "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
              "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
              "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
              "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
              "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
              "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
              "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
              "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
              "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
              "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
              "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
              "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
              "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
              "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
              "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
              "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
              "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
              "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
              "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
              "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
              "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
              "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
              "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
              "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
              "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
              "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
              "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
              "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
              "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
              "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
              "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
              "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
              "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
              "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
              "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
              "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
              "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
              "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
              "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
              "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
              "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
              "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
              "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
              "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
              "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
              "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
              "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
              "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
              "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
              "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
              "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
              "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
              "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
              "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
              "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
              "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
              "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
              "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
              "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
              "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
              "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
              "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
              "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
              "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
              "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
              "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
              "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
              "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
              "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
              "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
              "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
              "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
              "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
              "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
              "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
              "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
              "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
              "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
              "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
              "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
              "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
              "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*",
              "matchCriteriaId": "CBF58EC7-2DDA-4EC0-8406-F3B711B62974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*",
              "matchCriteriaId": "CD036146-E374-4571-9302-9978CD892805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*",
              "matchCriteriaId": "7112E33A-C694-432D-8880-BB2211EBA5F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*",
              "matchCriteriaId": "932A2D27-CC0E-4F33-AD0C-4876984F1F26",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager 12.3 antes de la build 123219 tiene Cross-Site Scripting (XSS) persistente."
    }
  ],
  "id": "CVE-2018-18715",
  "lastModified": "2024-11-21T03:56:26.097",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-20T19:29:01.073",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Nov/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2018/Oct/60"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2018/Nov/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2018/Oct/60"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-09-21 03:29
Modified
2024-11-21 03:54
Summary
Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A479DB39-D6A7-4D36-8AE4-76CF1E74D6F4",
              "versionEndExcluding": "12.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager en versiones anteriores a la 12.3 Build 123196 no requiere autenticaci\u00f3n para las peticiones /oputilsServlet, tal y como queda demostrado con una petici\u00f3n /oputilsServlet?action=getAPIKey que puede aprovecharse contra Firewall Analyzer para a\u00f1adir un usuario administrador mediante /api/json/v2/admin/addUser o llevar a cabo un ataque de inyecci\u00f3n SQL mediante el par\u00e1metro name en /api/json/device/setManaged."
    }
  ],
  "id": "CVE-2018-17283",
  "lastModified": "2024-11-21T03:54:10.620",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-09-21T03:29:00.407",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/x-f1v3/ForCve/issues/4"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/x-f1v3/ForCve/issues/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-05-23 18:29
Modified
2024-11-21 03:08
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. The 'apiKey' parameter of "/api/json/admin/getmailserversettings" and "/api/json/dashboard/gotoverviewlist" is vulnerable to a Blind SQL Injection attack.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF7ED07-3132-4670-831B-CCD6F34E5C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. The \u0027apiKey\u0027 parameter of \"/api/json/admin/getmailserversettings\" and \"/api/json/dashboard/gotoverviewlist\" is vulnerable to a Blind SQL Injection attack."
    },
    {
      "lang": "es",
      "value": "Fue encontrado un problema en ZOHO ManageEngine OpManager 12.2. El par\u00e1metro \u0027apiKey\u0027 de \"/ api / json / admin / getmailserversettings\" y \"/ api / json / dashboard / gotoverviewviewlist\" es vulnerable a un ataque de Inyecci\u00f3n de tipo Blind SQL."
    }
  ],
  "id": "CVE-2017-11559",
  "lastModified": "2024-11-21T03:08:01.127",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-23T18:29:00.560",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://manageengine.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "http://opmanager.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://manageengine.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "http://opmanager.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-03-13 06:15
Modified
2024-11-21 04:55
Severity ?
Summary
Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5220E2-844B-4B64-A9AD-05114BEAF70D",
              "versionEndExcluding": "12.4.179",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108."
    },
    {
      "lang": "es",
      "value": "Zoho ManageEngine OpManager versiones anteriores a 12.4.179, permite una ejecuci\u00f3n  de c\u00f3digo remota por medio de una petici\u00f3n especialmente dise\u00f1ada de la API Mail Server Settings v1. Esto fue corregido en la versi\u00f3n 12.5.108."
    }
  ],
  "id": "CVE-2020-10541",
  "lastModified": "2024-11-21T04:55:32.783",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-03-13T06:15:11.190",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-15 21:15
Modified
2025-02-13 18:16
Summary
An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
Impacted products
Vendor Product Version
zohocorp manageengine_analytics_plus *
zohocorp manageengine_appcreator *
zohocorp manageengine_application_control_plus *
zohocorp manageengine_browser_security_plus *
zohocorp manageengine_device_control_plus *
zohocorp manageengine_endpoint_central *
zohocorp manageengine_endpoint_central_msp *
zohocorp manageengine_endpoint_dlp_plus *
zohocorp manageengine_mobile_device_manager_plus *
zohocorp manageengine_mobile_device_manager_plus 10.1.2207.4
zohocorp manageengine_os_deployer *
zohocorp manageengine_patch_manager_plus *
zohocorp manageengine_remote_access_plus *
zohocorp manageengine_remote_monitoring_and_management *
zohocorp manageengine_vulnerability_manager_plus *
zohocorp manageengine_adselfservice_plus *
zohocorp manageengine_adselfservice_plus 6.3
zohocorp manageengine_adselfservice_plus 6.3
zohocorp manageengine_adselfservice_plus 6.3
zohocorp manageengine_adselfservice_plus 6.3
zohocorp manageengine_admanager_plus *
zohocorp manageengine_admanager_plus 7.2
zohocorp manageengine_admanager_plus 7.2
zohocorp manageengine_admanager_plus 7.2
zohocorp manageengine_admanager_plus 7.2
zohocorp manageengine_adaudit_plus *
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_adaudit_plus 7.2
zohocorp manageengine_cloud_security_plus *
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_cloud_security_plus 4.1
zohocorp manageengine_datasecurity_plus *
zohocorp manageengine_datasecurity_plus 6.1
zohocorp manageengine_datasecurity_plus 6.1
zohocorp manageengine_datasecurity_plus 6.1
zohocorp manageengine_datasecurity_plus 6.1
zohocorp manageengine_datasecurity_plus 6.1
zohocorp manageengine_datasecurity_plus 6.1
zohocorp manageengine_datasecurity_plus 6.1
zohocorp manageengine_exchange_reporter_plus *
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_exchange_reporter_plus 5.7
zohocorp manageengine_m365_manager_plus *
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_manager_plus 4.5
zohocorp manageengine_m365_security_plus *
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_m365_security_plus 4.5
zohocorp manageengine_sharepoint_manager_plus *
zohocorp manageengine_sharepoint_manager_plus 4.4
zohocorp manageengine_sharepoint_manager_plus 4.4
zohocorp manageengine_sharepoint_manager_plus 4.4
zohocorp manageengine_sharepoint_manager_plus 4.4
zohocorp manageengine_sharepoint_manager_plus 4.4
zohocorp manageengine_recoverymanager_plus *
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_recoverymanager_plus 6.0
zohocorp manageengine_log360_ueba *
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_log360_ueba 4.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_patch_connect_plus 9.0.0
zohocorp manageengine_secure_gateway_server *
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_secure_gateway_server 9.0
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
microsoft windows -
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
linux linux_kernel -
zohocorp manageengine_oputils *
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
zohocorp manageengine_oputils 12.5
microsoft windows -
zohocorp manageengine_oputils *
zohocorp manageengine_oputils 12.7
zohocorp manageengine_oputils 12.7
zohocorp manageengine_oputils 12.7
zohocorp manageengine_oputils 12.7
zohocorp manageengine_oputils 12.7
linux linux_kernel -
zohocorp manageengine_firewall_analyzer *
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
zohocorp manageengine_firewall_analyzer 12.5
microsoft windows -
zohocorp manageengine_firewall_analyzer *
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
linux linux_kernel -
zohocorp manageengine_netflow_analyzer *
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
zohocorp manageengine_netflow_analyzer 12.5
microsoft windows -
zohocorp manageengine_netflow_analyzer *
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
linux linux_kernel -
zohocorp manageengine_network_configuration_manager *
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
zohocorp manageengine_network_configuration_manager 12.5
microsoft windows -
zohocorp manageengine_network_configuration_manager *
zohocorp manageengine_network_configuration_manager 12.7
zohocorp manageengine_network_configuration_manager 12.7
zohocorp manageengine_network_configuration_manager 12.7
zohocorp manageengine_network_configuration_manager 12.7
linux linux_kernel -
zohocorp manageengine_servicedesk_plus *
zohocorp manageengine_servicedesk_plus 14.3
zohocorp manageengine_servicedesk_plus 14.3
zohocorp manageengine_servicedesk_plus 14.3
zohocorp manageengine_servicedesk_plus 14.3
zohocorp manageengine_assetexplorer *
zohocorp manageengine_assetexplorer 7.0
zohocorp manageengine_assetexplorer 7.0
zohocorp manageengine_assetexplorer 7.0
zohocorp manageengine_assetexplorer 7.0
zohocorp manageengine_assetexplorer 7.0
zohocorp manageengine_servicedesk_plus_msp *
zohocorp manageengine_servicedesk_plus_msp 14.3
zohocorp manageengine_servicedesk_plus_msp 14.3
zohocorp manageengine_servicedesk_plus_msp 14.3
zohocorp manageengine_servicedesk_plus_msp 14.3
zohocorp manageengine_servicedesk_plus_msp 14.3
zohocorp manageengine_access_manager_plus *
zohocorp manageengine_access_manager_plus 4.3
zohocorp manageengine_access_manager_plus 4.3
zohocorp manageengine_access_manager_plus 4.3
zohocorp manageengine_access_manager_plus 4.3
zohocorp manageengine_access_manager_plus 4.3
zohocorp manageengine_access_manager_plus 4.3
zohocorp manageengine_access_manager_plus 4.3
zohocorp manageengine_access_manager_plus 4.3
zohocorp manageengine_access_manager_plus 4.3
zohocorp manageengine_access_manager_plus 4.3
zohocorp manageengine_supportcenter_plus *
zohocorp manageengine_supportcenter_plus 14.3
zohocorp manageengine_supportcenter_plus 14.3
zohocorp manageengine_supportcenter_plus 14.3
zohocorp manageengine_supportcenter_plus 14.3
zohocorp manageengine_pam360 *
zohocorp manageengine_password_manager_pro *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_analytics_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "725AEAF1-8E3C-4D33-B65D-C8304506A131",
              "versionEndExcluding": "5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_appcreator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A753D74-F09F-4C42-A7C2-4D3A280FCACC",
              "versionEndExcluding": "2.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_application_control_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AEDFE0E-9C9A-4DF6-9918-B5BD4DC67624",
              "versionEndExcluding": "11.2.2328.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_browser_security_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "21C65599-8166-4066-BF0F-5C3CC55F544A",
              "versionEndExcluding": "11.2.2328.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_device_control_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CB1749-097D-4F9F-94DB-F35E72A42034",
              "versionEndExcluding": "11.2.2328.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_endpoint_central:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06579974-7085-42B3-9F9F-A733A1CA37D9",
              "versionEndExcluding": "11.2.2322.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_endpoint_central_msp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F551AC16-6CBA-4460-A05D-D083967BDF07",
              "versionEndExcluding": "11.2.2322.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_endpoint_dlp_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFE96B83-9684-4955-81C5-AD5B5BC817DF",
              "versionEndExcluding": "11.2.2328.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC58FEB-B8E4-4B1C-AE55-F4577D7BF505",
              "versionEndExcluding": "10.1.2204.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:10.1.2207.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5B65D12-7DAE-4815-993C-7C5903E990DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_os_deployer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C070B9E-FE09-4CFE-B489-DC9CED210CF1",
              "versionEndExcluding": "1.2.2331.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_manager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9C6675-2DDB-4FD6-8FA6-B3EE56F87F69",
              "versionEndExcluding": "11.2.2328.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_remote_access_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA4B79F8-4D04-4EA4-8754-355DB6CA71B8",
              "versionEndExcluding": "11.2.2328.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_remote_monitoring_and_management:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA39630-6CE1-46E3-AF49-67DB09308C5D",
              "versionEndExcluding": "10.2.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_vulnerability_manager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4D89B41-A239-4329-9BEA-6D52EE8644D8",
              "versionEndExcluding": "11.2.2328.01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD7707C-0FE5-475D-8FB2-CDB19363421A",
              "versionEndExcluding": "6.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6300:*:*:*:*:*:*",
              "matchCriteriaId": "F0C93DB0-3029-4D49-B180-6EFAEC4B712B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6301:*:*:*:*:*:*",
              "matchCriteriaId": "F69BFD56-BA90-426C-9EF1-4BD925657BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6302:*:*:*:*:*:*",
              "matchCriteriaId": "1171C259-086C-42CA-BE56-5B410677F72C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6303:*:*:*:*:*:*",
              "matchCriteriaId": "827B0C20-903F-48A5-8918-81F39202C21F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7927FC8C-ED61-4E24-AF57-2D5C0E06AB2A",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7200:*:*:*:*:*:*",
              "matchCriteriaId": "1AE608DF-E02C-4A63-AD3E-7E3C1B921C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7201:*:*:*:*:*:*",
              "matchCriteriaId": "72C14C6D-5C72-4A39-A8FF-93CD89C831C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7202:*:*:*:*:*:*",
              "matchCriteriaId": "D47DA377-0AF4-453E-9605-A5F87FA14E61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7203:*:*:*:*:*:*",
              "matchCriteriaId": "BC919233-CE66-416C-8649-B94A23F131F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E802FD77-E67A-438C-82CE-9FC7536FB14E",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7200:*:*:*:*:*:*",
              "matchCriteriaId": "0FAF63F4-AED2-4EA4-BA5B-45961B2E29B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7201:*:*:*:*:*:*",
              "matchCriteriaId": "237AA2F5-B9A3-4C40-92AC-61FE47A017BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7202:*:*:*:*:*:*",
              "matchCriteriaId": "4C23A64C-65CB-447B-9B5F-4BB22F68FC79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7203:*:*:*:*:*:*",
              "matchCriteriaId": "3489D84B-5960-4FA7-A2DD-88AE35C34CE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7210:*:*:*:*:*:*",
              "matchCriteriaId": "D86AB1CC-0FDE-4CC1-BF64-E0C61EAF652F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7211:*:*:*:*:*:*",
              "matchCriteriaId": "076FDAE7-9DB2-4A04-B09E-E53858D208C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7212:*:*:*:*:*:*",
              "matchCriteriaId": "07C08B57-FA76-4E24-BC10-B837597BC7E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7213:*:*:*:*:*:*",
              "matchCriteriaId": "0D734ACB-33E8-4315-8A79-2B97CE1D0509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7215:*:*:*:*:*:*",
              "matchCriteriaId": "9314CA98-7A69-4D2B-9928-40F55888C9FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7220:*:*:*:*:*:*",
              "matchCriteriaId": "BCE7999C-D6AE-4406-A563-A520A171381D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7250:*:*:*:*:*:*",
              "matchCriteriaId": "D5716895-4553-4613-B774-0964D3E88AA0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5618AEE3-0F6A-47CC-9783-DF9B5C8AC12F",
              "versionEndExcluding": "4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4100:*:*:*:*:*:*",
              "matchCriteriaId": "BFD452AD-7053-4C13-97DA-326C3DC6E26C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4101:*:*:*:*:*:*",
              "matchCriteriaId": "0B87956F-9C45-4A65-BEB2-77A247BD7A39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4102:*:*:*:*:*:*",
              "matchCriteriaId": "17BE6347-1605-47DB-8CFE-B587E3AB4223",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4103:*:*:*:*:*:*",
              "matchCriteriaId": "C47F9F56-B1DE-426B-B5CF-A1BB5973D6E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4104:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7C5C6-0137-4279-A7EA-3439BE477A3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4105:*:*:*:*:*:*",
              "matchCriteriaId": "C921F1B2-69B4-448F-AC7C-2F4474507FAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4106:*:*:*:*:*:*",
              "matchCriteriaId": "91DB9017-1BCF-48DB-97AE-4214150BAE77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4107:*:*:*:*:*:*",
              "matchCriteriaId": "D066B999-8554-49F0-92C3-1A4DDEA6E32D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4108:*:*:*:*:*:*",
              "matchCriteriaId": "635F80E1-4A73-48DC-A128-D61716D70839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4109:*:*:*:*:*:*",
              "matchCriteriaId": "E74FE1C4-471A-4040-96A4-0BE46745199B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4110:*:*:*:*:*:*",
              "matchCriteriaId": "C31E2485-2F3A-4BC1-92CC-F7DCB464B5D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4111:*:*:*:*:*:*",
              "matchCriteriaId": "99C928C2-4711-4765-BDF2-E7FB448F5771",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4112:*:*:*:*:*:*",
              "matchCriteriaId": "EDF77387-21C7-45CA-B843-EBA956EE2BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4113:*:*:*:*:*:*",
              "matchCriteriaId": "5C2C0067-538B-4102-8B4E-603BD4CE8F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4115:*:*:*:*:*:*",
              "matchCriteriaId": "DAF47C10-AAE9-40CF-A033-44D54A81E69F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4116:*:*:*:*:*:*",
              "matchCriteriaId": "36D0331C-58EA-4B68-88C4-7A193BE5C62E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4117:*:*:*:*:*:*",
              "matchCriteriaId": "3CA59781-E48C-487E-B3AF-96560F3152EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4118:*:*:*:*:*:*",
              "matchCriteriaId": "E4812B9E-15CA-4700-9115-EAE0A97F0E3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4119:*:*:*:*:*:*",
              "matchCriteriaId": "CE513A2B-0371-4D3C-A502-CDA3DB474F3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4120:*:*:*:*:*:*",
              "matchCriteriaId": "5E498ACE-8332-4824-9AFE-73975D0AC9EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4121:*:*:*:*:*:*",
              "matchCriteriaId": "F070B928-CF57-4502-BE26-AD3F13A6ED4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4122:*:*:*:*:*:*",
              "matchCriteriaId": "635D24F2-9C60-4E1A-BD5F-E5312FA953A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4130:*:*:*:*:*:*",
              "matchCriteriaId": "5E983854-36F8-407F-95C8-E386E0F82366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4131:*:*:*:*:*:*",
              "matchCriteriaId": "29BFE206-CAB1-41CA-B5A5-E8CB67BCCA4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4140:*:*:*:*:*:*",
              "matchCriteriaId": "7820751F-E181-4BB7-8DAF-BF21129B24D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4141:*:*:*:*:*:*",
              "matchCriteriaId": "14ADB666-EEB9-4C6D-93F4-5A45EBA55705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4150:*:*:*:*:*:*",
              "matchCriteriaId": "93C4B398-8F9A-44AC-8E43-C4C471DE9565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4160:*:*:*:*:*:*",
              "matchCriteriaId": "47FD0E59-3D75-4CF5-81A6-20C3B7FDE962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4161:*:*:*:*:*:*",
              "matchCriteriaId": "C7EF76FE-3FD9-4548-A372-22E280484ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4162:*:*:*:*:*:*",
              "matchCriteriaId": "0F95BCBE-399F-4CCC-A17B-C0C3A03A99AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "93C3ECBE-AE6A-4E5B-822B-2F905AA806DB",
              "versionEndExcluding": "6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6100:*:*:*:*:*:*",
              "matchCriteriaId": "DFEB1B4D-A7B2-464A-BEA7-5754D3BE1F50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6101:*:*:*:*:*:*",
              "matchCriteriaId": "C12C9470-3D3B-426E-93F9-79D8B9B25F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6110:*:*:*:*:*:*",
              "matchCriteriaId": "227F1242-E0A9-45C5-9198-FD8D01F68ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6111:*:*:*:*:*:*",
              "matchCriteriaId": "2FE57085-2085-4F62-9900-7B8DFC558418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6120:*:*:*:*:*:*",
              "matchCriteriaId": "CAB7FA92-DC12-4E8A-91CC-3C98ED74E47B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6121:*:*:*:*:*:*",
              "matchCriteriaId": "D04530C2-E4D0-4717-95DB-B7C224348502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6125:*:*:*:*:*:*",
              "matchCriteriaId": "9BBD018F-C1FD-4A0F-A145-253D86185F6E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DA0580F-8167-450E-A1E9-0F1F7FC7E2C9",
              "versionEndExcluding": "5.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5700:*:*:*:*:*:*",
              "matchCriteriaId": "E913F3D6-9F94-4130-94FF-37F4D81BAEF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5701:*:*:*:*:*:*",
              "matchCriteriaId": "34D23B58-2BB8-40EE-952C-1595988335CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5702:*:*:*:*:*:*",
              "matchCriteriaId": "322920C4-4487-4E44-9C40-2959F478A4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5703:*:*:*:*:*:*",
              "matchCriteriaId": "3AD735B9-2CE2-46BA-9A14-A22E3FE21C6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5704:*:*:*:*:*:*",
              "matchCriteriaId": "014DB85C-DB28-4EBB-971A-6F8F964CE6FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5705:*:*:*:*:*:*",
              "matchCriteriaId": "5E9B0013-ABF8-4616-BC92-15DF9F5CB359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5706:*:*:*:*:*:*",
              "matchCriteriaId": "5B744F32-FD43-47B8-875C-6777177677CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5707:*:*:*:*:*:*",
              "matchCriteriaId": "F1BB6EEA-2BAA-4C48-8DA8-1E87B3DE611F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5708:*:*:*:*:*:*",
              "matchCriteriaId": "D3012C17-87F5-4FFD-B67B-BEFF2A390613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5709:*:*:*:*:*:*",
              "matchCriteriaId": "1E33D368-2D81-4C7E-9405-7C0A86E97217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5710:*:*:*:*:*:*",
              "matchCriteriaId": "7AA9384F-6401-4495-B558-23E5A7A7528C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5711:*:*:*:*:*:*",
              "matchCriteriaId": "E492F955-0734-4AE4-A59F-572ADF0CFE75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5712:*:*:*:*:*:*",
              "matchCriteriaId": "11B71FFC-FD2E-4F84-BB1E-55BCA5B51099",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9BB59DF-8786-4DC0-9254-F88417CA7077",
              "versionEndExcluding": "4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4500:*:*:*:*:*:*",
              "matchCriteriaId": "6BA1E99E-789C-4FDD-AA89-4C5391B95320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4502:*:*:*:*:*:*",
              "matchCriteriaId": "7EA6EC34-6702-4D1A-8C63-5026416E01A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4503:*:*:*:*:*:*",
              "matchCriteriaId": "0720F912-A070-43E9-BD23-4FAD00026DCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4504:*:*:*:*:*:*",
              "matchCriteriaId": "161C81D2-7281-4F89-9944-1B468B06C264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4505:*:*:*:*:*:*",
              "matchCriteriaId": "718EEA01-B792-4B7E-946F-863F846E8132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4507:*:*:*:*:*:*",
              "matchCriteriaId": "DB72E7C9-FAC6-43E8-AC2A-5A7CBEAB919E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4508:*:*:*:*:*:*",
              "matchCriteriaId": "47BBC46A-16C7-4E9B-A49A-8101F3039D0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4509:*:*:*:*:*:*",
              "matchCriteriaId": "D989FB08-624D-406B-8F53-A387900940F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4510:*:*:*:*:*:*",
              "matchCriteriaId": "8ADB6CFE-1915-488C-93FE-96E8DF3655F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4511:*:*:*:*:*:*",
              "matchCriteriaId": "EDCCB442-D0E4-47C7-A558-36657A70B3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4512:*:*:*:*:*:*",
              "matchCriteriaId": "8794F807-1D50-44D4-8969-FD68EFF2F643",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4513:*:*:*:*:*:*",
              "matchCriteriaId": "AFA2B4BA-1FBF-4C2E-872E-AD14084D1D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4514:*:*:*:*:*:*",
              "matchCriteriaId": "6976DCDA-E27A-4367-8EFE-74DC6F63018F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4516:*:*:*:*:*:*",
              "matchCriteriaId": "101908A5-CAEF-44F8-A6C8-FE01CA9FA836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4517:*:*:*:*:*:*",
              "matchCriteriaId": "F957BE56-474A-4593-8710-F86DB13C7407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4518:*:*:*:*:*:*",
              "matchCriteriaId": "B8479442-1A4A-4F27-9778-664C7693C815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4519:*:*:*:*:*:*",
              "matchCriteriaId": "EEF00ADC-105F-4B7E-857B-17565D67C7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4520:*:*:*:*:*:*",
              "matchCriteriaId": "CA292949-6E99-49A5-94F7-23448494F5C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4523:*:*:*:*:*:*",
              "matchCriteriaId": "863CBE20-60A5-4A08-BF16-4E40E88B9AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4525:*:*:*:*:*:*",
              "matchCriteriaId": "28A105B4-7BF0-4054-AAE7-8453E13E2B63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4527:*:*:*:*:*:*",
              "matchCriteriaId": "94C78301-44B7-45B2-836E-15E45FAC8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4528:*:*:*:*:*:*",
              "matchCriteriaId": "F408067C-13C1-40BE-8488-9EB7FF0EDF9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4529:*:*:*:*:*:*",
              "matchCriteriaId": "A83FBC34-E024-47DA-AD8A-BF569F1F7EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4531:*:*:*:*:*:*",
              "matchCriteriaId": "DC06E46F-441E-445B-A780-702B170901DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4532:*:*:*:*:*:*",
              "matchCriteriaId": "A8A98287-DB5D-44A3-B835-54BACFC12944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4533:*:*:*:*:*:*",
              "matchCriteriaId": "53F32DE7-F211-4BEF-99C1-CE38EFDBCCC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4535:*:*:*:*:*:*",
              "matchCriteriaId": "91C3EE55-B71B-432C-A68E-BB126A715375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4536:*:*:*:*:*:*",
              "matchCriteriaId": "FD48F21A-2D38-4EB8-B190-58CF176C1EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4537:*:*:*:*:*:*",
              "matchCriteriaId": "76346162-0BF0-4B21-82D2-2548A989396A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4538:*:*:*:*:*:*",
              "matchCriteriaId": "5313C4EF-A960-4BCA-AA97-EDC88402A175",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4282B6D-6C85-4F13-B789-E641FB5986FE",
              "versionEndExcluding": "4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4500:*:*:*:*:*:*",
              "matchCriteriaId": "A160274C-F07A-43D9-A4DB-8773F004B9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4502:*:*:*:*:*:*",
              "matchCriteriaId": "341DF953-3DC7-476E-A79D-8CBD011C52A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4503:*:*:*:*:*:*",
              "matchCriteriaId": "AB6582AC-03DB-4905-BD03-EEDC314EB289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4504:*:*:*:*:*:*",
              "matchCriteriaId": "2C3F1FDE-41F7-4541-B0F7-00DB7994ACB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4505:*:*:*:*:*:*",
              "matchCriteriaId": "92ADF3D2-0051-46E9-BF7A-7D429ABEC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4507:*:*:*:*:*:*",
              "matchCriteriaId": "1592B321-1D60-418D-9CD8-61AEA57D8D90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4508:*:*:*:*:*:*",
              "matchCriteriaId": "E582FA9F-A043-4193-961D-A49159F1C921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4509:*:*:*:*:*:*",
              "matchCriteriaId": "F3A22F3D-C45F-4FD5-8EEC-3BF2EDA807A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4510:*:*:*:*:*:*",
              "matchCriteriaId": "28EAB920-2F01-483E-9492-97DBFBD7535F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4511:*:*:*:*:*:*",
              "matchCriteriaId": "92F1D0A8-8761-4876-92C1-EE9F6BF61C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4512:*:*:*:*:*:*",
              "matchCriteriaId": "37976BE2-4233-46F7-B6BB-EFA778442AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4513:*:*:*:*:*:*",
              "matchCriteriaId": "A0FF0731-4694-427A-8C9A-EBA7AEF6F1D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4514:*:*:*:*:*:*",
              "matchCriteriaId": "C069FF04-4061-4560-BA55-1784312047A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4516:*:*:*:*:*:*",
              "matchCriteriaId": "0D428FA6-08BA-4F7E-B1C7-4AFD17919899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4517:*:*:*:*:*:*",
              "matchCriteriaId": "C7AB124C-63E2-4CC2-B5C9-E7141E23D56C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4518:*:*:*:*:*:*",
              "matchCriteriaId": "0E2D49D5-6F95-42F5-8EF0-DAD47C51D141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4519:*:*:*:*:*:*",
              "matchCriteriaId": "EF9477F5-C6FD-4589-917B-FD206371DB33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4520:*:*:*:*:*:*",
              "matchCriteriaId": "B51D61F5-7198-4B33-8AFD-A78E34F6B1AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4523:*:*:*:*:*:*",
              "matchCriteriaId": "8CB27467-3157-466A-B01C-461348BD95C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4525:*:*:*:*:*:*",
              "matchCriteriaId": "2D575B4D-D58A-4B92-9723-4AB54E29924A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4527:*:*:*:*:*:*",
              "matchCriteriaId": "E76BB070-9BC9-4712-B021-156871C3B06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4528:*:*:*:*:*:*",
              "matchCriteriaId": "52D35850-9BE1-479A-B0AF-339E42BCA708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4529:*:*:*:*:*:*",
              "matchCriteriaId": "681A77B6-7E22-4132-803B-A0AD117CE7C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4531:*:*:*:*:*:*",
              "matchCriteriaId": "EF72A1BF-EE5D-4F43-B463-7E51285D4D5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4532:*:*:*:*:*:*",
              "matchCriteriaId": "2FDD429A-E938-483A-BCCF-50A2AD4096CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4533:*:*:*:*:*:*",
              "matchCriteriaId": "162D604A-7F0E-44CF-9E48-D8B54F8F3509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4535:*:*:*:*:*:*",
              "matchCriteriaId": "AD38FA0F-B94F-4731-A652-07702EE0B808",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4536:*:*:*:*:*:*",
              "matchCriteriaId": "F2C3767E-A56B-4580-AF8C-9BF5852EE414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4537:*:*:*:*:*:*",
              "matchCriteriaId": "5434E8CB-8DD0-4245-AF61-CF3A69BD0C3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4538:*:*:*:*:*:*",
              "matchCriteriaId": "C2403DA1-FBF8-495E-B996-4060F6BE6EE9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C9A012-AD39-45B2-BA3F-8D7180FC5390",
              "versionEndExcluding": "4.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4400:*:*:*:*:*:*",
              "matchCriteriaId": "7C5E7CE6-F85E-49B2-9078-F661AA3723C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4401:*:*:*:*:*:*",
              "matchCriteriaId": "1194B4C2-FBF2-4015-B666-235897971DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4402:*:*:*:*:*:*",
              "matchCriteriaId": "4F5F0CA5-CEC3-4342-A7D1-3616C482B965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4403:*:*:*:*:*:*",
              "matchCriteriaId": "B7B8A2F3-5F46-40B2-A4E7-118341443C53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4404:*:*:*:*:*:*",
              "matchCriteriaId": "767BF16D-8CD8-4E8A-9A3B-CB11EB48FB9D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "658DC76D-E0FE-40FA-B966-6DA6ED531FCD",
              "versionEndExcluding": "6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6001:*:*:*:*:*:*",
              "matchCriteriaId": "948993BE-7B9E-4CCB-A97F-28B46DFE52A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6003:*:*:*:*:*:*",
              "matchCriteriaId": "9F8D6CDF-1BD5-4457-94AA-CFCC351F55A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6005:*:*:*:*:*:*",
              "matchCriteriaId": "E54CE38D-C9CA-4CC1-B3BC-83F593A576D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6011:*:*:*:*:*:*",
              "matchCriteriaId": "4C8B3F77-7886-4F80-B75A-59063C762307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6016:*:*:*:*:*:*",
              "matchCriteriaId": "ADCB6ADF-5B04-4682-B541-4BC8BB5762DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6017:*:*:*:*:*:*",
              "matchCriteriaId": "A708628C-31E8-4A52-AEF7-297E2DDFA0C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6020:*:*:*:*:*:*",
              "matchCriteriaId": "A8A01385-A493-42C0-ABBE-6A30C8594F8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6025:*:*:*:*:*:*",
              "matchCriteriaId": "E7A6CA95-9572-4FCA-ADD2-A5F4D8C2216B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6026:*:*:*:*:*:*",
              "matchCriteriaId": "B6865936-A773-4353-8891-8269508B2180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6030:*:*:*:*:*:*",
              "matchCriteriaId": "9CAD778E-8FDB-4CE2-A593-75EEA75F6361",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6031:*:*:*:*:*:*",
              "matchCriteriaId": "52A9BA64-A248-4490-BDA7-671D64C0B3CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6032:*:*:*:*:*:*",
              "matchCriteriaId": "DFF0A7E8-888B-4CBE-B799-16557244DDF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6041:*:*:*:*:*:*",
              "matchCriteriaId": "8B480202-7632-4CFA-A485-DDFF1D1DB757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6042:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B0721-49FD-49E7-97E4-E4E3EBF64856",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6043:*:*:*:*:*:*",
              "matchCriteriaId": "874F5DDD-EA8D-4C1E-824A-321C52959649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6044:*:*:*:*:*:*",
              "matchCriteriaId": "8CAA4713-DA95-46AC-AFA5-9D22F8819B06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6047:*:*:*:*:*:*",
              "matchCriteriaId": "C9D4BB2E-D0D0-4058-88C9-3E73A793A85B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6049:*:*:*:*:*:*",
              "matchCriteriaId": "832AAAAF-5C34-4DDF-96A4-080002F9BC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6050:*:*:*:*:*:*",
              "matchCriteriaId": "29ED63C4-FB06-41AC-ABCD-63B3233658A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6051:*:*:*:*:*:*",
              "matchCriteriaId": "6EEA1BA5-F6A7-4BE0-8E77-993FB9E5CC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6053:*:*:*:*:*:*",
              "matchCriteriaId": "2C21AC8A-8358-46BE-A0C6-7CDEF1E73904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6054:*:*:*:*:*:*",
              "matchCriteriaId": "51400F37-6310-44A3-A683-068DF64D20F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6056:*:*:*:*:*:*",
              "matchCriteriaId": "F3F43DBF-CD65-47D0-8CEE-D5EE8337188B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6057:*:*:*:*:*:*",
              "matchCriteriaId": "78CB8751-856A-41AC-904A-70FA1E15A946",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6058:*:*:*:*:*:*",
              "matchCriteriaId": "72B7E27E-1443-46DC-8389-FBD337E612F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6060:*:*:*:*:*:*",
              "matchCriteriaId": "F9BB1077-C1F5-4368-9930-8E7424E7EB98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6061:*:*:*:*:*:*",
              "matchCriteriaId": "EE307CE4-574D-4FF7-BED6-5BBECF886578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6062:*:*:*:*:*:*",
              "matchCriteriaId": "49E40C74-7077-4366-82A7-52B454725B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6070:*:*:*:*:*:*",
              "matchCriteriaId": "038D7936-C837-4E49-89BC-D11DF2C875D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6071:*:*:*:*:*:*",
              "matchCriteriaId": "D1DC87E8-3053-4823-BFDB-46BAF3FCEFF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6072:*:*:*:*:*:*",
              "matchCriteriaId": "E384B5D8-CF9A-4C6D-AB4A-5B1A66768ADB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC606E6A-3523-41D5-94C9-A62E8630A687",
              "versionEndExcluding": "4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4010:*:*:*:*:*:*",
              "matchCriteriaId": "7001A0A7-159C-48A3-9800-DAFBA31D05BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4011:*:*:*:*:*:*",
              "matchCriteriaId": "583B46D4-529F-404F-9CF3-4D7526889682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4015:*:*:*:*:*:*",
              "matchCriteriaId": "0D89C2A2-CE20-4954-8821-C73F9E3EC767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4016:*:*:*:*:*:*",
              "matchCriteriaId": "A6B8B05F-0ECD-41C1-9FFD-0ADCF4046D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4020:*:*:*:*:*:*",
              "matchCriteriaId": "233874F0-A19F-447C-ACE2-5DD06829C920",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4021:*:*:*:*:*:*",
              "matchCriteriaId": "C4447E47-C6DB-440D-AF35-8130687E9BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4023:*:*:*:*:*:*",
              "matchCriteriaId": "405ECB05-7E35-4927-A19A-92A4B7FE8B1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4024:*:*:*:*:*:*",
              "matchCriteriaId": "9F1EC2A5-7498-40F9-91A4-B004AEA1136C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4025:*:*:*:*:*:*",
              "matchCriteriaId": "CEBB1CED-7B88-4E4B-89E8-E0E2B882E34C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4026:*:*:*:*:*:*",
              "matchCriteriaId": "DD3B14B6-8329-43C4-AE42-13279E77275E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4027:*:*:*:*:*:*",
              "matchCriteriaId": "7792B448-4D34-42F8-919C-344783D625E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4028:*:*:*:*:*:*",
              "matchCriteriaId": "E297C040-0523-4A50-97AB-349880D5B3A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4030:*:*:*:*:*:*",
              "matchCriteriaId": "F86FEB8D-8A75-4C92-947D-CA7EDF8E0F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4031:*:*:*:*:*:*",
              "matchCriteriaId": "A238ED1B-6C11-44C9-BDBF-8A724AB7FE1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4034:*:*:*:*:*:*",
              "matchCriteriaId": "8ADCADB6-9764-4CA8-AB54-BCE6D0363E69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4035:*:*:*:*:*:*",
              "matchCriteriaId": "6E0C9493-EB87-4197-AF8B-BCA25488BCDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4036:*:*:*:*:*:*",
              "matchCriteriaId": "E4FD31D3-69EB-4699-B31B-C18A0EA9D9C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4040:*:*:*:*:*:*",
              "matchCriteriaId": "FBD7855F-4B66-4F43-960C-73E69C52E865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4043:*:*:*:*:*:*",
              "matchCriteriaId": "0C9C8B4D-CFFE-4CB4-8F11-FC778462CB10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4045:*:*:*:*:*:*",
              "matchCriteriaId": "36A68C2E-978A-4F82-AC61-E9E7CA9908A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4046:*:*:*:*:*:*",
              "matchCriteriaId": "6C8D7EA7-7CC3-48B0-B966-71A69FDE6A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4047:*:*:*:*:*:*",
              "matchCriteriaId": "05D804B6-5990-42A7-A072-8F904A5262E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4048:*:*:*:*:*:*",
              "matchCriteriaId": "0C720653-317E-4B1C-AFA8-90FAE97430C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90001:*:*:*:*:*:*",
              "matchCriteriaId": "A9C350FA-E483-4C06-A784-5679ED0471BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90063:*:*:*:*:*:*",
              "matchCriteriaId": "15A47AA7-8B49-41EC-AB57-5706989DF756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90064:*:*:*:*:*:*",
              "matchCriteriaId": "D1CCB7C8-86B9-4DA8-93D0-F96B81C82F32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90065:*:*:*:*:*:*",
              "matchCriteriaId": "397140D3-2424-42D9-9900-625EC4E95D22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90066:*:*:*:*:*:*",
              "matchCriteriaId": "BA8C9A27-572E-407F-826A-1206394044D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90067:*:*:*:*:*:*",
              "matchCriteriaId": "7601CC24-FC2D-4805-A975-2D307DECDF2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90068:*:*:*:*:*:*",
              "matchCriteriaId": "A513B136-7DC5-48DD-BDCB-1620A14849B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90069:*:*:*:*:*:*",
              "matchCriteriaId": "0858CFDE-7D76-4A63-BE21-A73310AD17BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90070:*:*:*:*:*:*",
              "matchCriteriaId": "1BD8F9F8-89EB-422E-A4B1-E715AFD72341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90071:*:*:*:*:*:*",
              "matchCriteriaId": "E0271D12-94E8-4345-9666-4A47A5AAB824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90072:*:*:*:*:*:*",
              "matchCriteriaId": "513337E6-D805-461B-812F-D6EEA0921883",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90073:*:*:*:*:*:*",
              "matchCriteriaId": "8EB5C610-33AC-486C-AF48-4A889D429420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90074:*:*:*:*:*:*",
              "matchCriteriaId": "81FC1ED5-99FF-4C30-BCE0-5CDC7A5E4C03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90075:*:*:*:*:*:*",
              "matchCriteriaId": "EA473C80-4100-4170-9601-8C9EEB5F64CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90076:*:*:*:*:*:*",
              "matchCriteriaId": "5D2C41A7-1602-43CD-9E6D-A0178931C020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90077:*:*:*:*:*:*",
              "matchCriteriaId": "238E3508-0230-441E-8114-6EEB79E22632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90078:*:*:*:*:*:*",
              "matchCriteriaId": "2C85C7DB-BC46-4D0A-8353-C2DB51BFFD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90079:*:*:*:*:*:*",
              "matchCriteriaId": "0BAAFCD6-5945-46BE-9380-5C2F79060B8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90080:*:*:*:*:*:*",
              "matchCriteriaId": "B6E108C0-075A-493D-B8AE-343D81BEC9C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90081:*:*:*:*:*:*",
              "matchCriteriaId": "CA614153-4E29-45AB-BBC2-9BA0CDAD4B8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90082:*:*:*:*:*:*",
              "matchCriteriaId": "F95B1920-005C-494C-A9A9-C72502E45723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90083:*:*:*:*:*:*",
              "matchCriteriaId": "DA3C51B7-B8A0-42F4-ADC9-C949B610EE2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90084:*:*:*:*:*:*",
              "matchCriteriaId": "180D4816-E5D0-406B-B289-4B1984250B50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90085:*:*:*:*:*:*",
              "matchCriteriaId": "57883D51-1188-4C14-B2EF-26FD4B156526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90086:*:*:*:*:*:*",
              "matchCriteriaId": "D5A59B7E-74CF-425F-B814-313D5F1F7670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90087:*:*:*:*:*:*",
              "matchCriteriaId": "327F6B11-9176-4791-96D0-FAD8EBE9D5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90088:*:*:*:*:*:*",
              "matchCriteriaId": "5E057023-0175-4DB5-98A4-942FB81AF59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90089:*:*:*:*:*:*",
              "matchCriteriaId": "28E12A60-CEB6-46BD-A4E8-48651A651E5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90090:*:*:*:*:*:*",
              "matchCriteriaId": "25FA111C-01EA-49CA-BF67-A8C8C9A6E415",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90091:*:*:*:*:*:*",
              "matchCriteriaId": "855DD295-DB63-4AF1-8C5A-0904BF049658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90092:*:*:*:*:*:*",
              "matchCriteriaId": "CDFE095C-C659-44BE-9740-C8B712165912",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90093:*:*:*:*:*:*",
              "matchCriteriaId": "FFB28D66-83BF-4685-9015-0B30021C59C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90094:*:*:*:*:*:*",
              "matchCriteriaId": "9B82AA92-96B6-4841-BAC0-AA1487CBEB7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90095:*:*:*:*:*:*",
              "matchCriteriaId": "81A65567-42E6-416B-8FB0-2571FDF60207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90096:*:*:*:*:*:*",
              "matchCriteriaId": "2193F4C6-5679-487B-82B8-C55A874ED5A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90097:*:*:*:*:*:*",
              "matchCriteriaId": "124CB5EC-44C1-4136-B495-053F2299E59C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90098:*:*:*:*:*:*",
              "matchCriteriaId": "A183735E-12AF-4692-A228-FE3B1169ABBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90099:*:*:*:*:*:*",
              "matchCriteriaId": "3C1C57BB-73A7-4B48-B99C-A18E1CE55553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90100:*:*:*:*:*:*",
              "matchCriteriaId": "020F4E45-45D2-4F1A-BAF8-8C61F45F5770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90101:*:*:*:*:*:*",
              "matchCriteriaId": "039F68D9-A36A-44BE-A457-790ECCB20FD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90102:*:*:*:*:*:*",
              "matchCriteriaId": "23BDB028-FCCE-4A9D-887B-6A6F8166CFCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90103:*:*:*:*:*:*",
              "matchCriteriaId": "5210BAA8-2ECC-49AA-8408-815433DC28D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90104:*:*:*:*:*:*",
              "matchCriteriaId": "C8DC19CC-3F95-4753-8037-FB627D1D6167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90105:*:*:*:*:*:*",
              "matchCriteriaId": "93F07AFE-4E9A-4001-A17A-606A7B5E83F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90106:*:*:*:*:*:*",
              "matchCriteriaId": "06B25C38-DE86-4F3E-918E-BC70FCC0054B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90107:*:*:*:*:*:*",
              "matchCriteriaId": "E3F2E0E6-01D2-418D-872E-B117259E990F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90108:*:*:*:*:*:*",
              "matchCriteriaId": "41D80E46-35FE-45E5-96D6-28691C0847DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90109:*:*:*:*:*:*",
              "matchCriteriaId": "4D7768DA-1111-4557-A0D6-D3A74AC7FA54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90110:*:*:*:*:*:*",
              "matchCriteriaId": "B3001463-3729-4216-B420-602A11C74244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90111:*:*:*:*:*:*",
              "matchCriteriaId": "9A68EC19-3A57-41C4-90FA-CB1BF20EB8DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90112:*:*:*:*:*:*",
              "matchCriteriaId": "193913B2-25D1-4779-B7E6-ACC5992AFC97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90113:*:*:*:*:*:*",
              "matchCriteriaId": "E7AA77AA-E00E-4125-A698-12B30434F632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90114:*:*:*:*:*:*",
              "matchCriteriaId": "229FBCFC-2810-44D1-9687-A7C060F6F9D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90115:*:*:*:*:*:*",
              "matchCriteriaId": "99C3BBC2-F1D3-4873-A8FB-1B79A2163F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90116:*:*:*:*:*:*",
              "matchCriteriaId": "4A06EF86-915C-4D09-965B-3A9D4DFC96B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90117:*:*:*:*:*:*",
              "matchCriteriaId": "3D67F80D-E999-4E46-8386-8122DC17DBCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90118:*:*:*:*:*:*",
              "matchCriteriaId": "2593B38A-1281-41C9-B065-E6EFDF6BD71C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90119:*:*:*:*:*:*",
              "matchCriteriaId": "B61541E8-5818-475B-9E54-C45C71C14A9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90120:*:*:*:*:*:*",
              "matchCriteriaId": "84DE1BA0-8C36-44DF-91A0-96EA6EF736D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90121:*:*:*:*:*:*",
              "matchCriteriaId": "BB2F2DEA-5E03-442E-A46B-B6C218BF3273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90122:*:*:*:*:*:*",
              "matchCriteriaId": "CCEFA415-47D7-4DA2-B541-DD0B67AF30A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90123:*:*:*:*:*:*",
              "matchCriteriaId": "B147B06A-969E-4541-A863-DF4045D39527",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20C46B3-C23E-42AF-BA81-117B8541171B",
              "versionEndExcluding": "9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90012:*:*:*:*:*:*",
              "matchCriteriaId": "A897E8C8-6058-4BEC-BF00-3E8614238E0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90013:*:*:*:*:*:*",
              "matchCriteriaId": "8B39A3B3-5B9E-4B31-9CE2-3625EA9C9AD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90014:*:*:*:*:*:*",
              "matchCriteriaId": "FBF5AF44-E30B-4948-B0E2-42EE062DC3A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90015:*:*:*:*:*:*",
              "matchCriteriaId": "356F078A-9887-423A-8BA7-74201DE109F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90016:*:*:*:*:*:*",
              "matchCriteriaId": "9B8887A3-14C6-4DFB-9EBF-35966B4E6158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90017:*:*:*:*:*:*",
              "matchCriteriaId": "3A0FE6B3-E037-45F4-A907-51CD99E7B8DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90018:*:*:*:*:*:*",
              "matchCriteriaId": "250CFA85-89C5-4F75-AF0F-BEA9C816E54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90019:*:*:*:*:*:*",
              "matchCriteriaId": "85B8B8F4-951D-446C-A8F8-EEBDC385D83E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90020:*:*:*:*:*:*",
              "matchCriteriaId": "288C8246-7367-4D10-A0D4-5426B7EA17A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90021:*:*:*:*:*:*",
              "matchCriteriaId": "59326535-A08E-4588-BAB8-9DF094FB61F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90022:*:*:*:*:*:*",
              "matchCriteriaId": "077B9DBD-190C-4F20-BD3A-64D6887B7930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90030:*:*:*:*:*:*",
              "matchCriteriaId": "0587320F-C57E-41F7-B31F-1EA52ED234B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90031:*:*:*:*:*:*",
              "matchCriteriaId": "0911BEEC-A6E4-440C-8217-A7FAAC1D3972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90032:*:*:*:*:*:*",
              "matchCriteriaId": "A9D9805F-4F6B-4A15-A444-3B6538BCDDB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90033:*:*:*:*:*:*",
              "matchCriteriaId": "48901205-BDE9-4CBA-9E3B-779D949CBF58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90034:*:*:*:*:*:*",
              "matchCriteriaId": "69539391-6C6A-498A-B952-D4F12C2FEC4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90035:*:*:*:*:*:*",
              "matchCriteriaId": "4A36B8AA-987B-4112-8B67-5BC306F9CF86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90036:*:*:*:*:*:*",
              "matchCriteriaId": "96E9422A-CA9D-4BC8-90DB-3E3A1966E94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90041:*:*:*:*:*:*",
              "matchCriteriaId": "11A2E17D-3B33-4531-B78B-156BC2C7E53A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90042:*:*:*:*:*:*",
              "matchCriteriaId": "4C34129B-5A15-4BE9-BB15-66101A5EAB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90043:*:*:*:*:*:*",
              "matchCriteriaId": "DA9A87D7-0707-4321-B5D2-2B4CBC66E838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90044:*:*:*:*:*:*",
              "matchCriteriaId": "C2C06D73-9BEA-4604-BE73-3CE8A2DDD52A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90056:*:*:*:*:*:*",
              "matchCriteriaId": "DAA7B941-6FE6-45CA-931D-6414DFEA9B50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90057:*:*:*:*:*:*",
              "matchCriteriaId": "F7EEEF6C-DD29-4E6F-BED7-AE10184C2F9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90058:*:*:*:*:*:*",
              "matchCriteriaId": "D36AD9EC-82D0-451B-ADD4-1EEC0FDC389B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90072:*:*:*:*:*:*",
              "matchCriteriaId": "F68164FC-9A09-4145-97B8-99EE5532E6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90074:*:*:*:*:*:*",
              "matchCriteriaId": "2FB5646D-11C7-4878-9471-4F6D483CE979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90075:*:*:*:*:*:*",
              "matchCriteriaId": "BBC0A0C3-C33E-46E9-A099-A5A66F576138",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90076:*:*:*:*:*:*",
              "matchCriteriaId": "76584957-0388-4421-8336-75EE90D00349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90077:*:*:*:*:*:*",
              "matchCriteriaId": "05C542D5-7E3A-46E2-8CB6-A13159EFA4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90078:*:*:*:*:*:*",
              "matchCriteriaId": "7E7BF415-29D3-4BD0-8613-317D7EC7C992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90079:*:*:*:*:*:*",
              "matchCriteriaId": "7F046602-4595-48C8-83F5-A43FD501003F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90080:*:*:*:*:*:*",
              "matchCriteriaId": "FC5B464F-D327-4181-A911-2E3683B914B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90081:*:*:*:*:*:*",
              "matchCriteriaId": "025D8F22-968F-44B6-83E1-13DAB7A514A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90082:*:*:*:*:*:*",
              "matchCriteriaId": "F9F60549-59CE-47D0-BF2A-91B84A0B1984",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90083:*:*:*:*:*:*",
              "matchCriteriaId": "6F982139-0EDC-411C-A074-A29963DCA328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90084:*:*:*:*:*:*",
              "matchCriteriaId": "FBED4ED7-E991-48D0-AE27-71F9DEA5EDA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90085:*:*:*:*:*:*",
              "matchCriteriaId": "8C6BE721-D851-406E-9AAF-01F9A9E15ADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90086:*:*:*:*:*:*",
              "matchCriteriaId": "F1D6E935-53D3-462D-9DD8-91BFEC90BB2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90087:*:*:*:*:*:*",
              "matchCriteriaId": "E580F0AB-B840-4293-8639-4B7DD7981EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90088:*:*:*:*:*:*",
              "matchCriteriaId": "2CC8FE34-A5C9-4EF7-AA05-BEE403AB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90090:*:*:*:*:*:*",
              "matchCriteriaId": "A80444F6-755F-4FE3-96B3-744A842D40AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
              "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
              "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
              "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
              "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
              "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
              "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
              "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*",
              "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*",
              "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*",
              "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*",
              "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*",
              "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*",
              "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*",
              "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*",
              "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*",
              "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*",
              "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*",
              "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*",
              "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*",
              "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*",
              "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*",
              "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*",
              "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*",
              "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*",
              "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*",
              "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*",
              "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*",
              "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*",
              "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*",
              "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*",
              "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*",
              "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*",
              "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*",
              "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*",
              "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*",
              "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*",
              "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*",
              "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*",
              "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*",
              "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*",
              "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*",
              "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*",
              "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*",
              "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*",
              "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125457:*:*:*:*:*:*",
              "matchCriteriaId": "BC457292-04FE-4643-8F1D-05DAEF3F70BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*",
              "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*",
              "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*",
              "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125476:*:*:*:*:*:*",
              "matchCriteriaId": "BE930B14-4B22-4299-8DE8-7625342FC4E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*",
              "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*",
              "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*",
              "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*",
              "matchCriteriaId": "7D394493-D690-44F0-B3F0-FD39E46F31C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "AF8CBF57-EF1A-4C84-879B-1A4035F4236A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*",
              "matchCriteriaId": "2F1E924E-8896-41CE-82E2-F22943A02FCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*",
              "matchCriteriaId": "FB058840-E3D0-45FA-B95F-3445A7719118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125589:*:*:*:*:*:*",
              "matchCriteriaId": "FD9B23C4-3458-4E6C-B1AB-D4A36BE8FFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125597:*:*:*:*:*:*",
              "matchCriteriaId": "D2A7AA89-7233-4624-894A-B2B996D1D270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125598:*:*:*:*:*:*",
              "matchCriteriaId": "B6B402ED-8B64-4FB0-B9E7-76E499A4115F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125599:*:*:*:*:*:*",
              "matchCriteriaId": "4E8B01F2-0A03-48CF-8BAE-556A9C3D88FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125601:*:*:*:*:*:*",
              "matchCriteriaId": "3C07E022-B75C-4491-8A30-9A1532D0472C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125603:*:*:*:*:*:*",
              "matchCriteriaId": "00E92DB5-8D53-4129-92D0-AD1DA0F1FEB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125604:*:*:*:*:*:*",
              "matchCriteriaId": "913CD99C-8F47-47BD-BD7C-33762861BB08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125605:*:*:*:*:*:*",
              "matchCriteriaId": "67B7F52E-7D7A-4AA9-9241-FFCC3DD49BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125611:*:*:*:*:*:*",
              "matchCriteriaId": "D02650C3-1A7F-4889-B6CB-11994054B5F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125612:*:*:*:*:*:*",
              "matchCriteriaId": "01FEA1CA-351B-4E2B-A78E-60338682F97F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125613:*:*:*:*:*:*",
              "matchCriteriaId": "04C9E097-FE04-42BD-96C8-2A3A9FD50B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125614:*:*:*:*:*:*",
              "matchCriteriaId": "94F895DB-C865-4AED-A1D9-CE69C0EF52FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "8B565B12-283F-4323-9C88-FD3CF5646DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125616:*:*:*:*:*:*",
              "matchCriteriaId": "9FDC3394-293E-44CF-A83F-FE047A4E4DE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125617:*:*:*:*:*:*",
              "matchCriteriaId": "01846F8F-D7D6-4CD9-B83E-41B70C691761",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125628:*:*:*:*:*:*",
              "matchCriteriaId": "CAE013FC-357D-42DA-B223-D40B3C813089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125629:*:*:*:*:*:*",
              "matchCriteriaId": "E4BA87E9-5E37-41EE-835C-13F68ABC9C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125630:*:*:*:*:*:*",
              "matchCriteriaId": "D2034E17-2DB9-4229-B7D4-D14761CEE699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125631:*:*:*:*:*:*",
              "matchCriteriaId": "39FBAFB9-5703-4EEA-BFF3-45B958E0805F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A02A7E-02A8-4B74-AA9F-3DA0492748EF",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127000:*:*:*:*:*:*",
              "matchCriteriaId": "24B04D73-0C55-49A8-B599-27C8C04948C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127001:*:*:*:*:*:*",
              "matchCriteriaId": "97E74846-1666-4773-910D-77E0E19A7FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127002:*:*:*:*:*:*",
              "matchCriteriaId": "BB90B809-9D97-469F-B8F6-41B4AEAA2D3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127003:*:*:*:*:*:*",
              "matchCriteriaId": "423C8618-9F3B-4B83-902C-FF01027EC54A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127004:*:*:*:*:*:*",
              "matchCriteriaId": "7E974B56-7A00-4582-AF8B-0D09B94477BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127100:*:*:*:*:*:*",
              "matchCriteriaId": "7B6F8404-F624-41AA-BE8D-170D843EC290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127101:*:*:*:*:*:*",
              "matchCriteriaId": "D0FF81E5-2134-4F45-9B39-2E3D5208BB80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127102:*:*:*:*:*:*",
              "matchCriteriaId": "0D5DA95F-7C0F-4D05-BD35-DED356D01692",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127103:*:*:*:*:*:*",
              "matchCriteriaId": "2B3A3EC3-DF7C-41A6-884C-C7C13D41B61E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127104:*:*:*:*:*:*",
              "matchCriteriaId": "89EE3E31-8F55-4E44-8522-A32D6887AE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127109:*:*:*:*:*:*",
              "matchCriteriaId": "979ED7B4-FAE3-4E98-A303-290E498FFD81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127116:*:*:*:*:*:*",
              "matchCriteriaId": "EDC62E2F-AB97-4008-A52B-9CDC341A06BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127117:*:*:*:*:*:*",
              "matchCriteriaId": "93DF7023-22AE-4A84-8734-06239013C10C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127118:*:*:*:*:*:*",
              "matchCriteriaId": "2A128BED-75FA-42F1-9171-CBAEAA2366A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127119:*:*:*:*:*:*",
              "matchCriteriaId": "5298BB50-8E22-490A-87C7-7F40B7F8F7C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127120:*:*:*:*:*:*",
              "matchCriteriaId": "39C34F02-E413-4067-B958-86ADF89FA3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127122:*:*:*:*:*:*",
              "matchCriteriaId": "A0673E69-A2DB-424C-BBF0-79D729230F1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127123:*:*:*:*:*:*",
              "matchCriteriaId": "4F062A20-6FFE-479B-9E64-E4771490B041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127131:*:*:*:*:*:*",
              "matchCriteriaId": "C598244E-7483-4762-AC27-BD8036FEFE5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127133:*:*:*:*:*:*",
              "matchCriteriaId": "B188A792-EF1A-4292-BD91-47635706C430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127134:*:*:*:*:*:*",
              "matchCriteriaId": "BEFACD7A-D81B-4EDC-9E38-FD93FA0DE456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127136:*:*:*:*:*:*",
              "matchCriteriaId": "DF818138-079A-43BE-A8B5-5DA47FA443AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127138:*:*:*:*:*:*",
              "matchCriteriaId": "27066A8F-75C4-42BF-A54B-543114B92995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127140:*:*:*:*:*:*",
              "matchCriteriaId": "A239C6F8-3FC0-4510-B33F-14B25908E68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127141:*:*:*:*:*:*",
              "matchCriteriaId": "E8399E84-1344-4472-91F3-F63255911876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127185:*:*:*:*:*:*",
              "matchCriteriaId": "8888C77E-04A7-4C34-B497-504F6217E07B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127186:*:*:*:*:*:*",
              "matchCriteriaId": "7502D92A-3B51-4A76-88D6-E2D76A584075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127187:*:*:*:*:*:*",
              "matchCriteriaId": "7E465A5F-C8B0-4AD0-8D6D-4823C5F8153D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127188:*:*:*:*:*:*",
              "matchCriteriaId": "DBA622D6-CD85-4F0F-8CC3-39FE29754039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127189:*:*:*:*:*:*",
              "matchCriteriaId": "A0D2828B-B897-4F1D-B657-436DB3CAC2FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127191:*:*:*:*:*:*",
              "matchCriteriaId": "98279B6E-8361-45CA-8912-F06972F4BD1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127240:*:*:*:*:*:*",
              "matchCriteriaId": "A7D879C8-E89F-45C1-9609-80B737080AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127241:*:*:*:*:*:*",
              "matchCriteriaId": "3D8FD2DE-18D9-4F50-9256-672435059876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127242:*:*:*:*:*:*",
              "matchCriteriaId": "F01FEA58-BE5B-4CEC-831D-3BF05A20688D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "039C6DE6-DEA2-42E9-AE55-322E8E6B048C",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "55EA00B6-DE5D-4DE4-85AC-38A1216B4923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "BC4DF055-45CD-4B83-A7BA-59D6E46BD4D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125119:*:*:*:*:*:*",
              "matchCriteriaId": "F9B51EF5-800F-446B-9F2D-47D45445E73E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "C4C2087D-1B7B-4DA4-8288-D5366BC9735F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "B8FE0307-3CA7-445E-BA42-27D65C298E3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125129:*:*:*:*:*:*",
              "matchCriteriaId": "F6F9CB58-3B55-4E6F-AE24-D16552EE3614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125138:*:*:*:*:*:*",
              "matchCriteriaId": "006DB16B-34C4-4359-96A1-381F7C66BF18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125149:*:*:*:*:*:*",
              "matchCriteriaId": "7EFE37CC-58F5-4B08-95C2-D9DAFC8D9C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125162:*:*:*:*:*:*",
              "matchCriteriaId": "4F102286-1D21-48AB-A1B4-ADB5A4D3EEA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "7DDD3297-57ED-40D4-AC54-4484A3E9C633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "8F467A89-13F7-47E9-8285-041DB3F33603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "E8C93717-4E5A-4686-A83F-A7D4AC732144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "5A15AF17-8500-4102-AF1C-897360BB985C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "D9B364E3-45C1-4C71-BB6D-9D831449CF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "4CCB49B2-4AA1-4223-98F0-1E0872566BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125357:*:*:*:*:*:*",
              "matchCriteriaId": "5D0A19E8-F0B3-446D-B991-C63657BC2A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "1C7CD9C4-861D-42C0-9209-0843613F94B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125363:*:*:*:*:*:*",
              "matchCriteriaId": "AD44F42F-709B-4FBE-B9C7-9944A874D489",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "23C53DA5-F50F-4FA5-AF8B-4EA174BB4E57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125395:*:*:*:*:*:*",
              "matchCriteriaId": "199EE3C2-2D58-4777-8592-D000D135E2A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "0CE514D6-6C6A-4DAD-8DB2-FA1F12FFAFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125412:*:*:*:*:*:*",
              "matchCriteriaId": "461FD5FC-2D14-44FC-88F0-783EDDD63483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125429:*:*:*:*:*:*",
              "matchCriteriaId": "65FD6158-1B99-4C17-A167-41D6B1CD62F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125449:*:*:*:*:*:*",
              "matchCriteriaId": "188123C8-7E72-4690-A322-888BED90FB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "2BF85206-863D-493C-88F4-15B0BA5276A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "3C9DE996-1DEC-4AF0-89FD-1E3DA3967BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "75FF4D85-97C8-4DF4-ADE6-EDE8EC2DD5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "9CAC6467-19F7-4CB2-A5FC-B57A14F4636C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "60EB56E2-7367-4488-A00D-41464E86B06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "3E315636-0897-4421-882D-E8196F7ACAD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125459:*:*:*:*:*:*",
              "matchCriteriaId": "EE609902-17AF-491B-8749-C8AF4E0A8241",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "6EFF6295-3F73-448D-8109-453E0DFD2002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125471:*:*:*:*:*:*",
              "matchCriteriaId": "35A535BC-644B-4B10-8F66-779FAF503683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125475:*:*:*:*:*:*",
              "matchCriteriaId": "DDD4AA74-4B07-44A1-A32F-88B0B1E90ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "52203983-0CC9-49DB-B100-49CD9F5CE688",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "095362BF-69CD-458F-8A44-E3D6AFC8C41F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125490:*:*:*:*:*:*",
              "matchCriteriaId": "65F6F508-F0BF-4821-8B50-24A9B652522E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125564:*:*:*:*:*:*",
              "matchCriteriaId": "4044EE7F-268B-4CC7-9982-80766BE5790E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "6F87A77C-E40F-4DDE-9260-FCF12B237FA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125581:*:*:*:*:*:*",
              "matchCriteriaId": "51CF193E-D5A6-423A-A5E2-B0ACF4B002E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125596:*:*:*:*:*:*",
              "matchCriteriaId": "7C10F5A0-6FFE-4907-8A61-61CF11FC7A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125606:*:*:*:*:*:*",
              "matchCriteriaId": "6B3F637D-3724-4314-BCC7-A6A06040DF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125617:*:*:*:*:*:*",
              "matchCriteriaId": "18598449-D0EE-445F-BA6A-2CD658DAF4D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125657:*:*:*:*:*:*",
              "matchCriteriaId": "6DC52F3E-EC5F-404B-ABD7-615B8AB522A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125664:*:*:*:*:*:*",
              "matchCriteriaId": "E3552F71-C708-41A4-9168-5673C086F507",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A1DA3A9-36FB-4BCA-AEEC-231A2C3127D0",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127101:*:*:*:*:*:*",
              "matchCriteriaId": "0BA30C26-D3D8-447C-BD7A-9BC166C8BF3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127117:*:*:*:*:*:*",
              "matchCriteriaId": "162E0203-17E1-427E-A351-33F75E8FE5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127134:*:*:*:*:*:*",
              "matchCriteriaId": "61FB54BF-7A8F-4EE5-AF42-15E2B69E9DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127241:*:*:*:*:*:*",
              "matchCriteriaId": "764139C9-FF6A-4BE0-BAF3-52F403C41393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127242:*:*:*:*:*:*",
              "matchCriteriaId": "3D9805F6-1A56-4FBF-8F47-DAA80E4DE9FC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9FF3515-61C7-4A7A-9781-6D4A0340B2EC",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "77AA96FD-5AF0-4F80-8402-BAB460FF8B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125003:*:*:*:*:*:*",
              "matchCriteriaId": "3095B4D1-170A-48B0-8C4A-7A7A54E42149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8CE4267C-DAAE-4CEC-A6E3-D2213AA5EE57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125109:*:*:*:*:*:*",
              "matchCriteriaId": "92EB7DC6-F227-40B3-A093-4D9495BBE272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125115:*:*:*:*:*:*",
              "matchCriteriaId": "40C478D3-7C1C-4FCE-99FA-976EE2754680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "DE6C88E4-D382-4729-AF5D-5697DCE26A67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125122:*:*:*:*:*:*",
              "matchCriteriaId": "6447F4D8-0943-4C8C-BBA7-42BECC181D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "422B8CB6-3A14-4452-9192-F4CD5BF5D030",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125141:*:*:*:*:*:*",
              "matchCriteriaId": "41AB6C1A-CBEC-4DC1-94A4-9D14E82BA542",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125142:*:*:*:*:*:*",
              "matchCriteriaId": "6A2C060F-770B-4245-8490-5D2EB970FCA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125149:*:*:*:*:*:*",
              "matchCriteriaId": "16E635CC-1591-4535-89EA-B8470BD885F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125150:*:*:*:*:*:*",
              "matchCriteriaId": "D5F9E623-A42D-446D-ADDD-5F3C8F7BD9B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125160:*:*:*:*:*:*",
              "matchCriteriaId": "1E235AF0-4453-4439-A25D-FF78A89BB117",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125179:*:*:*:*:*:*",
              "matchCriteriaId": "620E40E9-9D83-4E14-8898-10C0718B1A1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "1D72F651-BD8C-4564-AC1A-84A91F21EADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "19DD9FF2-583B-4079-9375-E1643FF9A54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125200:*:*:*:*:*:*",
              "matchCriteriaId": "69EDC39C-68EE-488D-B740-9E45229BDF2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "EC374820-208A-40EF-965C-50C19467BD82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "397B1FAC-EB6E-4F17-B5D7-CBD47D581DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125217:*:*:*:*:*:*",
              "matchCriteriaId": "E771BCA5-9E65-4C8B-BF36-E90F641D2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125221:*:*:*:*:*:*",
              "matchCriteriaId": "A658460A-FAE0-4487-8CD6-FB3384664F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "6F104D17-7D08-42A5-BAF3-DEA475308FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "9F875BFA-18C2-42BF-8BC4-D02E15B395E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "3BBD9D22-7E92-4648-972E-E17D9472E08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125357:*:*:*:*:*:*",
              "matchCriteriaId": "7219F9A0-CD1D-4BB4-A5E1-FA0495B49114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125361:*:*:*:*:*:*",
              "matchCriteriaId": "0CBB0F67-9C81-44BC-9836-DE5FE40DDBBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "6D7C0250-52DA-423D-B061-0CDF39D15068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "6FC34D3F-FED3-4266-AB29-98FFC2002507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "DD1460AC-A719-4B75-B28B-748B6C262A87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "B9024FE1-536C-4180-8115-6D97E7C324D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125410:*:*:*:*:*:*",
              "matchCriteriaId": "8CD6EB21-3DC6-47A7-939A-AA3C8EFE278F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125429:*:*:*:*:*:*",
              "matchCriteriaId": "3A5911F7-7A45-499D-B345-D9C082932BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125447:*:*:*:*:*:*",
              "matchCriteriaId": "CBBD7A90-4F97-4DFD-B8E6-F24A9B72A1C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125459:*:*:*:*:*:*",
              "matchCriteriaId": "87C6DCE0-5F40-4F50-8538-29CFF2DCC9EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125464:*:*:*:*:*:*",
              "matchCriteriaId": "BECA9FA7-887B-4ECC-AA23-F75F96E42CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "CFD6D448-337E-4A63-8BE2-4DFC50AE7413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125475:*:*:*:*:*:*",
              "matchCriteriaId": "33F2625D-0750-4ED1-8BA7-8141D8B7FB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "A7D6DD58-62F3-4727-9AC1-E6B5EA71BB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "33991587-174F-48D9-821D-BF44CF24924D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125484:*:*:*:*:*:*",
              "matchCriteriaId": "18B8D15F-0286-4D64-96F8-D213E241813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "EB8483C1-6586-4936-8BF8-ECE3F0F4D5F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "A9318551-C41F-46E9-A196-5C01EAE276F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125490:*:*:*:*:*:*",
              "matchCriteriaId": "5030E129-0401-457B-B4FB-974AD5A0A948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125557:*:*:*:*:*:*",
              "matchCriteriaId": "74DAFF5A-7090-427F-A69E-2E90456485C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "8EB26A23-108E-4F39-84E3-2F1C197C8CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125582:*:*:*:*:*:*",
              "matchCriteriaId": "DF57D557-B1B9-4B2E-81A5-B23C1A8521E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125605:*:*:*:*:*:*",
              "matchCriteriaId": "E37E20B2-B678-45C1-9EF9-7D65172B485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125606:*:*:*:*:*:*",
              "matchCriteriaId": "722042FB-CFE5-4DE8-A196-65D2E035378F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "17CC4F0C-E69E-4FA5-8119-D71AD9C13E63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125621:*:*:*:*:*:*",
              "matchCriteriaId": "B8DA03F6-8EF8-48E1-B4CF-A2B0CB6F1DEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FB7952-0CED-4A64-A435-D588CA661630",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127000:*:*:*:*:*:*",
              "matchCriteriaId": "8343B084-2009-44F2-B36C-C66719BBB1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127101:*:*:*:*:*:*",
              "matchCriteriaId": "2574DD71-36A4-47AE-ABC3-D05D36FF8F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127130:*:*:*:*:*:*",
              "matchCriteriaId": "B9D787C9-F37B-4193-A34F-080F7410BFA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127131:*:*:*:*:*:*",
              "matchCriteriaId": "55FB4705-D709-42F0-A562-6C5A05E00EAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127187:*:*:*:*:*:*",
              "matchCriteriaId": "4503E624-DC7F-4C5E-B715-0EC4676CA1ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "340D8561-6110-49D8-BCDC-78A762FCD3E6",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "C61E9B3D-A39D-428E-A82F-5C4C225906C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "423D3372-F910-4006-9FE8-49A6B730AEBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125109:*:*:*:*:*:*",
              "matchCriteriaId": "02B0ED3C-4729-4C70-8F06-6B507ED75BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125115:*:*:*:*:*:*",
              "matchCriteriaId": "3CE0B4B2-CC4C-4F0F-B97E-A90C84377989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "DC2E4C62-9867-4D14-85B3-95F359BD0551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125122:*:*:*:*:*:*",
              "matchCriteriaId": "5042AD90-4DF1-4A5A-9317-017102515284",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "356A4F91-FA5B-4A09-841E-A380F580BA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125129:*:*:*:*:*:*",
              "matchCriteriaId": "CBBDC611-498B-4175-9A88-5914ED6D3A9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125141:*:*:*:*:*:*",
              "matchCriteriaId": "10F3C9AD-9C1B-4FBD-8325-B56FCF96FFE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125149:*:*:*:*:*:*",
              "matchCriteriaId": "F4EE5C24-C4AE-4F9D-B808-8930102A1389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125160:*:*:*:*:*:*",
              "matchCriteriaId": "E0F45A48-5006-4748-B683-6C7CB469286A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125179:*:*:*:*:*:*",
              "matchCriteriaId": "9796C62A-8FCA-4E1E-855E-7D67F77C9AD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "1A1AC2FD-91BA-4B78-BB14-B9F2CEB09071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125200:*:*:*:*:*:*",
              "matchCriteriaId": "A4B99FDC-EC68-4006-B359-E845AEF72FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "240A8575-F963-4DB4-B9C6-BE584A2F8271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "B97F1BEE-F3C0-4DDD-B767-23C4BE9054AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125217:*:*:*:*:*:*",
              "matchCriteriaId": "3B3482FA-9483-4EC7-9B09-E1BB63F02790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "2600FBC5-8358-4126-88F2-00F3BEE9B537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "FDD47CB0-3680-4ED9-821C-B673EACB953D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "D27B76C3-B8C8-48A6-AEF3-E9145B57EDA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125357:*:*:*:*:*:*",
              "matchCriteriaId": "6D77C576-035E-403B-A2B3-992496FAD202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "70608921-F02A-4121-BE90-919DD68DD0D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "93C50660-6ECF-4353-A15A-4F7B0F06D33A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "06D8864A-E6CC-4742-A2CF-B060E8DFA740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125393:*:*:*:*:*:*",
              "matchCriteriaId": "D2572B3B-3BC4-4A83-92D5-8D7579821F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "0DD78F90-5231-4848-8971-9AB5ABBD2C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125412:*:*:*:*:*:*",
              "matchCriteriaId": "7C94C142-168F-421C-B00B-3F42AA1CC9D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125429:*:*:*:*:*:*",
              "matchCriteriaId": "77CE4835-6540-4CF6-A31C-255DA52BB073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125447:*:*:*:*:*:*",
              "matchCriteriaId": "E0544AE8-92B3-43A7-8F42-299AED1A40CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "BEC805D2-CFDC-40DE-AA70-42A91461BEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "4767BF5A-B867-44BB-B152-E2AFA63B06D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "5855C471-07AB-4A96-9631-26C6C8B01F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "5075910F-3676-439A-879A-5CBE2C734347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "20808F91-7F08-4BA9-9075-C54337EC68E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125456:*:*:*:*:*:*",
              "matchCriteriaId": "C700CE3B-31B5-4B4D-A378-70EC26D6F88B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125459:*:*:*:*:*:*",
              "matchCriteriaId": "A05AFF4D-4EF9-4939-81CC-0AB55DA596F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125464:*:*:*:*:*:*",
              "matchCriteriaId": "86C3E31F-87E2-459F-8D1B-C6D1A237960D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "A3E7FC26-0000-4D4B-B489-DF0E2CD2B13C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "13E6E0F9-9D03-4665-9C89-6BE62ADCB39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125471:*:*:*:*:*:*",
              "matchCriteriaId": "0DE52003-E959-420F-89A1-C86D8FB12DBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125476:*:*:*:*:*:*",
              "matchCriteriaId": "6E9C9051-7FDE-4DEE-85DC-0798524DC17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "5BE3598F-CEB4-4553-BB50-AA778BBF8BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "4C71852D-D529-469A-9111-6D4DB8381BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125484:*:*:*:*:*:*",
              "matchCriteriaId": "EC3F7DA9-3FBF-4D67-8BA5-2643E706F64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "53E2DF01-9A39-4E50-BEDE-D49988CE5CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "0015664D-11BC-4DEE-BC5B-DB3D1FE8DF82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125490:*:*:*:*:*:*",
              "matchCriteriaId": "8B49F887-4574-4B3C-A8A7-57F75B27447F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125557:*:*:*:*:*:*",
              "matchCriteriaId": "C1E93E4D-0E54-41DF-843A-E8AE94EAD0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125566:*:*:*:*:*:*",
              "matchCriteriaId": "1617ADAD-2E13-4910-B600-3EC7E59B087C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "4E7B4955-F688-47DE-B1FF-D417EBDFF9C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125582:*:*:*:*:*:*",
              "matchCriteriaId": "5F982932-5513-411A-9CBF-3082C7ECEF0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125584:*:*:*:*:*:*",
              "matchCriteriaId": "0B5378E9-D011-4B12-8DEE-442F22789C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125585:*:*:*:*:*:*",
              "matchCriteriaId": "8232CBA1-55DA-4F3C-A9E5-A204A25231C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125606:*:*:*:*:*:*",
              "matchCriteriaId": "253569A5-4A2E-4163-88DC-C0FE6B79E06E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "A30281F3-4DE2-4ED3-91A7-AE7A091C31E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9222E54C-0A7C-4828-9917-7CFD7EE8BC59",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127000:*:*:*:*:*:*",
              "matchCriteriaId": "85778DB3-87D9-4C6A-9149-C58C45913268",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127003:*:*:*:*:*:*",
              "matchCriteriaId": "3973EC75-A70A-475A-82BB-409992F09392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127101:*:*:*:*:*:*",
              "matchCriteriaId": "14537D55-3ABE-423C-B320-6811292620AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127130:*:*:*:*:*:*",
              "matchCriteriaId": "FCB0BDE0-5BD3-4315-A74B-D7065ABC91BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127131:*:*:*:*:*:*",
              "matchCriteriaId": "3E850CF4-9078-4E43-A87C-8323536E8CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127187:*:*:*:*:*:*",
              "matchCriteriaId": "EC407852-45B1-47F4-A886-AF8B473A86D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB0C7A9-5511-4AC9-B5E4-74AAE6973E34",
              "versionEndExcluding": "12.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "BDA5DDA4-A67C-4370-B41D-02755FCF1F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "3D99CD97-1D6B-4C67-A909-E1CE28A78E10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "70FEC14F-A53C-437C-981A-214B867142E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125115:*:*:*:*:*:*",
              "matchCriteriaId": "895E57EA-A8F6-425B-9D08-654E03B92B30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "9EE0C771-B2F6-4766-82FD-203967CE37D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "0DCD6102-19F7-42D2-A81B-C85824CA351D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "3C2C0A08-66BF-4FDC-A209-769234438844",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "8DDC3649-12A9-41F3-A27D-646B5DF05E93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125129:*:*:*:*:*:*",
              "matchCriteriaId": "4F037A2A-4B9A-4EBC-94E2-87502960FF20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "B15E99A3-989F-4EFD-BA26-DEC6992BD1CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125142:*:*:*:*:*:*",
              "matchCriteriaId": "B85BF117-503B-435F-8667-481D9AC7A788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125149:*:*:*:*:*:*",
              "matchCriteriaId": "3AC2A038-F59B-4137-B02F-4C26E2EB9152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "F605C78F-8BE4-4E02-A7FB-CA9D24AFE7E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "15557A07-E0E9-40DB-B013-0F4AD9556BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125199:*:*:*:*:*:*",
              "matchCriteriaId": "79082C84-9F25-4A63-86AF-18CC4ADF71CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "A88678CE-DB64-4D66-8F2A-3C60058DC5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "88009BAC-1ECF-4BA3-855F-96C8789E476E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "E64F7B54-6B09-4B7E-B2AB-5EA73FD8E0AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "2B94DFD2-374C-47A9-9D54-3FDB63197FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "9B0330D9-1276-4228-BA7E-B9E3B828E5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "89736956-D05D-437B-BC7A-850AA459C123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125234:*:*:*:*:*:*",
              "matchCriteriaId": "63B26424-7292-4F37-B86F-2A4E0AD32B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "2D2629FB-0A83-43CC-8C83-444036D05F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125325:*:*:*:*:*:*",
              "matchCriteriaId": "4CFD99D1-CB43-437B-8E7D-6712DA5C9835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125327:*:*:*:*:*:*",
              "matchCriteriaId": "6FEBA58F-E5B4-4B91-B78F-620C6EB9D3BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "F9F9D406-FE99-45C0-B1C0-4DEB5E843FE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "F4B86974-C598-4E1A-9FF0-5AF9638C1AD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125345:*:*:*:*:*:*",
              "matchCriteriaId": "C2838623-6F3F-417A-A644-FA226CCD8BB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125358:*:*:*:*:*:*",
              "matchCriteriaId": "454EDD2A-E79A-4D46-B841-BE5EC12C63D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "1557A740-D19D-4220-9B3E-395EFCB86F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125363:*:*:*:*:*:*",
              "matchCriteriaId": "9C7DB404-A5C7-4EDB-BCB2-079A41E31428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125378:*:*:*:*:*:*",
              "matchCriteriaId": "B738952C-DE7B-4C3D-85B9-ADBEDF007AFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125392:*:*:*:*:*:*",
              "matchCriteriaId": "897D140C-20FF-454D-8928-B11FFC84C016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "18F93D7C-E8FC-4D4C-AEA0-C1187FB6D9D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125417:*:*:*:*:*:*",
              "matchCriteriaId": "2E799367-7DC7-478D-948A-17D717507DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125445:*:*:*:*:*:*",
              "matchCriteriaId": "74A5591E-75A4-4ACA-9C34-4907D645AA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125459:*:*:*:*:*:*",
              "matchCriteriaId": "0C67D5FC-5965-4AC1-80A5-931BE60B5E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125465:*:*:*:*:*:*",
              "matchCriteriaId": "139E25D9-A4C8-4041-ADF7-4618DFEEE8C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "6A65F3F7-45D3-49EB-9784-1F13FA2CBB0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125471:*:*:*:*:*:*",
              "matchCriteriaId": "3795D2DE-622F-4C82-B133-0993A01AC1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125475:*:*:*:*:*:*",
              "matchCriteriaId": "C0DB9896-BC25-46E3-AA6F-496A442BE525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "CE56A949-74AC-4138-8AD3-31F5763860EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "4A3DB867-FD46-46EB-AEF0-2B6E79371AF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "7881FBB4-AC09-4EB9-B02F-3EA19237E095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "F391E432-98B8-4D97-8AD4-FB1A84FAF774",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125490:*:*:*:*:*:*",
              "matchCriteriaId": "61D908B2-446E-48EC-9F6B-91E8BF0F6A38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125565:*:*:*:*:*:*",
              "matchCriteriaId": "FD5F28B0-580E-4CD4-917A-496D35AD271A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125568:*:*:*:*:*:*",
              "matchCriteriaId": "F0FC96AA-F2F4-4C35-8BF7-6318A2F624A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125583:*:*:*:*:*:*",
              "matchCriteriaId": "6EA008F1-4E47-4753-8506-769B29AB5BA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125584:*:*:*:*:*:*",
              "matchCriteriaId": "7ED68CDE-1096-4490-8E6B-78F4AC2BB729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125598:*:*:*:*:*:*",
              "matchCriteriaId": "34F8D9B7-3BD7-44C0-A292-162928729F36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125606:*:*:*:*:*:*",
              "matchCriteriaId": "ADFB3155-72F3-4DFA-BAE1-5725A40E6C8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125612:*:*:*:*:*:*",
              "matchCriteriaId": "7446678C-E2DB-4EA2-BC9B-430C8EC7804B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125615:*:*:*:*:*:*",
              "matchCriteriaId": "33C57314-5503-48BD-9ED2-D76517C9C0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125617:*:*:*:*:*:*",
              "matchCriteriaId": "AC201C68-2C1D-4E75-9443-C5F853A37AB0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6628EB7-96F6-48E3-8018-8F569972B811",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127000:*:*:*:*:*:*",
              "matchCriteriaId": "B64ADEEB-502D-4588-BD80-156124437AEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127102:*:*:*:*:*:*",
              "matchCriteriaId": "2306C5F3-5413-4240-BAB6-E55849063A72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127105:*:*:*:*:*:*",
              "matchCriteriaId": "87F97A9E-2AB3-4121-B5A7-0AA25780D336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127132:*:*:*:*:*:*",
              "matchCriteriaId": "AD049643-9546-4D39-BD26-79661205C110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8AEEB49-1C45-4B88-81C1-A1425B7E99A2",
              "versionEndExcluding": "14.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14300:*:*:*:*:*:*",
              "matchCriteriaId": "E73FEA45-5AA3-4C49-91D3-E07A53E34515",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14301:*:*:*:*:*:*",
              "matchCriteriaId": "8CA65161-0C0B-45E7-BBEA-FA214DBF964B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14302:*:*:*:*:*:*",
              "matchCriteriaId": "9097C0CA-001B-4604-BCDB-ED28AB292CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14303:*:*:*:*:*:*",
              "matchCriteriaId": "C7F15A64-F15C-43E4-890A-7FEB0614C6DF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "378A2C19-6176-4E95-AB9C-B60A1F1A1E87",
              "versionEndExcluding": "7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7000:*:*:*:*:*:*",
              "matchCriteriaId": "1E01D48C-A95F-421E-A6FA-D299D6BE02B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7001:*:*:*:*:*:*",
              "matchCriteriaId": "727BD3A4-F0E1-4656-A640-B32406324707",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7002:*:*:*:*:*:*",
              "matchCriteriaId": "AC812003-B383-4E52-B9D3-90F4B0633C90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7003:*:*:*:*:*:*",
              "matchCriteriaId": "E6BE678E-EC68-478F-A4E0-73E032C88167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7004:*:*:*:*:*:*",
              "matchCriteriaId": "A5E373E7-9BB3-480F-A685-BAA7A9CD1BC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE99DDEC-EA8D-4E15-A227-30B242611078",
              "versionEndExcluding": "14.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14300:*:*:*:*:*:*",
              "matchCriteriaId": "52843587-34AD-4992-8E68-25CD02E247A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14301:*:*:*:*:*:*",
              "matchCriteriaId": "BC2FC98F-84FF-4C90-BD7C-20A4910BED44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14302:*:*:*:*:*:*",
              "matchCriteriaId": "9794CB33-4932-4AA6-AC8C-B9FB6AE233FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14303:*:*:*:*:*:*",
              "matchCriteriaId": "3CC0A1C9-2F24-422A-8478-95BDCE1EBE77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14304:*:*:*:*:*:*",
              "matchCriteriaId": "4E541BD1-3BB8-4807-BDF8-45B0916416D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FDF15FF-2561-4139-AC5E-4812584B1B03",
              "versionEndExcluding": "4.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*",
              "matchCriteriaId": "D5DEC045-6A7E-4041-88F8-5ABC4AB51C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*",
              "matchCriteriaId": "52DDE5D9-28DE-446F-A402-7BE3C33A4B35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4302:*:*:*:*:*:*",
              "matchCriteriaId": "F6E1E4D8-B7F0-4BDB-B5A2-55436BEC85F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4303:*:*:*:*:*:*",
              "matchCriteriaId": "59675CC4-8A5C-4668-908C-0886B4B310DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4304:*:*:*:*:*:*",
              "matchCriteriaId": "45084336-F1DC-4E5B-A45E-506A779985D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4305:*:*:*:*:*:*",
              "matchCriteriaId": "1B2CC071-5BB3-4A25-88F2-DBC56B94D895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4306:*:*:*:*:*:*",
              "matchCriteriaId": "E6FDF373-4711-4B72-A14E-CEB19301C40F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4307:*:*:*:*:*:*",
              "matchCriteriaId": "0E0F346C-0445-4D38-8583-3379962B540F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4308:*:*:*:*:*:*",
              "matchCriteriaId": "18B78BDC-0EAA-4781-8D62-01E47AA3BF40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4309:*:*:*:*:*:*",
              "matchCriteriaId": "A9EE7E99-B428-41EF-A693-7A316F695160",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4707D700-23C4-4BBD-9683-4E6D59989127",
              "versionEndExcluding": "14.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14300:*:*:*:*:*:*",
              "matchCriteriaId": "39E8C9FE-3C1C-4E32-8BD4-14A88C49F587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14301:*:*:*:*:*:*",
              "matchCriteriaId": "13A9F940-083E-451E-A330-877D67F617BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14302:*:*:*:*:*:*",
              "matchCriteriaId": "9FE925DF-55E6-4E7F-B5CD-F5ED097BBBC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14303:*:*:*:*:*:*",
              "matchCriteriaId": "0031CF5C-78FE-4CB0-97CE-087C10A77EB0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1478BFC3-A0B2-415B-BA1C-AA09D9451C93",
              "versionEndExcluding": "5.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "41B34AA8-294A-48A9-8579-44EB7EE192F3",
              "versionEndExcluding": "12.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en varios productos ManageEngine que puede provocar la exposici\u00f3n de claves de cifrado. Un usuario de sistema operativo con pocos privilegios y acceso al host donde est\u00e1 instalado un producto ManageEngine afectado puede ver y utilizar la clave expuesta para descifrar las contrase\u00f1as de la base de datos del producto. Esto permite al usuario acceder a la base de datos del producto ManageEngine."
    }
  ],
  "id": "CVE-2023-6105",
  "lastModified": "2025-02-13T18:16:03.270",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "vulnreport@tenable.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-15T21:15:08.490",
  "references": [
    {
      "source": "vulnreport@tenable.com",
      "url": "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html"
    },
    {
      "source": "vulnreport@tenable.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/security/research/tra-2023-35"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/security/research/tra-2023-35"
    }
  ],
  "sourceIdentifier": "vulnreport@tenable.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "vulnreport@tenable.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-12-09 20:15
Modified
2024-11-21 06:31
Severity ?
Summary
OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories.
Impacted products
Vendor Product Version
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5
zohocorp manageengine_opmanager 12.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
              "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
              "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
              "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
              "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
              "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
              "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
              "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
              "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
              "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
              "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
              "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
              "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
              "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
              "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
              "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
              "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
              "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
              "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
              "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
              "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
              "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
              "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
              "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
              "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
              "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
              "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
              "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
              "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
              "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
              "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
              "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
              "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
              "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
              "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
              "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
              "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
              "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
              "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
              "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
              "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
              "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
              "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
              "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
              "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
              "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
              "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
              "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
              "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
              "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
              "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
              "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
              "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
              "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
              "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
              "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
              "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
              "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
              "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
              "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
              "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
              "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
              "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
              "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
              "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
              "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
              "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
              "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
              "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*",
              "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*",
              "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*",
              "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*",
              "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*",
              "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*",
              "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*",
              "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*",
              "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*",
              "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*",
              "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*",
              "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*",
              "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*",
              "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*",
              "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*",
              "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*",
              "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*",
              "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*",
              "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*",
              "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*",
              "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*",
              "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*",
              "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*",
              "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*",
              "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*",
              "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*",
              "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*",
              "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*",
              "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*",
              "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*",
              "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*",
              "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*",
              "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*",
              "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*",
              "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*",
              "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*",
              "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*",
              "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*",
              "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*",
              "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*",
              "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*",
              "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*",
              "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
              "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
              "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
              "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*",
              "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*",
              "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*",
              "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*",
              "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*",
              "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*",
              "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*",
              "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*",
              "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*",
              "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*",
              "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*",
              "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*",
              "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*",
              "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*",
              "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories."
    },
    {
      "lang": "es",
      "value": "OpUtils en Zoho ManageEngine OpManager 12.5 antes de 125490 maneja mal la autenticaci\u00f3n para algunos directorios de auditor\u00eda"
    }
  ],
  "id": "CVE-2021-44514",
  "lastModified": "2024-11-21T06:31:08.323",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-12-09T20:15:08.173",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-08 15:15
Modified
2024-11-21 08:29
Summary
A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
Impacted products
Vendor Product Version
zohocorp manageengine_firewall_analyzer *
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_firewall_analyzer 12.7
zohocorp manageengine_netflow_analyzer *
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_netflow_analyzer 12.7
zohocorp manageengine_network_configuration_manager *
zohocorp manageengine_network_configuration_manager 12.7
zohocorp manageengine_network_configuration_manager 12.7
zohocorp manageengine_network_configuration_manager 12.7
zohocorp manageengine_network_configuration_manager 12.7
zohocorp manageengine_network_configuration_manager 12.7
zohocorp manageengine_network_configuration_manager 12.7
zohocorp manageengine_network_configuration_manager 12.7
zohocorp manageengine_opmanager *
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager 12.7
zohocorp manageengine_opmanager_msp *
zohocorp manageengine_opmanager_msp 12.7
zohocorp manageengine_opmanager_msp 12.7
zohocorp manageengine_opmanager_msp 12.7
zohocorp manageengine_opmanager_msp 12.7
zohocorp manageengine_opmanager_msp 12.7
zohocorp manageengine_opmanager_msp 12.7
zohocorp manageengine_opmanager_msp 12.7
zohocorp manageengine_opmanager_msp 12.7
zohocorp manageengine_opmanager_msp 12.7
zohocorp manageengine_opmanager_plus *
zohocorp manageengine_opmanager_plus 12.7
zohocorp manageengine_opmanager_plus 12.7
zohocorp manageengine_opmanager_plus 12.7
zohocorp manageengine_opmanager_plus 12.7
zohocorp manageengine_opmanager_plus 12.7
zohocorp manageengine_opmanager_plus 12.7
zohocorp manageengine_opmanager_plus 12.7
zohocorp manageengine_opmanager_plus 12.7
zohocorp manageengine_opmanager_plus 12.7
zohocorp manageengine_oputils *
zohocorp manageengine_oputils 12.7
zohocorp manageengine_oputils 12.7
zohocorp manageengine_oputils 12.7
zohocorp manageengine_oputils 12.7
zohocorp manageengine_oputils 12.7
zohocorp manageengine_oputils 12.7
zohocorp manageengine_oputils 12.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FB7952-0CED-4A64-A435-D588CA661630",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127000:*:*:*:*:*:*",
              "matchCriteriaId": "8343B084-2009-44F2-B36C-C66719BBB1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127101:*:*:*:*:*:*",
              "matchCriteriaId": "2574DD71-36A4-47AE-ABC3-D05D36FF8F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127130:*:*:*:*:*:*",
              "matchCriteriaId": "B9D787C9-F37B-4193-A34F-080F7410BFA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127131:*:*:*:*:*:*",
              "matchCriteriaId": "55FB4705-D709-42F0-A562-6C5A05E00EAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127187:*:*:*:*:*:*",
              "matchCriteriaId": "4503E624-DC7F-4C5E-B715-0EC4676CA1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127244:*:*:*:*:*:*",
              "matchCriteriaId": "BAD9E275-CCBA-4A25-A91D-2CC9D1547B74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127257:*:*:*:*:*:*",
              "matchCriteriaId": "F50149D0-8105-49EE-9F0D-CFD67B0F64C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127259:*:*:*:*:*:*",
              "matchCriteriaId": "E0DECCD8-2E8C-4288-8CB5-10C117D83112",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9222E54C-0A7C-4828-9917-7CFD7EE8BC59",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127000:*:*:*:*:*:*",
              "matchCriteriaId": "85778DB3-87D9-4C6A-9149-C58C45913268",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127003:*:*:*:*:*:*",
              "matchCriteriaId": "3973EC75-A70A-475A-82BB-409992F09392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127101:*:*:*:*:*:*",
              "matchCriteriaId": "14537D55-3ABE-423C-B320-6811292620AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127130:*:*:*:*:*:*",
              "matchCriteriaId": "FCB0BDE0-5BD3-4315-A74B-D7065ABC91BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127131:*:*:*:*:*:*",
              "matchCriteriaId": "3E850CF4-9078-4E43-A87C-8323536E8CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127187:*:*:*:*:*:*",
              "matchCriteriaId": "EC407852-45B1-47F4-A886-AF8B473A86D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127244:*:*:*:*:*:*",
              "matchCriteriaId": "F528288A-7CC9-436C-9899-E4F343F83BCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127255:*:*:*:*:*:*",
              "matchCriteriaId": "2C6E7D8F-8EF4-4FEF-BE87-82CFDD22DE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127257:*:*:*:*:*:*",
              "matchCriteriaId": "0BC6EA7D-E39F-4FE6-960D-BA6B85F81A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127259:*:*:*:*:*:*",
              "matchCriteriaId": "BE0BFAB9-E3F3-493E-B2D3-FA9BE69C0A1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6628EB7-96F6-48E3-8018-8F569972B811",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127000:*:*:*:*:*:*",
              "matchCriteriaId": "B64ADEEB-502D-4588-BD80-156124437AEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127102:*:*:*:*:*:*",
              "matchCriteriaId": "2306C5F3-5413-4240-BAB6-E55849063A72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127105:*:*:*:*:*:*",
              "matchCriteriaId": "87F97A9E-2AB3-4121-B5A7-0AA25780D336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127132:*:*:*:*:*:*",
              "matchCriteriaId": "AD049643-9546-4D39-BD26-79661205C110",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127243:*:*:*:*:*:*",
              "matchCriteriaId": "EC810ED9-125E-41CA-B0BD-16BBF1726C3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127257:*:*:*:*:*:*",
              "matchCriteriaId": "97B71808-B280-4BDC-819F-B80156A77CA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127259:*:*:*:*:*:*",
              "matchCriteriaId": "F5458B6F-1D90-4563-A783-93480FB628DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A02A7E-02A8-4B74-AA9F-3DA0492748EF",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127000:*:*:*:*:*:*",
              "matchCriteriaId": "24B04D73-0C55-49A8-B599-27C8C04948C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127001:*:*:*:*:*:*",
              "matchCriteriaId": "97E74846-1666-4773-910D-77E0E19A7FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127002:*:*:*:*:*:*",
              "matchCriteriaId": "BB90B809-9D97-469F-B8F6-41B4AEAA2D3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127003:*:*:*:*:*:*",
              "matchCriteriaId": "423C8618-9F3B-4B83-902C-FF01027EC54A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127004:*:*:*:*:*:*",
              "matchCriteriaId": "7E974B56-7A00-4582-AF8B-0D09B94477BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127100:*:*:*:*:*:*",
              "matchCriteriaId": "7B6F8404-F624-41AA-BE8D-170D843EC290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127101:*:*:*:*:*:*",
              "matchCriteriaId": "D0FF81E5-2134-4F45-9B39-2E3D5208BB80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127102:*:*:*:*:*:*",
              "matchCriteriaId": "0D5DA95F-7C0F-4D05-BD35-DED356D01692",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127103:*:*:*:*:*:*",
              "matchCriteriaId": "2B3A3EC3-DF7C-41A6-884C-C7C13D41B61E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127104:*:*:*:*:*:*",
              "matchCriteriaId": "89EE3E31-8F55-4E44-8522-A32D6887AE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127109:*:*:*:*:*:*",
              "matchCriteriaId": "979ED7B4-FAE3-4E98-A303-290E498FFD81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127116:*:*:*:*:*:*",
              "matchCriteriaId": "EDC62E2F-AB97-4008-A52B-9CDC341A06BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127117:*:*:*:*:*:*",
              "matchCriteriaId": "93DF7023-22AE-4A84-8734-06239013C10C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127118:*:*:*:*:*:*",
              "matchCriteriaId": "2A128BED-75FA-42F1-9171-CBAEAA2366A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127119:*:*:*:*:*:*",
              "matchCriteriaId": "5298BB50-8E22-490A-87C7-7F40B7F8F7C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127120:*:*:*:*:*:*",
              "matchCriteriaId": "39C34F02-E413-4067-B958-86ADF89FA3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127122:*:*:*:*:*:*",
              "matchCriteriaId": "A0673E69-A2DB-424C-BBF0-79D729230F1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127123:*:*:*:*:*:*",
              "matchCriteriaId": "4F062A20-6FFE-479B-9E64-E4771490B041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127131:*:*:*:*:*:*",
              "matchCriteriaId": "C598244E-7483-4762-AC27-BD8036FEFE5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127133:*:*:*:*:*:*",
              "matchCriteriaId": "B188A792-EF1A-4292-BD91-47635706C430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127134:*:*:*:*:*:*",
              "matchCriteriaId": "BEFACD7A-D81B-4EDC-9E38-FD93FA0DE456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127136:*:*:*:*:*:*",
              "matchCriteriaId": "DF818138-079A-43BE-A8B5-5DA47FA443AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127138:*:*:*:*:*:*",
              "matchCriteriaId": "27066A8F-75C4-42BF-A54B-543114B92995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127140:*:*:*:*:*:*",
              "matchCriteriaId": "A239C6F8-3FC0-4510-B33F-14B25908E68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127141:*:*:*:*:*:*",
              "matchCriteriaId": "E8399E84-1344-4472-91F3-F63255911876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127185:*:*:*:*:*:*",
              "matchCriteriaId": "8888C77E-04A7-4C34-B497-504F6217E07B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127186:*:*:*:*:*:*",
              "matchCriteriaId": "7502D92A-3B51-4A76-88D6-E2D76A584075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127187:*:*:*:*:*:*",
              "matchCriteriaId": "7E465A5F-C8B0-4AD0-8D6D-4823C5F8153D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127188:*:*:*:*:*:*",
              "matchCriteriaId": "DBA622D6-CD85-4F0F-8CC3-39FE29754039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127189:*:*:*:*:*:*",
              "matchCriteriaId": "A0D2828B-B897-4F1D-B657-436DB3CAC2FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127191:*:*:*:*:*:*",
              "matchCriteriaId": "98279B6E-8361-45CA-8912-F06972F4BD1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127240:*:*:*:*:*:*",
              "matchCriteriaId": "A7D879C8-E89F-45C1-9609-80B737080AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127241:*:*:*:*:*:*",
              "matchCriteriaId": "3D8FD2DE-18D9-4F50-9256-672435059876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127242:*:*:*:*:*:*",
              "matchCriteriaId": "F01FEA58-BE5B-4CEC-831D-3BF05A20688D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127243:*:*:*:*:*:*",
              "matchCriteriaId": "FFD06A39-E943-41B5-B00B-168A6D919C80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127255:*:*:*:*:*:*",
              "matchCriteriaId": "49469309-8B9B-4BF1-B80A-226F975FC47C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127256:*:*:*:*:*:*",
              "matchCriteriaId": "C429A23E-3DC0-453F-AAF7-F3237C9C6B6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127257:*:*:*:*:*:*",
              "matchCriteriaId": "1E3B72F3-2128-4AF1-A9A3-969D9738A24B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127258:*:*:*:*:*:*",
              "matchCriteriaId": "62C3AE7F-3F84-4C59-BBF8-2E82FAFF7E15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127259:*:*:*:*:*:*",
              "matchCriteriaId": "A559F75B-FB71-4926-89FC-AC2718F0273C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FB8882-46AE-485B-82B5-67BF22DDC12C",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127109:*:*:*:*:*:*",
              "matchCriteriaId": "265DB862-1B39-4B16-9AD9-D8D8190D08D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127122:*:*:*:*:*:*",
              "matchCriteriaId": "5F476D22-0FA8-4128-833F-2F1E3D15615C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127123:*:*:*:*:*:*",
              "matchCriteriaId": "A627EFBE-A429-42B8-A461-A7E1CDBBF796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127138:*:*:*:*:*:*",
              "matchCriteriaId": "622CDD01-6655-4786-AFB0-C1C2F5D5E0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127139:*:*:*:*:*:*",
              "matchCriteriaId": "BDCDF5A9-ACA3-40CE-B163-F8AA7C028A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127140:*:*:*:*:*:*",
              "matchCriteriaId": "5AA4A73B-B9E4-4B69-973E-A2F713037E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127141:*:*:*:*:*:*",
              "matchCriteriaId": "DA91290A-E4E0-412D-B5B7-C220B0F3087B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127142:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF4289-B176-4AEA-8860-9C81F15BFFB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127259:*:*:*:*:*:*",
              "matchCriteriaId": "1CA0315F-27AE-4A5A-A05A-33A876B9C314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7201B73-EB6C-4233-A8BF-CA5EE2DF6C73",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127109:*:*:*:*:*:*",
              "matchCriteriaId": "5AF53EDA-45A9-424F-937A-44C7FF7299F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127122:*:*:*:*:*:*",
              "matchCriteriaId": "C70F7D66-975A-4341-97E7-E6ED80A9F314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127123:*:*:*:*:*:*",
              "matchCriteriaId": "43D72341-8C61-4D07-BBFE-D611B41A511C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127138:*:*:*:*:*:*",
              "matchCriteriaId": "9BC8DCA0-FFC1-4487-8452-E6ED8A9C5A48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127139:*:*:*:*:*:*",
              "matchCriteriaId": "5FEDB823-5D06-4C65-9042-D99982395892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127140:*:*:*:*:*:*",
              "matchCriteriaId": "18EF9B8C-F8DD-455E-BE93-80EB83374084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127141:*:*:*:*:*:*",
              "matchCriteriaId": "89575D64-5969-4C11-8AC1-B48CA97A0558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127142:*:*:*:*:*:*",
              "matchCriteriaId": "E115A1C7-23CF-4E61-BC85-8B0884CE5BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127259:*:*:*:*:*:*",
              "matchCriteriaId": "258C790F-F7FE-4071-BAC2-45AB3D2212FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A1DA3A9-36FB-4BCA-AEEC-231A2C3127D0",
              "versionEndExcluding": "12.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127101:*:*:*:*:*:*",
              "matchCriteriaId": "0BA30C26-D3D8-447C-BD7A-9BC166C8BF3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127117:*:*:*:*:*:*",
              "matchCriteriaId": "162E0203-17E1-427E-A351-33F75E8FE5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127134:*:*:*:*:*:*",
              "matchCriteriaId": "61FB54BF-7A8F-4EE5-AF42-15E2B69E9DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127241:*:*:*:*:*:*",
              "matchCriteriaId": "764139C9-FF6A-4BE0-BAF3-52F403C41393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127242:*:*:*:*:*:*",
              "matchCriteriaId": "3D9805F6-1A56-4FBF-8F47-DAA80E4DE9FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127258:*:*:*:*:*:*",
              "matchCriteriaId": "0458F47B-0456-4005-9AB8-8183C3D1EBAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127259:*:*:*:*:*:*",
              "matchCriteriaId": "266773C9-96A6-4588-A781-AE1C34B247D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de directory traversal en la funcionalidad uploadMib de ManageEngine OpManager 12.7.258. Una solicitud HTTP especialmente manipulada puede dar lugar a la creaci\u00f3n de archivos arbitrarios. Un atacante puede enviar un archivo MiB malicioso para desencadenar esta vulnerabilidad."
    }
  ],
  "id": "CVE-2023-47211",
  "lastModified": "2024-11-21T08:29:57.783",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 5.3,
        "source": "talos-cna@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-01-08T15:15:25.287",
  "references": [
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html"
    }
  ],
  "sourceIdentifier": "talos-cna@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "talos-cna@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2022-36923
Vulnerability from cvelistv5
Published
2022-08-10 14:17
Modified
2024-08-03 10:14
Severity ?
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user's API key, and then access external APIs.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:14:29.360Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user\u0027s API key, and then access external APIs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-10T14:17:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-36923",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user\u0027s API key, and then access external APIs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-36923",
    "datePublished": "2022-08-10T14:17:09",
    "dateReserved": "2022-07-27T00:00:00",
    "dateUpdated": "2024-08-03T10:14:29.360Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-6035
Vulnerability from cvelistv5
Published
2014-12-04 17:00
Modified
2024-08-06 12:03
Severity ?
Summary
Directory traversal vulnerability in the FileCollector servlet in ZOHO ManageEngine OpManager 11.4, 11.3, and earlier allows remote attackers to write and execute arbitrary files via a .. (dot dot) in the FILENAME parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:03:02.336Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
          },
          {
            "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-09-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the FileCollector servlet in ZOHO ManageEngine OpManager 11.4, 11.3, and earlier allows remote attackers to write and execute arbitrary files via a .. (dot dot) in the FILENAME parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-12-04T15:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
        },
        {
          "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-6035",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the FileCollector servlet in ZOHO ManageEngine OpManager 11.4, 11.3, and earlier allows remote attackers to write and execute arbitrary files via a .. (dot dot) in the FILENAME parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix",
              "refsource": "CONFIRM",
              "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
            },
            {
              "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt",
              "refsource": "MISC",
              "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
            },
            {
              "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-6035",
    "datePublished": "2014-12-04T17:00:00",
    "dateReserved": "2014-09-01T00:00:00",
    "dateUpdated": "2024-08-06T12:03:02.336Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-13818
Vulnerability from cvelistv5
Published
2020-06-04 12:51
Modified
2024-08-04 12:25
Severity ?
Summary
In Zoho ManageEngine OpManager before 125144, when <cachestart> is used, directory traversal validation can be bypassed.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:25:16.515Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Zoho ManageEngine OpManager before 125144, when \u003ccachestart\u003e is used, directory traversal validation can be bypassed."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-06-09T15:06:14",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-13818",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Zoho ManageEngine OpManager before 125144, when \u003ccachestart\u003e is used, directory traversal validation can be bypassed."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-13818",
    "datePublished": "2020-06-04T12:51:17",
    "dateReserved": "2020-06-04T00:00:00",
    "dateUpdated": "2024-08-04T12:25:16.515Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-11527
Vulnerability from cvelistv5
Published
2020-04-04 16:26
Modified
2024-08-04 11:35
Severity ?
Summary
In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:35:12.797Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-04T16:26:25",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-11527",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-11527",
    "datePublished": "2020-04-04T16:26:25",
    "dateReserved": "2020-04-04T00:00:00",
    "dateUpdated": "2024-08-04T11:35:12.797Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-6036
Vulnerability from cvelistv5
Published
2014-12-04 17:00
Modified
2024-08-06 12:03
Severity ?
Summary
Directory traversal vulnerability in the multipartRequest servlet in ZOHO ManageEngine OpManager 11.3 and earlier, Social IT Plus 11.0, and IT360 10.3, 10.4, and earlier allows remote attackers or remote authenticated users to delete arbitrary files via a .. (dot dot) in the fileName parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:03:02.352Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
          },
          {
            "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-09-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the multipartRequest servlet in ZOHO ManageEngine OpManager 11.3 and earlier, Social IT Plus 11.0, and IT360 10.3, 10.4, and earlier allows remote attackers or remote authenticated users to delete arbitrary files via a .. (dot dot) in the fileName parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-12-04T15:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
        },
        {
          "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-6036",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the multipartRequest servlet in ZOHO ManageEngine OpManager 11.3 and earlier, Social IT Plus 11.0, and IT360 10.3, 10.4, and earlier allows remote attackers or remote authenticated users to delete arbitrary files via a .. (dot dot) in the fileName parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix",
              "refsource": "CONFIRM",
              "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
            },
            {
              "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt",
              "refsource": "MISC",
              "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
            },
            {
              "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-6036",
    "datePublished": "2014-12-04T17:00:00",
    "dateReserved": "2014-09-01T00:00:00",
    "dateUpdated": "2024-08-06T12:03:02.352Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7863
Vulnerability from cvelistv5
Published
2020-02-08 16:57
Modified
2024-08-06 13:03
Severity ?
Summary
The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.280Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2015/Jan/114"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-01-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-08T16:57:37",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2015/Jan/114"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-7863",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"
            },
            {
              "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt",
              "refsource": "MISC",
              "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"
            },
            {
              "name": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded",
              "refsource": "MISC",
              "url": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded"
            },
            {
              "name": "http://seclists.org/fulldisclosure/2015/Jan/114",
              "refsource": "MISC",
              "url": "http://seclists.org/fulldisclosure/2015/Jan/114"
            },
            {
              "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet",
              "refsource": "MISC",
              "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"
            },
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-7863",
    "datePublished": "2020-02-08T16:57:37",
    "dateReserved": "2014-10-05T00:00:00",
    "dateUpdated": "2024-08-06T13:03:27.280Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-29535
Vulnerability from cvelistv5
Published
2022-05-05 22:17
Modified
2024-08-03 06:26
Severity ?
Summary
Zoho ManageEngine OPManager through 125588 allows SQL Injection via a few default reports.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:26:06.231Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://manageengine.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OPManager through 125588 allows SQL Injection via a few default reports."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-05T22:17:40",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://manageengine.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-29535",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OPManager through 125588 allows SQL Injection via a few default reports."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://manageengine.com",
              "refsource": "MISC",
              "url": "https://manageengine.com"
            },
            {
              "name": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-29535",
    "datePublished": "2022-05-05T22:17:40",
    "dateReserved": "2022-04-20T00:00:00",
    "dateUpdated": "2024-08-03T06:26:06.231Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-18475
Vulnerability from cvelistv5
Published
2018-10-23 21:00
Modified
2024-08-05 11:08
Severity ?
Summary
Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:08:21.821Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html"
          },
          {
            "name": "20181019 Zoho ManageEngine OpManager 12.3 allows Unrestricted Arbitrary File Upload",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2018/Oct/42"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-10-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-23T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html"
        },
        {
          "name": "20181019 Zoho ManageEngine OpManager 12.3 allows Unrestricted Arbitrary File Upload",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2018/Oct/42"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-18475",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html"
            },
            {
              "name": "20181019 Zoho ManageEngine OpManager 12.3 allows Unrestricted Arbitrary File Upload",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2018/Oct/42"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-18475",
    "datePublished": "2018-10-23T21:00:00",
    "dateReserved": "2018-10-18T00:00:00",
    "dateUpdated": "2024-08-05T11:08:21.821Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-6034
Vulnerability from cvelistv5
Published
2014-12-04 17:00
Modified
2024-08-06 12:03
Severity ?
Summary
Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:03:02.341Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
          },
          {
            "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-09-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-12-04T15:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
        },
        {
          "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-6034",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix",
              "refsource": "CONFIRM",
              "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix"
            },
            {
              "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt",
              "refsource": "MISC",
              "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
            },
            {
              "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/Sep/110"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-6034",
    "datePublished": "2014-12-04T17:00:00",
    "dateReserved": "2014-09-01T00:00:00",
    "dateUpdated": "2024-08-06T12:03:02.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-35404
Vulnerability from cvelistv5
Published
2022-07-18 12:25
Modified
2024-08-03 09:36
Severity ?
Summary
ManageEngine Password Manager Pro 12100 and prior and OPManager 126100 and prior are vulnerable to unauthorized file and directory creation on a server machine.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T09:36:44.178Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://manageengine.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "ManageEngine Password Manager Pro 12100 and prior and OPManager 126100 and prior are vulnerable to unauthorized file and directory creation on a server machine."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-18T12:25:32",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://manageengine.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-35404",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ManageEngine Password Manager Pro 12100 and prior and OPManager 126100 and prior are vulnerable to unauthorized file and directory creation on a server machine."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://manageengine.com",
              "refsource": "MISC",
              "url": "https://manageengine.com"
            },
            {
              "name": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-35404",
    "datePublished": "2022-07-18T12:25:32",
    "dateReserved": "2022-07-08T00:00:00",
    "dateUpdated": "2024-08-03T09:36:44.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-41075
Vulnerability from cvelistv5
Published
2021-10-13 22:12
Modified
2024-08-04 02:59
Severity ?
Summary
The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:59:31.280Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-13T22:12:29",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-41075",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-41075",
    "datePublished": "2021-10-13T22:12:29",
    "dateReserved": "2021-09-14T00:00:00",
    "dateUpdated": "2024-08-04T02:59:31.280Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-11946
Vulnerability from cvelistv5
Published
2020-04-20 20:18
Modified
2024-08-04 11:42
Severity ?
Summary
Zoho ManageEngine OpManager before 125120 allows an unauthenticated user to retrieve an API key via a servlet call.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:42:00.822Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cwe.mitre.org/data/definitions/306.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager before 125120 allows an unauthenticated user to retrieve an API key via a servlet call."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-10T20:15:54",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cwe.mitre.org/data/definitions/306.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-11946",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager before 125120 allows an unauthenticated user to retrieve an API key via a servlet call."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
            },
            {
              "name": "https://cwe.mitre.org/data/definitions/306.html",
              "refsource": "MISC",
              "url": "https://cwe.mitre.org/data/definitions/306.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-11946",
    "datePublished": "2020-04-20T20:18:32",
    "dateReserved": "2020-04-20T00:00:00",
    "dateUpdated": "2024-08-04T11:42:00.822Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-27908
Vulnerability from cvelistv5
Published
2022-04-18 12:17
Modified
2024-08-03 05:41
Severity ?
Summary
Zoho ManageEngine OpManager before 125588 (and before 125603) is vulnerable to authenticated SQL Injection in the Inventory Reports module.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:41:10.774Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager before 125588 (and before 125603) is vulnerable to authenticated SQL Injection in the Inventory Reports module."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-18T12:17:13",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-27908",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager before 125588 (and before 125603) is vulnerable to authenticated SQL Injection in the Inventory Reports module."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-27908",
    "datePublished": "2022-04-18T12:17:13",
    "dateReserved": "2022-03-25T00:00:00",
    "dateUpdated": "2024-08-03T05:41:10.774Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-20339
Vulnerability from cvelistv5
Published
2018-12-21 09:00
Modified
2024-08-05 11:58
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:58:18.934Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
          },
          {
            "name": "106302",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106302"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-12-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-26T10:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
        },
        {
          "name": "106302",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106302"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-20339",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
            },
            {
              "name": "106302",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106302"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-20339",
    "datePublished": "2018-12-21T09:00:00",
    "dateReserved": "2018-12-21T00:00:00",
    "dateUpdated": "2024-08-05T11:58:18.934Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-11560
Vulnerability from cvelistv5
Published
2019-05-23 17:07
Modified
2024-08-05 18:12
Severity ?
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T18:12:40.351Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://manageengine.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://opmanager.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-05-23T17:07:27",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://manageengine.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://opmanager.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-11560",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://manageengine.com",
              "refsource": "MISC",
              "url": "http://manageengine.com"
            },
            {
              "name": "http://opmanager.com",
              "refsource": "MISC",
              "url": "http://opmanager.com"
            },
            {
              "name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736",
              "refsource": "MISC",
              "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-11560",
    "datePublished": "2019-05-23T17:07:27",
    "dateReserved": "2017-07-22T00:00:00",
    "dateUpdated": "2024-08-05T18:12:40.351Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-31099
Vulnerability from cvelistv5
Published
2023-05-04 00:00
Modified
2025-01-29 19:17
Summary
Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:45:25.621Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://manageengine.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-31099",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T19:16:34.882386Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-29T19:17:32.323Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-04T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://manageengine.com"
        },
        {
          "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-31099",
    "datePublished": "2023-05-04T00:00:00.000Z",
    "dateReserved": "2023-04-24T00:00:00.000Z",
    "dateUpdated": "2025-01-29T19:17:32.323Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12116
Vulnerability from cvelistv5
Published
2020-05-07 19:13
Modified
2024-08-04 11:48
Severity ?
Summary
Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:58.278Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-07T19:13:53",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-12116",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
            },
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-12116",
    "datePublished": "2020-05-07T19:13:32",
    "dateReserved": "2020-04-23T00:00:00",
    "dateUpdated": "2024-08-04T11:48:58.278Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-38772
Vulnerability from cvelistv5
Published
2022-08-29 20:21
Modified
2024-08-03 11:02
Severity ?
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T11:02:14.606Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://manageengine.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-29T20:21:57",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://manageengine.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-38772",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://manageengine.com",
              "refsource": "MISC",
              "url": "https://manageengine.com"
            },
            {
              "name": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-38772",
    "datePublished": "2022-08-29T20:21:57",
    "dateReserved": "2022-08-25T00:00:00",
    "dateUpdated": "2024-08-03T11:02:14.606Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-18980
Vulnerability from cvelistv5
Published
2018-11-06 04:00
Modified
2024-09-16 17:54
Severity ?
Summary
An XML External Entity injection (XXE) vulnerability exists in Zoho ManageEngine Network Configuration Manager and OpManager before 12.3.214 via the RequestXML parameter in a /devices/ProcessRequest.do GET request. For example, the attacker can trigger the transmission of local files to an arbitrary remote FTP server.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.500Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/x-f1v3/ForCve/issues/5"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An XML External Entity injection (XXE) vulnerability exists in Zoho ManageEngine Network Configuration Manager and OpManager before 12.3.214 via the RequestXML parameter in a /devices/ProcessRequest.do GET request. For example, the attacker can trigger the transmission of local files to an arbitrary remote FTP server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-06T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/x-f1v3/ForCve/issues/5"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-18980",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An XML External Entity injection (XXE) vulnerability exists in Zoho ManageEngine Network Configuration Manager and OpManager before 12.3.214 via the RequestXML parameter in a /devices/ProcessRequest.do GET request. For example, the attacker can trigger the transmission of local files to an arbitrary remote FTP server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
            },
            {
              "name": "https://github.com/x-f1v3/ForCve/issues/5",
              "refsource": "MISC",
              "url": "https://github.com/x-f1v3/ForCve/issues/5"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-18980",
    "datePublished": "2018-11-06T04:00:00Z",
    "dateReserved": "2018-11-05T00:00:00Z",
    "dateUpdated": "2024-09-16T17:54:36.803Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-9107
Vulnerability from cvelistv5
Published
2017-08-04 00:00
Modified
2024-08-06 08:36
Severity ?
Summary
Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn't use a per-system key or even a salt; therefore, it's possible to create a universal decryptor.
References
https://github.com/theguly/DecryptOpManagerx_refsource_MISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:36:31.930Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/theguly/DecryptOpManager"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn\u0027t use a per-system key or even a salt; therefore, it\u0027s possible to create a universal decryptor."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-04T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/theguly/DecryptOpManager"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-9107",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn\u0027t use a per-system key or even a salt; therefore, it\u0027s possible to create a universal decryptor."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/theguly/DecryptOpManager",
              "refsource": "MISC",
              "url": "https://github.com/theguly/DecryptOpManager"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-9107",
    "datePublished": "2017-08-04T00:00:00",
    "dateReserved": "2017-08-03T00:00:00",
    "dateUpdated": "2024-08-06T08:36:31.930Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-40493
Vulnerability from cvelistv5
Published
2021-10-13 22:07
Modified
2024-08-04 02:44
Severity ?
Summary
Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:44:10.865Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-13T22:07:34",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-40493",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-40493",
    "datePublished": "2021-10-13T22:07:34",
    "dateReserved": "2021-09-03T00:00:00",
    "dateUpdated": "2024-08-04T02:44:10.865Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-18949
Vulnerability from cvelistv5
Published
2018-11-05 09:00
Modified
2024-09-16 17:09
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.563Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-05T09:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-18949",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-18949",
    "datePublished": "2018-11-05T09:00:00Z",
    "dateReserved": "2018-11-05T00:00:00Z",
    "dateUpdated": "2024-09-16T17:09:10.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-12998
Vulnerability from cvelistv5
Published
2018-06-29 12:00
Modified
2024-08-05 08:52
Severity ?
Summary
A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T08:52:49.220Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/unh3x/just4cve/issues/10"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036"
          },
          {
            "name": "20180720 [CVE-2018-12998]Zoho manageengine Reflected XSS in multiple Products",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2018/Jul/75"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-06-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter \u0027operation\u0027 to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-24T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/unh3x/just4cve/issues/10"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036"
        },
        {
          "name": "20180720 [CVE-2018-12998]Zoho manageengine Reflected XSS in multiple Products",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2018/Jul/75"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-12998",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter \u0027operation\u0027 to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html"
            },
            {
              "name": "https://github.com/unh3x/just4cve/issues/10",
              "refsource": "MISC",
              "url": "https://github.com/unh3x/just4cve/issues/10"
            },
            {
              "name": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036",
              "refsource": "MISC",
              "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036"
            },
            {
              "name": "20180720 [CVE-2018-12998]Zoho manageengine Reflected XSS in multiple Products",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2018/Jul/75"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-12998",
    "datePublished": "2018-06-29T12:00:00",
    "dateReserved": "2018-06-29T00:00:00",
    "dateUpdated": "2024-08-05T08:52:49.220Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-47211
Vulnerability from cvelistv5
Published
2024-01-08 14:45
Modified
2024-08-02 21:01
Severity ?
Summary
A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
Impacted products
Vendor Product Version
ManageEngine OpManager Version: 12.7.258
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T21:01:22.684Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851",
            "tags": [
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851"
          },
          {
            "name": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpManager",
          "vendor": "ManageEngine",
          "versions": [
            {
              "status": "affected",
              "version": "12.7.258"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Discovered by Marcin \u0026#39;Icewall\u0026#39; Noga of Cisco Talos."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-08T18:00:25.765Z",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851",
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851"
        },
        {
          "name": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html",
          "url": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2023-47211",
    "datePublished": "2024-01-08T14:45:37.183Z",
    "dateReserved": "2023-11-07T15:35:52.521Z",
    "dateUpdated": "2024-08-02T21:01:22.684Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-18262
Vulnerability from cvelistv5
Published
2018-10-17 14:00
Modified
2024-08-05 11:08
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before build 123214 has XSS.
References
http://seclists.org/fulldisclosure/2018/Oct/34mailing-list, x_refsource_FULLDISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:08:21.308Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20181016 Vulnerability Disclose",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2018/Oct/34"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-10-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager 12.3 before build 123214 has XSS."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20181016 Vulnerability Disclose",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2018/Oct/34"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-18262",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager 12.3 before build 123214 has XSS."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20181016 Vulnerability Disclose",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2018/Oct/34"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-18262",
    "datePublished": "2018-10-17T14:00:00",
    "dateReserved": "2018-10-11T00:00:00",
    "dateUpdated": "2024-08-05T11:08:21.308Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7868
Vulnerability from cvelistv5
Published
2014-12-04 17:00
Modified
2024-08-06 13:03
Severity ?
Summary
Multiple SQL injection vulnerabilities in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the (1) OPM_BVNAME parameter in a Delete operation to the APMBVHandler servlet or (2) query parameter in a compare operation to the DataComparisonServlet servlet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.444Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "71002",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/71002"
          },
          {
            "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Nov/21"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
          },
          {
            "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the (1) OPM_BVNAME parameter in a Delete operation to the APMBVHandler servlet or (2) query parameter in a compare operation to the DataComparisonServlet servlet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "71002",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/71002"
        },
        {
          "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Nov/21"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
        },
        {
          "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-7868",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the (1) OPM_BVNAME parameter in a Delete operation to the APMBVHandler servlet or (2) query parameter in a compare operation to the DataComparisonServlet servlet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "71002",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/71002"
            },
            {
              "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/Nov/21"
            },
            {
              "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt",
              "refsource": "MISC",
              "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
            },
            {
              "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded"
            },
            {
              "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix",
              "refsource": "CONFIRM",
              "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix"
            },
            {
              "name": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-7868",
    "datePublished": "2014-12-04T17:00:00",
    "dateReserved": "2014-10-05T00:00:00",
    "dateUpdated": "2024-08-06T13:03:27.444Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-17421
Vulnerability from cvelistv5
Published
2019-11-21 14:36
Modified
2024-08-05 01:40
Severity ?
Summary
Incorrect file permissions on the packaged Nipper executable file in Zoho ManageEngine OpManager 12.4.072 and Firewall Analyzer 12.4.072 allow local users to elevate privileges to root by overwriting this file with a malicious payload.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:40:15.532Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://twitter.com/va_start"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect file permissions on the packaged Nipper executable file in Zoho ManageEngine OpManager 12.4.072 and Firewall Analyzer 12.4.072 allow local users to elevate privileges to root by overwriting this file with a malicious payload."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-29T18:40:57",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://twitter.com/va_start"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-17421",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incorrect file permissions on the packaged Nipper executable file in Zoho ManageEngine OpManager 12.4.072 and Firewall Analyzer 12.4.072 allow local users to elevate privileges to root by overwriting this file with a malicious payload."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://twitter.com/va_start",
              "refsource": "MISC",
              "url": "https://twitter.com/va_start"
            },
            {
              "name": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html",
              "refsource": "MISC",
              "url": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html"
            },
            {
              "name": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html",
              "refsource": "CONFIRM",
              "url": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-17421",
    "datePublished": "2019-11-21T14:36:02",
    "dateReserved": "2019-10-09T00:00:00",
    "dateUpdated": "2024-08-05T01:40:15.532Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-18715
Vulnerability from cvelistv5
Published
2018-11-20 19:00
Modified
2024-08-05 11:16
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:16:00.421Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Stored XSS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "https://seclists.org/bugtraq/2018/Oct/60"
          },
          {
            "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Stored XSS",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2018/Nov/3"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-10-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-20T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Stored XSS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "https://seclists.org/bugtraq/2018/Oct/60"
        },
        {
          "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Stored XSS",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2018/Nov/3"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-18715",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Stored XSS",
              "refsource": "BUGTRAQ",
              "url": "https://seclists.org/bugtraq/2018/Oct/60"
            },
            {
              "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Stored XSS",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2018/Nov/3"
            },
            {
              "name": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-18715",
    "datePublished": "2018-11-20T19:00:00",
    "dateReserved": "2018-10-27T00:00:00",
    "dateUpdated": "2024-08-05T11:16:00.421Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-15106
Vulnerability from cvelistv5
Published
2019-08-16 02:44
Modified
2024-08-05 00:34
Severity ?
Summary
An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:34:53.184Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/47229"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-08-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The \"username+\u0027@opm\u0027 string is used for the password. For example, if the username is admin, the password is admin@opm."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-27T21:06:58",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.exploit-db.com/exploits/47229"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-15106",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The \"username+\u0027@opm\u0027 string is used for the password. For example, if the username is admin, the password is admin@opm."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.exploit-db.com/exploits/47229",
              "refsource": "MISC",
              "url": "https://www.exploit-db.com/exploits/47229"
            },
            {
              "name": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html",
              "refsource": "MISC",
              "url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html"
            },
            {
              "name": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html",
              "refsource": "CONFIRM",
              "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html"
            },
            {
              "name": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html",
              "refsource": "CONFIRM",
              "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-15106",
    "datePublished": "2019-08-16T02:44:19",
    "dateReserved": "2019-08-15T00:00:00",
    "dateUpdated": "2024-08-05T00:34:53.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19921
Vulnerability from cvelistv5
Published
2018-12-06 22:00
Modified
2024-09-16 21:09
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:51:17.693Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-06T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-19921",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-19921",
    "datePublished": "2018-12-06T22:00:00Z",
    "dateReserved": "2018-12-06T00:00:00Z",
    "dateUpdated": "2024-09-16T21:09:00.961Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-7765
Vulnerability from cvelistv5
Published
2015-10-09 14:00
Modified
2024-09-17 02:46
Severity ?
Summary
ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of "plugin" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T07:59:00.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
          },
          {
            "name": "20150915 ManageEngine OpManager multiple vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2015/Sep/66"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
          },
          {
            "name": "38221",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/38221/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of \"plugin\" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-10-09T14:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
        },
        {
          "name": "20150915 ManageEngine OpManager multiple vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2015/Sep/66"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
        },
        {
          "name": "38221",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/38221/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-7765",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of \"plugin\" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability",
              "refsource": "CONFIRM",
              "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
            },
            {
              "name": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce",
              "refsource": "MISC",
              "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
            },
            {
              "name": "20150915 ManageEngine OpManager multiple vulnerabilities",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2015/Sep/66"
            },
            {
              "name": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
            },
            {
              "name": "38221",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/38221/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-7765",
    "datePublished": "2015-10-09T14:00:00Z",
    "dateReserved": "2015-10-09T00:00:00Z",
    "dateUpdated": "2024-09-17T02:46:53.483Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7864
Vulnerability from cvelistv5
Published
2015-02-04 16:00
Modified
2024-08-06 13:03
Severity ?
Summary
Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.505Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "manageengine-cve20147864-sql-injection(100555)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555"
          },
          {
            "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2015/Jan/114"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"
          },
          {
            "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-01-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "manageengine-cve20147864-sql-injection(100555)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555"
        },
        {
          "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2015/Jan/114"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"
        },
        {
          "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-7864",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "manageengine-cve20147864-sql-injection(100555)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555"
            },
            {
              "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2015/Jan/114"
            },
            {
              "name": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"
            },
            {
              "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet",
              "refsource": "CONFIRM",
              "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"
            },
            {
              "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded"
            },
            {
              "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt",
              "refsource": "MISC",
              "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-7864",
    "datePublished": "2015-02-04T16:00:00",
    "dateReserved": "2014-10-05T00:00:00",
    "dateUpdated": "2024-08-06T13:03:27.505Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-7766
Vulnerability from cvelistv5
Published
2015-10-09 14:00
Modified
2024-09-17 01:10
Severity ?
Summary
PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T07:59:00.448Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
          },
          {
            "name": "20150915 ManageEngine OpManager multiple vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2015/Sep/66"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
          },
          {
            "name": "38221",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/38221/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by \"INSERT/**/INTO.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-10-09T14:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
        },
        {
          "name": "20150915 ManageEngine OpManager multiple vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2015/Sep/66"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
        },
        {
          "name": "38221",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/38221/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-7766",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by \"INSERT/**/INTO.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability",
              "refsource": "CONFIRM",
              "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability"
            },
            {
              "name": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce",
              "refsource": "MISC",
              "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce"
            },
            {
              "name": "20150915 ManageEngine OpManager multiple vulnerabilities",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2015/Sep/66"
            },
            {
              "name": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html"
            },
            {
              "name": "38221",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/38221/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-7766",
    "datePublished": "2015-10-09T14:00:00Z",
    "dateReserved": "2015-10-09T00:00:00Z",
    "dateUpdated": "2024-09-17T01:10:42.494Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19288
Vulnerability from cvelistv5
Published
2018-11-15 06:00
Modified
2024-08-05 11:30
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:30:04.043Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
          },
          {
            "name": "105960",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/105960"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-20T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
        },
        {
          "name": "105960",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/105960"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-19288",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
            },
            {
              "name": "105960",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/105960"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-19288",
    "datePublished": "2018-11-15T06:00:00",
    "dateReserved": "2018-11-15T00:00:00",
    "dateUpdated": "2024-08-05T11:30:04.043Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-10541
Vulnerability from cvelistv5
Published
2020-03-13 05:34
Modified
2024-08-04 11:06
Severity ?
Summary
Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:06:09.448Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-13T05:34:25",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-10541",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-10541",
    "datePublished": "2020-03-13T05:34:26",
    "dateReserved": "2020-03-13T00:00:00",
    "dateUpdated": "2024-08-04T11:06:09.448Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-6105
Vulnerability from cvelistv5
Published
2023-11-15 20:57
Modified
2025-02-13 17:26
Summary
An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:21:17.671Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tenable.com/security/research/tra-2023-35"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Service Desk Plus",
          "vendor": "ManageEngine",
          "versions": [
            {
              "lessThan": "14304",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Asset Explorer",
          "vendor": "ManageEngine",
          "versions": [
            {
              "lessThan": "7004",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Access Manager Plus",
          "vendor": "ManageEngine",
          "versions": [
            {
              "lessThan": "14304",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.\u003cbr\u003e"
            }
          ],
          "value": "An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-176",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-176 Configuration/Environment Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-26T19:58:04.015Z",
        "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
        "shortName": "tenable"
      },
      "references": [
        {
          "url": "https://www.tenable.com/security/research/tra-2023-35"
        },
        {
          "url": "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "ManageEngine Information Disclosure in Multiple Products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
    "assignerShortName": "tenable",
    "cveId": "CVE-2023-6105",
    "datePublished": "2023-11-15T20:57:47.981Z",
    "dateReserved": "2023-11-13T15:10:28.339Z",
    "dateUpdated": "2025-02-13T17:26:03.759Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-11561
Vulnerability from cvelistv5
Published
2019-05-23 15:32
Modified
2024-08-05 18:12
Severity ?
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the "Group Chat" or "Alarm" section. This functionality can be abused by a malicious user by uploading a web shell.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T18:12:40.382Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://manageengine.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://opmanager.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the \"Group Chat\" or \"Alarm\" section. This functionality can be abused by a malicious user by uploading a web shell."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-05-23T15:32:59",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://manageengine.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://opmanager.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-11561",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the \"Group Chat\" or \"Alarm\" section. This functionality can be abused by a malicious user by uploading a web shell."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://manageengine.com",
              "refsource": "MISC",
              "url": "http://manageengine.com"
            },
            {
              "name": "http://opmanager.com",
              "refsource": "MISC",
              "url": "http://opmanager.com"
            },
            {
              "name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736",
              "refsource": "MISC",
              "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-11561",
    "datePublished": "2019-05-23T15:32:59",
    "dateReserved": "2017-07-22T00:00:00",
    "dateUpdated": "2024-08-05T18:12:40.382Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7867
Vulnerability from cvelistv5
Published
2014-12-04 17:00
Modified
2024-08-06 13:03
Severity ?
Summary
SQL injection vulnerability in the com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus servlet in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the probeName parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.310Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus servlet in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the probeName parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-12-04T15:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-7867",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus servlet in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the probeName parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix",
              "refsource": "CONFIRM",
              "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-7867",
    "datePublished": "2014-12-04T17:00:00",
    "dateReserved": "2014-10-05T00:00:00",
    "dateUpdated": "2024-08-06T13:03:27.310Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-44514
Vulnerability from cvelistv5
Published
2021-12-09 19:15
Modified
2024-08-04 04:25
Severity ?
Summary
OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T04:25:16.790Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-12T03:49:10",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-44514",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-44514",
    "datePublished": "2021-12-09T19:15:27",
    "dateReserved": "2021-12-01T00:00:00",
    "dateUpdated": "2024-08-04T04:25:16.790Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-28653
Vulnerability from cvelistv5
Published
2021-02-03 16:00
Modified
2024-08-04 16:40
Severity ?
Summary
Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T16:40:59.809Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-21T23:06:14",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-28653",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233",
              "refsource": "CONFIRM",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233"
            },
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203",
              "refsource": "CONFIRM",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203"
            },
            {
              "name": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-28653",
    "datePublished": "2021-02-03T16:00:18",
    "dateReserved": "2020-11-16T00:00:00",
    "dateUpdated": "2024-08-04T16:40:59.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-17243
Vulnerability from cvelistv5
Published
2018-09-20 07:00
Modified
2024-09-17 02:11
Severity ?
Summary
Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:47:04.101Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-09-20T07:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-17243",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me.html",
              "refsource": "CONFIRM",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-17243",
    "datePublished": "2018-09-20T07:00:00Z",
    "dateReserved": "2018-09-20T00:00:00Z",
    "dateUpdated": "2024-09-17T02:11:22.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-20078
Vulnerability from cvelistv5
Published
2021-04-01 18:03
Modified
2024-08-03 17:30
Severity ?
Summary
Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS.
References
Impacted products
Vendor Product Version
n/a Manage Engine OpManager Version: All versions prior to version build 125346
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:30:07.492Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.tenable.com/security/research/tra-2021-10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Manage Engine OpManager",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "All versions prior to version build 125346"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-01T18:03:48",
        "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
        "shortName": "tenable"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.tenable.com/security/research/tra-2021-10"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vulnreport@tenable.com",
          "ID": "CVE-2021-20078",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Manage Engine OpManager",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions prior to version build 125346"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tenable.com/security/research/tra-2021-10",
              "refsource": "MISC",
              "url": "https://www.tenable.com/security/research/tra-2021-10"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
    "assignerShortName": "tenable",
    "cveId": "CVE-2021-20078",
    "datePublished": "2021-04-01T18:03:48",
    "dateReserved": "2020-12-17T00:00:00",
    "dateUpdated": "2024-08-03T17:30:07.492Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7866
Vulnerability from cvelistv5
Published
2014-12-10 18:00
Modified
2024-08-06 13:03
Severity ?
Summary
Multiple directory traversal vulnerabilities in ZOHO ManageEngine OpManager 8 (build 88xx) through 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to write and execute arbitrary files via a .. (dot dot) in the (1) fileName parameter to the MigrateLEEData servlet or (2) zipFileName parameter in a downloadFileFromProbe operation to the MigrateCentralData servlet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.344Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Nov/21"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
          },
          {
            "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple directory traversal vulnerabilities in ZOHO ManageEngine OpManager 8 (build 88xx) through 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to write and execute arbitrary files via a .. (dot dot) in the (1) fileName parameter to the MigrateLEEData servlet or (2) zipFileName parameter in a downloadFileFromProbe operation to the MigrateCentralData servlet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Nov/21"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
        },
        {
          "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-7866",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple directory traversal vulnerabilities in ZOHO ManageEngine OpManager 8 (build 88xx) through 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to write and execute arbitrary files via a .. (dot dot) in the (1) fileName parameter to the MigrateLEEData servlet or (2) zipFileName parameter in a downloadFileFromProbe operation to the MigrateCentralData servlet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/Nov/21"
            },
            {
              "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt",
              "refsource": "MISC",
              "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt"
            },
            {
              "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded"
            },
            {
              "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability",
              "refsource": "CONFIRM",
              "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability"
            },
            {
              "name": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-7866",
    "datePublished": "2014-12-10T18:00:00",
    "dateReserved": "2014-10-05T00:00:00",
    "dateUpdated": "2024-08-06T13:03:27.344Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-5466
Vulnerability from cvelistv5
Published
2024-08-23 13:23
Modified
2024-08-23 15:37
Summary
Zohocorp ManageEngine OpManager and Remote Monitoring and Management versions 128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zohocorp:manageengine_opmanager_rmm:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "manageengine_opmanager_rmm",
            "vendor": "zohocorp",
            "versions": [
              {
                "lessThanOrEqual": "128329",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "manageengine_opmanager_plus",
            "vendor": "zohocorp",
            "versions": [
              {
                "lessThanOrEqual": "128329",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "manageengine_opmanager_msp",
            "vendor": "zohocorp",
            "versions": [
              {
                "lessThanOrEqual": "128329",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "manageengine_opmanager",
            "vendor": "zohocorp",
            "versions": [
              {
                "lessThanOrEqual": "128329",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-5466",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-23T15:23:03.122113Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-23T15:37:32.493Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://www.manageengine.com/network-monitoring/",
          "defaultStatus": "unaffected",
          "product": "OpManager, Remote Monitoring and Management",
          "vendor": "ManageEngine",
          "versions": [
            {
              "lessThanOrEqual": "128329",
              "status": "affected",
              "version": "0",
              "versionType": "128329"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Zohocorp ManageEngine OpManager and\u0026nbsp;Remote Monitoring and Management versions\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "Zohocorp ManageEngine OpManager and\u00a0Remote Monitoring and Management versions\u00a0128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-23T13:23:22.144Z",
        "orgId": "0fc0942c-577d-436f-ae8e-945763c79b02",
        "shortName": "ManageEngine"
      },
      "references": [
        {
          "url": "https://www.manageengine.com/itom/advisory/cve-2024-5466.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Remote Code Execution",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "0fc0942c-577d-436f-ae8e-945763c79b02",
    "assignerShortName": "ManageEngine",
    "cveId": "CVE-2024-5466",
    "datePublished": "2024-08-23T13:23:22.144Z",
    "dateReserved": "2024-05-29T09:42:19.974Z",
    "dateUpdated": "2024-08-23T15:37:32.493Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-18716
Vulnerability from cvelistv5
Published
2018-11-20 19:00
Modified
2024-08-05 11:16
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:16:00.422Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "https://seclists.org/bugtraq/2018/Oct/61"
          },
          {
            "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2018/Nov/6"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-10-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-20T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "https://seclists.org/bugtraq/2018/Oct/61"
        },
        {
          "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2018/Nov/6"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-18716",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "https://seclists.org/bugtraq/2018/Oct/61"
            },
            {
              "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2018/Nov/6"
            },
            {
              "name": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-18716",
    "datePublished": "2018-11-20T19:00:00",
    "dateReserved": "2018-10-27T00:00:00",
    "dateUpdated": "2024-08-05T11:16:00.422Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-20338
Vulnerability from cvelistv5
Published
2018-12-21 09:00
Modified
2024-08-05 11:58
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:58:19.151Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
          },
          {
            "name": "106302",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106302"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-12-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-26T10:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
        },
        {
          "name": "106302",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106302"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-20338",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
            },
            {
              "name": "106302",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106302"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-20338",
    "datePublished": "2018-12-21T09:00:00",
    "dateReserved": "2018-12-21T00:00:00",
    "dateUpdated": "2024-08-05T11:58:19.151Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-37024
Vulnerability from cvelistv5
Published
2022-08-09 15:15
Modified
2024-08-03 10:21
Severity ?
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:21:32.557Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-09T15:15:36",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-37024",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-37024",
    "datePublished": "2022-08-09T15:15:36",
    "dateReserved": "2022-07-29T00:00:00",
    "dateUpdated": "2024-08-03T10:21:32.557Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-20173
Vulnerability from cvelistv5
Published
2018-12-17 08:00
Modified
2024-09-16 16:38
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:51:19.270Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-17T08:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-20173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-20173",
    "datePublished": "2018-12-17T08:00:00Z",
    "dateReserved": "2018-12-17T00:00:00Z",
    "dateUpdated": "2024-09-16T16:38:57.115Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-17283
Vulnerability from cvelistv5
Published
2018-09-21 03:00
Modified
2024-08-05 10:47
Severity ?
Summary
Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:47:04.101Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/x-f1v3/ForCve/issues/4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-09-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-09-21T03:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/x-f1v3/ForCve/issues/4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-17283",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me.html"
            },
            {
              "name": "https://github.com/x-f1v3/ForCve/issues/4",
              "refsource": "MISC",
              "url": "https://github.com/x-f1v3/ForCve/issues/4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-17283",
    "datePublished": "2018-09-21T03:00:00",
    "dateReserved": "2018-09-20T00:00:00",
    "dateUpdated": "2024-08-05T10:47:04.101Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-43473
Vulnerability from cvelistv5
Published
2023-03-30 16:28
Modified
2025-02-11 19:14
Summary
A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve a malicious XML payload to trigger this vulnerability.
Impacted products
Vendor Product Version
ManageEngine OpManager Version: 12.6.168
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:32:59.643Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1685"
          },
          {
            "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685",
            "tags": [
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685"
          },
          {
            "name": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-43473",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-11T19:13:55.362515Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-11T19:14:03.416Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpManager",
          "vendor": "ManageEngine",
          "versions": [
            {
              "status": "affected",
              "version": " 12.6.168"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve \r\na malicious XML payload to trigger this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-03-30T16:28:35.983Z",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685",
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685"
        },
        {
          "name": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html",
          "url": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2022-43473",
    "datePublished": "2023-03-30T16:28:35.983Z",
    "dateReserved": "2022-12-05T20:53:36.058Z",
    "dateUpdated": "2025-02-11T19:14:03.416Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-12133
Vulnerability from cvelistv5
Published
2019-06-18 21:27
Modified
2024-08-04 23:10
Severity ?
Summary
Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T23:10:30.563Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-18T18:00:42",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-12133",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html",
              "refsource": "CONFIRM",
              "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html"
            },
            {
              "name": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md",
              "refsource": "MISC",
              "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-12133",
    "datePublished": "2019-06-18T21:27:25",
    "dateReserved": "2019-05-15T00:00:00",
    "dateUpdated": "2024-08-04T23:10:30.563Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-41288
Vulnerability from cvelistv5
Published
2021-09-30 18:11
Modified
2024-08-04 03:08
Severity ?
Summary
Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T03:08:31.921Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-30T18:11:14",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-41288",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-41288",
    "datePublished": "2021-09-30T18:11:14",
    "dateReserved": "2021-09-15T00:00:00",
    "dateUpdated": "2024-08-04T03:08:31.921Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-12997
Vulnerability from cvelistv5
Published
2018-06-29 12:00
Modified
2024-08-05 08:52
Severity ?
Summary
Incorrect Access Control in FailOverHelperServlet in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows attackers to read certain files on the web server without login by sending a specially crafted request to the server with the operation=copyfile&fileName= substring.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T08:52:49.423Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/unh3x/just4cve/issues/8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037"
          },
          {
            "name": "20180720 [CVE-2018-12997]Zoho manageengine Arbitrary File Read in multiple Products",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2018/Jul/73"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-06-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect Access Control in FailOverHelperServlet in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows attackers to read certain files on the web server without login by sending a specially crafted request to the server with the operation=copyfile\u0026fileName= substring."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-24T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/unh3x/just4cve/issues/8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037"
        },
        {
          "name": "20180720 [CVE-2018-12997]Zoho manageengine Arbitrary File Read in multiple Products",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2018/Jul/73"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-12997",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incorrect Access Control in FailOverHelperServlet in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows attackers to read certain files on the web server without login by sending a specially crafted request to the server with the operation=copyfile\u0026fileName= substring."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html"
            },
            {
              "name": "https://github.com/unh3x/just4cve/issues/8",
              "refsource": "MISC",
              "url": "https://github.com/unh3x/just4cve/issues/8"
            },
            {
              "name": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037",
              "refsource": "MISC",
              "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037"
            },
            {
              "name": "20180720 [CVE-2018-12997]Zoho manageengine Arbitrary File Read in multiple Products",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2018/Jul/73"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-12997",
    "datePublished": "2018-06-29T12:00:00",
    "dateReserved": "2018-06-29T00:00:00",
    "dateUpdated": "2024-08-05T08:52:49.423Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-17602
Vulnerability from cvelistv5
Published
2019-10-15 21:00
Modified
2024-08-05 01:47
Severity ?
Summary
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:47:13.363Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-15T21:00:15",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-17602",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-17602",
    "datePublished": "2019-10-15T21:00:15",
    "dateReserved": "2019-10-15T00:00:00",
    "dateUpdated": "2024-08-05T01:47:13.363Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-3287
Vulnerability from cvelistv5
Published
2021-04-22 12:58
Modified
2024-08-03 16:53
Severity ?
Summary
Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:53:16.496Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-21T23:06:16",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-3287",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329",
              "refsource": "MISC",
              "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329"
            },
            {
              "name": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-3287",
    "datePublished": "2021-04-22T12:58:00",
    "dateReserved": "2021-01-25T00:00:00",
    "dateUpdated": "2024-08-03T16:53:16.496Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-11559
Vulnerability from cvelistv5
Published
2019-05-23 17:09
Modified
2024-08-05 18:12
Severity ?
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. The 'apiKey' parameter of "/api/json/admin/getmailserversettings" and "/api/json/dashboard/gotoverviewlist" is vulnerable to a Blind SQL Injection attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T18:12:40.323Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://manageengine.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://opmanager.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. The \u0027apiKey\u0027 parameter of \"/api/json/admin/getmailserversettings\" and \"/api/json/dashboard/gotoverviewlist\" is vulnerable to a Blind SQL Injection attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-05-23T17:09:19",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://manageengine.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://opmanager.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-11559",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. The \u0027apiKey\u0027 parameter of \"/api/json/admin/getmailserversettings\" and \"/api/json/dashboard/gotoverviewlist\" is vulnerable to a Blind SQL Injection attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://manageengine.com",
              "refsource": "MISC",
              "url": "http://manageengine.com"
            },
            {
              "name": "http://opmanager.com",
              "refsource": "MISC",
              "url": "http://opmanager.com"
            },
            {
              "name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736",
              "refsource": "MISC",
              "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-11559",
    "datePublished": "2019-05-23T17:09:19",
    "dateReserved": "2017-07-22T00:00:00",
    "dateUpdated": "2024-08-05T18:12:40.323Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}