Vulnerabilites related to zohocorp - manageengine_opmanager
Vulnerability from fkie_nvd
Published
2014-12-04 17:59
Modified
2024-11-21 02:13
Severity ?
Summary
Directory traversal vulnerability in the FileCollector servlet in ZOHO ManageEngine OpManager 11.4, 11.3, and earlier allows remote attackers to write and execute arbitrary files via a .. (dot dot) in the FILENAME parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | * | |
zohocorp | manageengine_opmanager | 11.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "66913D18-7CFF-4375-9FAB-3DB0D8802CB4", "versionEndIncluding": "11.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the FileCollector servlet in ZOHO ManageEngine OpManager 11.4, 11.3, and earlier allows remote attackers to write and execute arbitrary files via a .. (dot dot) in the FILENAME parameter." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en el servlet FileCollector en ZOHO ManageEngine OpManager 11.4, 11.3, y anteriores permite a atacantes remotos escribir y ejecutar ficheros arbitrarios a trav\u00e9s de un .. (punto punto) en el par\u00e1metro FILENAME." } ], "id": "CVE-2014-6035", "lastModified": "2024-11-21T02:13:38.327", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-04T17:59:03.767", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-04 00:29
Modified
2024-11-21 02:39
Severity ?
Summary
Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn't use a per-system key or even a salt; therefore, it's possible to create a universal decryptor.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/theguly/DecryptOpManager | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/theguly/DecryptOpManager | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | 11.0 | |
zohocorp | manageengine_opmanager | 11.1 | |
zohocorp | manageengine_opmanager | 11.2 | |
zohocorp | manageengine_opmanager | 11.3 | |
zohocorp | manageengine_opmanager | 11.4 | |
zohocorp | manageengine_opmanager | 11.5 | |
zohocorp | manageengine_opmanager | 11.6 | |
zohocorp | manageengine_opmanager | 12.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDEC9C04-2DA1-4307-8828-9E91352FB055", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0DD4D0DE-2B11-48AA-A60B-ED6B6DB94020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "0E7D1014-51CF-4A24-9935-BD385E1EE57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.6:*:*:*:*:*:*:*", "matchCriteriaId": "BD940D38-D057-47D0-98EC-B38B0C781A3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "4EF7ED07-3132-4670-831B-CCD6F34E5C3D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn\u0027t use a per-system key or even a salt; therefore, it\u0027s possible to create a universal decryptor." }, { "lang": "es", "value": "Zoho ManageEngine OpManager 11 en su versi\u00f3n 12.2 utiliza un algoritmo de cifrado personalizado para proteger las credenciales utilizadas para acceder a los dispositivos monitorizados. El algoritmo implementado no utiliza una clave para cada sistema o incluso una semilla, por lo que es posible crear un descifrador universal." } ], "id": "CVE-2015-9107", "lastModified": "2024-11-21T02:39:48.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-04T00:29:00.173", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/theguly/DecryptOpManager" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/theguly/DecryptOpManager" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-01 19:15
Modified
2024-11-21 05:45
Severity ?
Summary
Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS.
References
▼ | URL | Tags | |
---|---|---|---|
vulnreport@tenable.com | https://www.tenable.com/security/research/tra-2021-10 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2021-10 | Exploit, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*", "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*", "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*", "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*", "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS." }, { "lang": "es", "value": "Las compilaciones de Manage Engine OpManager por debajo de 125346, son vulnerables a una vulnerabilidad de denegaci\u00f3n de servicio remota debido a un problema de salto de ruta en el componente spark gateway.\u0026#xa0;Esto permite que un atacante remoto elimine remotamente cualquier directorio o directorios del sistema operativo." } ], "id": "CVE-2021-20078", "lastModified": "2024-11-21T05:45:53.147", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.4, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-01T19:15:13.450", "references": [ { "source": "vulnreport@tenable.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2021-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2021-10" } ], "sourceIdentifier": "vulnreport@tenable.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-04 16:59
Modified
2024-11-21 02:18
Severity ?
Summary
Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | 8.8 | |
zohocorp | manageengine_opmanager | 9.0 | |
zohocorp | manageengine_opmanager | 9.1 | |
zohocorp | manageengine_opmanager | 9.2 | |
zohocorp | manageengine_opmanager | 9.4 | |
zohocorp | manageengine_opmanager | 10.0 | |
zohocorp | manageengine_opmanager | 10.1 | |
zohocorp | manageengine_opmanager | 10.2 | |
zohocorp | manageengine_opmanager | 11.0 | |
zohocorp | manageengine_opmanager | 11.1 | |
zohocorp | manageengine_opmanager | 11.2 | |
zohocorp | manageengine_opmanager | 11.3 | |
zohocorp | manageengine_opmanager | 11.4 | |
zohocorp | manageengine_opmanager | 11.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "A35DA35B-6836-41FD-9B1D-E76809D19304", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B48CA686-28DF-4CE5-A950-1C62D162D987", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "504C45FC-1A8C-4C6A-AA55-4B2C21DF5BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E6403B7-8C3D-40D1-A32B-3A50B2A6D005", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.4:*:*:*:*:*:*:*", "matchCriteriaId": "DAD3BAD6-58BE-4099-994C-9DBFA2210D2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E30D446-E54B-414B-BEB0-E7C2AD6DC092", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "900914C7-4A60-45D2-90E1-3488998C77B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FE71B7E-88F9-45B3-911C-472B5438D062", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDEC9C04-2DA1-4307-8828-9E91352FB055", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0DD4D0DE-2B11-48AA-A60B-ED6B6DB94020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "0E7D1014-51CF-4A24-9935-BD385E1EE57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en el servlet FailOverHelperServlet (tambi\u00e9n conocido como FailServlet) en ZOHO ManageEngine OpManager 8 hasta 11.5 build 11400 y IT360 10.5 y anteriores permiten a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro (1) customerName o (2) serverRole en una operaci\u00f3n standbyUpdateInCentral en servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet." } ], "id": "CVE-2014-7864", "lastModified": "2024-11-21T02:18:10.010", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-02-04T16:59:00.060", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/114" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-20 07:29
Modified
2024-11-21 03:54
Severity ?
Summary
Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A479DB39-D6A7-4D36-8AE4-76CF1E74D6F4", "versionEndExcluding": "12.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection." }, { "lang": "es", "value": "Global Search en Zoho ManageEngine OpManager en versiones anteriores a la 12.3 123205 permite la inyecci\u00f3n SQL." } ], "id": "CVE-2018-17243", "lastModified": "2024-11-21T03:54:08.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T07:29:00.267", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-16 03:15
Modified
2024-11-21 04:28
Severity ?
Summary
An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E60B8B3-E1EC-4EEB-B955-22B410EBAD41", "versionEndIncluding": "12.4.034", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The \"username+\u0027@opm\u0027 string is used for the password. For example, if the username is admin, the password is admin@opm." }, { "lang": "es", "value": "Se ha detectado un problema en Zoho ManageEngine OpManager en compilaciones anteriores a 14310. Se puede omitir el requisito de contrase\u00f1a de usuario y ejecutar comandos en el servidor. Para la contrase\u00f1a se utiliza la cadena \"nombre de usuario+\u0027@opm\u0027. Por ejemplo, si el nombre de usuario es admin, la contrase\u00f1a es admin-opm." } ], "id": "CVE-2019-15106", "lastModified": "2024-11-21T04:28:03.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-16T03:15:11.327", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/47229" }, { "source": "cve@mitre.org", "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html" }, { "source": "cve@mitre.org", "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/47229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-21 09:29
Modified
2024-11-21 04:01
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/106302 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106302 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*", "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*", "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*", "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*", "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*", "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*", "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*", "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*", "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*", "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*", "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*", "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*", "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*", "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*", "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*", "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*", "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*", "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*", "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*", "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*", "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*", "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*", "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*", "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*", "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*", "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*", "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*", "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*", "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*", "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*", "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*", "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*", "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*", "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*", "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*", "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*", "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*", "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*", "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*", "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*", "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*", "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*", "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*", "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*", "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*", "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*", "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*", "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*", "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*", "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*", "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*", "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*", "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*", "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*", "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*", "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*", "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*", "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*", "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*", "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*", "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*", "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*", "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*", "matchCriteriaId": "F3F7F501-1F21-4825-BD82-23ACA713FFD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*", "matchCriteriaId": "422417EA-FF20-428A-AC02-18D4F84DA123", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*", "matchCriteriaId": "59BCAF6B-CAC3-4142-B303-7B85B24C573C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*", "matchCriteriaId": "136E1AE8-723C-4A85-AC7A-A5FA557BE66F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*", "matchCriteriaId": "19BE3780-3FAB-46C9-9399-62C18EA1A322", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*", "matchCriteriaId": "D32CDFC3-8041-426B-BBE0-245703D4D74E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*", "matchCriteriaId": "6B95BC46-7679-415E-814B-29DA657A718E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123238:*:*:*:*:*:*", "matchCriteriaId": "C4C6D08A-13C8-4BE9-870A-9EB4591F984A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section." }, { "lang": "es", "value": "Zoho ManageEngine OpManager, en versiones 12.3 anteriores a la build 123239, permite Cross-Site Scripting (XSS) en la columna Notes de la secci\u00f3n Alarms." } ], "id": "CVE-2018-20339", "lastModified": "2024-11-21T04:01:16.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-21T09:29:00.450", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106302" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-18 22:15
Modified
2024-11-21 04:22
Severity ?
Summary
Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_analytics_plus:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "14FAD4FD-CD54-4FE7-A849-A4837D3413B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_browser_security_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB71331-CB4A-41FD-AC26-90F833ED9D52", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_desktop_central:10.0.380:*:*:*:*:*:*:*", "matchCriteriaId": "643C7F9E-F838-421C-BB13-ECCFDF073C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:12.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "67C97619-847C-43B7-ADC8-B9B9833FA5DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF81E8-5FEE-4178-9FB0-49CB377329BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_key_manager_plus:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "ABCFC9E0-7B46-46AB-87D4-596993A15859", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:9.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B2AF501-8A1A-4BB8-B796-0AFCF379B23A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "26D0B03D-B7B2-4E45-837A-C29DF895C065", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB014B4E-EB9B-4B71-9E9C-EB28E254FBB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_o365_manager_plus:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F7C3D36-6C00-488D-B862-68EC243A9348", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1B6B47F-EE8C-49C7-B2FF-B886C2D68849", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.9:*:*:*:*:*:*:*", "matchCriteriaId": "3E409911-AB1C-47CA-9E69-484B7E16FC17", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC1451EC-1F96-42AF-BEC9-0D370E827643", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_manager_plus:9.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F64E8AC1-A456-46B8-8940-A200C328A7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD30D38-181E-4397-98DF-A7BE8D745A10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "457BE370-7CAF-4010-AC8C-A059F4892408", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_vulnerability_manager_plus:9.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D50F7EAA-D965-4C81-867C-FE4FC0DC9BB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus." }, { "lang": "es", "value": "Varios productos Zoho ManageEngine sufren una escalada de privilegios locales debido a permisos inapropiados para el directorio %SYSTEMDRIVE%\\ManageEngine y sus subcarpetas. Adem\u00e1s, los servicios asociados con dichos productos intentan ejecutar archivos binarios como sc.exe desde el directorio actual durante un inicio de sistema. Esto permitir\u00e1 efectivamente a los usuarios no privilegiados escalar sus privilegios a NT AUTHORITY\\SYSTEM. Esto afecta a Desktop Central versi\u00f3n 10.0.380, EventLog Analyzer versi\u00f3n 12.0.2, ServiceDesk Plus versi\u00f3n 10.0.0, SupportCenter Plus versi\u00f3n 8.1, O365 Manager Plus versi\u00f3n 4.0, Mobile Device Manager Plus versi\u00f3n 9.0.0, Patch Connect Plus versi\u00f3n 9.0.0, Vulnerability Manager Plus versi\u00f3n 9.0.0 , Patch Manager Plus versi\u00f3n 9.0.0, OpManager versi\u00f3n 12.3, NetFlow Analyzer versi\u00f3n 11.0, OpUtils versi\u00f3n 11.0, Network Configuration Manager versi\u00f3n 11.0, FireWall versi\u00f3n 12.0, Key Manager Plus versi\u00f3n 5.6, Password Manager Pro versi\u00f3n 9.9, Analytics Plus versi\u00f3n 1.0 y Browser Security Plus." } ], "id": "CVE-2019-12133", "lastModified": "2024-11-21T04:22:17.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-18T22:15:12.027", "references": [ { "source": "cve@mitre.org", "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" }, { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-06 22:29
Modified
2024-11-21 03:58
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*", "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*", "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*", "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*", "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*", "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*", "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*", "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*", "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*", "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*", "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*", "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*", "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*", "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*", "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*", "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*", "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*", "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*", "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*", "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*", "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*", "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*", "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*", "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*", "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*", "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*", "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*", "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*", "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*", "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*", "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*", "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*", "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*", "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*", "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*", "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*", "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*", "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*", "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*", "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*", "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*", "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*", "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*", "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*", "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*", "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*", "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*", "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*", "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*", "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*", "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*", "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*", "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*", "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*", "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*", "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*", "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*", "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*", "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*", "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*", "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*", "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*", "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*", "matchCriteriaId": "CBF58EC7-2DDA-4EC0-8406-F3B711B62974", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*", "matchCriteriaId": "CD036146-E374-4571-9302-9978CD892805", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*", "matchCriteriaId": "7112E33A-C694-432D-8880-BB2211EBA5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*", "matchCriteriaId": "932A2D27-CC0E-4F33-AD0C-4876984F1F26", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123219:*:*:*:*:*:*", "matchCriteriaId": "2C55FF31-14E0-4D66-9F33-CF907B684C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123220:*:*:*:*:*:*", "matchCriteriaId": "4F8BD66B-6AB2-46C9-8133-6677ACBEDC10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123221:*:*:*:*:*:*", "matchCriteriaId": "54DA156C-85E1-4A2D-9612-02C05180AB06", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123222:*:*:*:*:*:*:*", "matchCriteriaId": "6FA72B2A-6915-4665-938A-41F69FBB8644", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123223:*:*:*:*:*:*:*", "matchCriteriaId": "DABFE658-72C2-43DF-95C6-28C383B58B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123224:*:*:*:*:*:*:*", "matchCriteriaId": "2A9948BE-A9FC-47EA-A697-65424628BE2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123229:*:*:*:*:*:*:*", "matchCriteriaId": "75978426-63A2-413E-8164-A9DCB2DC8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123230:*:*:*:*:*:*:*", "matchCriteriaId": "8E56DF0C-7B84-4E42-897B-FD3DEE933BBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:123231:*:*:*:*:*:*:*", "matchCriteriaId": "C35A7D32-856A-49FE-8896-9006FE4BDA74", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller." }, { "lang": "es", "value": "Zoho ManageEngine OpManager 12.3 antes de 123237 tiene Cross-Site Scripting (XSS) en el controlador del dominio." } ], "id": "CVE-2018-19921", "lastModified": "2024-11-21T03:58:48.893", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-06T22:29:04.723", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-22 13:15
Modified
2024-11-21 06:21
Severity ?
Summary
Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329 | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class." }, { "lang": "es", "value": "Zoho ManageEngine OpManager versiones anteriores a 12.5.329, permite una ejecuci\u00f3n de c\u00f3digo remota no autenticada debido a una omisi\u00f3n general en la clase de deserializaci\u00f3n" } ], "id": "CVE-2021-3287", "lastModified": "2024-11-21T06:21:13.537", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-22T13:15:07.970", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-05 23:15
Modified
2024-11-21 06:59
Severity ?
Summary
Zoho ManageEngine OPManager through 125588 allows SQL Injection via a few default reports.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*", "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*", "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*", "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*", "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*", "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*", "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*", "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*", "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*", "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*", "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*", "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*", "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*", "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*", "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*", "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*", "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*", "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*", "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*", "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*", "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*", "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*", "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*", "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*", "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*", "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*", "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*", "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*", "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*", "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*", "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*", "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*", "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*", "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*", "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*", "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*", "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*", "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*", "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*", "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*", "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*", "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*", "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125457:*:*:*:*:*:*", "matchCriteriaId": "BC457292-04FE-4643-8F1D-05DAEF3F70BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*", "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*", "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*", "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125476:*:*:*:*:*:*", "matchCriteriaId": "BE930B14-4B22-4299-8DE8-7625342FC4E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*", "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*", "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*", "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*", "matchCriteriaId": "7D394493-D690-44F0-B3F0-FD39E46F31C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "AF8CBF57-EF1A-4C84-879B-1A4035F4236A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*", "matchCriteriaId": "2F1E924E-8896-41CE-82E2-F22943A02FCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*", "matchCriteriaId": "FB058840-E3D0-45FA-B95F-3445A7719118", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125604:*:*:*:*:*:*", "matchCriteriaId": "913CD99C-8F47-47BD-BD7C-33762861BB08", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OPManager through 125588 allows SQL Injection via a few default reports." }, { "lang": "es", "value": "Zoho ManageEngine OPManager versiones hasta 125588, permite una inyecci\u00f3n SQL por medio de algunos informes por defecto" } ], "id": "CVE-2022-29535", "lastModified": "2024-11-21T06:59:16.917", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-05T23:15:09.367", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://manageengine.com" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://manageengine.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-04 17:59
Modified
2024-11-21 02:18
Severity ?
Summary
Multiple SQL injection vulnerabilities in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the (1) OPM_BVNAME parameter in a Delete operation to the APMBVHandler servlet or (2) query parameter in a compare operation to the DataComparisonServlet servlet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_social_it_plus | 11.0 | |
zohocorp | manageengine_opmanager | 11.3 | |
zohocorp | manageengine_opmanager | 11.4 | |
zohocorp | manageengine_it360 | 10.3.0 | |
zohocorp | manageengine_it360 | 10.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "B68292A0-79E4-4CEE-844E-05342994E534", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9176D056-7350-4371-8F7E-87C2521EEBF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C71A803-6D67-4D8F-8072-73C10532BB30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the (1) OPM_BVNAME parameter in a Delete operation to the APMBVHandler servlet or (2) query parameter in a compare operation to the DataComparisonServlet servlet." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en ZOHO ManageEngine OpManager 11.3 y 11.4, IT360 10.3 y 10.4, y Social IT Plus 11.0 permiten a atacantes remotos o usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s de (1) el par\u00e1metro OPM_BVNAME en una operaci\u00f3n de eliminar en el servlet APMBVHandler o (2) el par\u00e1metro query en una operaci\u00f3n de compara en el servlet DataComparisonServlet." } ], "id": "CVE-2014-7868", "lastModified": "2024-11-21T02:18:10.457", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-04T17:59:06.720", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/21" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/71002" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/71002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-13 23:15
Modified
2024-11-21 06:24
Severity ?
Summary
Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*", "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*", "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*", "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*", "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*", "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*", "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*", "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*", "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*", "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*", "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*", "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*", "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*", "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*", "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*", "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*", "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*", "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*", "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*", "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*", "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*", "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*", "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*", "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*", "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*", "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*", "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*", "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*", "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*", "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*", "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*", "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*", "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*", "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*", "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*", "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*", "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*", "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*", "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*", "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API." }, { "lang": "es", "value": "OpManager de Zoho ManageEngine versiones anteriores a 125437, es vulnerable a una inyecci\u00f3n SQL en el m\u00f3dulo de diagn\u00f3sticos de soporte. Esto ocurre por medio del par\u00e1metro pollingObject de la API getDataCollectionFailureReason" } ], "id": "CVE-2021-40493", "lastModified": "2024-11-21T06:24:15.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-13T23:15:07.247", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-06-29 12:29
Modified
2024-11-21 03:46
Severity ?
Summary
Incorrect Access Control in FailOverHelperServlet in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows attackers to read certain files on the web server without login by sending a specially crafted request to the server with the operation=copyfile&fileName= substring.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:firewall_analyzer:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DFC3545-5EE0-4722-BFB6-58B3AF246F87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:-:*:*:*:*:*:*:*", "matchCriteriaId": "0940949F-4EB4-460B-8CE9-56B6387250F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1C4C73-FD72-4EE7-BE63-D83C373E6A3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:-:*:*:*:*:*:*:*", "matchCriteriaId": "91373406-389A-404C-81A1-BA994B0C06DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AE5990D-D4B9-4D55-B221-20A9BF765C0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Access Control in FailOverHelperServlet in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows attackers to read certain files on the web server without login by sending a specially crafted request to the server with the operation=copyfile\u0026fileName= substring." }, { "lang": "es", "value": "Control de acceso incorrecto en FailOverHelperServlet en Zoho ManageEngine Netflow Analyzer antes de la build123137, Network Configuration Manager antes de la build 123128, OpManager antes de la build 123148, OpUtils antes de la build 123161 y Firewall Analyzer antes de la build 123147 permite a los atacantes leer determinados archivos en el servidor web sin necesidad de iniciar sesi\u00f3n mediante el env\u00edo de una petici\u00f3n especialmente manipulada al servidor con la subcadena operation=copyfilefileName=." } ], "id": "CVE-2018-12997", "lastModified": "2024-11-21T03:46:13.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-06-29T12:29:00.437", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Jul/73" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/unh3x/just4cve/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Jul/73" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/unh3x/just4cve/issues/8" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-10-09 14:59
Modified
2024-11-21 02:37
Severity ?
Summary
ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of "plugin" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | 11.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of \"plugin\" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password." }, { "lang": "es", "value": "ZOHO ManageEngine OpManager 11.5 build 11600 y anteriores utiliza una contrase\u00f1a de \u0027plugin\u0027 embebida para la cuenta IntegrationUser, lo que permite a usuarios remotos autenticados obtener acceso de administrador aprovechando su conocimiento de esa contrase\u00f1a." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/798.html\" target=\"_blank\"\u003eCWE-798: Use of Hard-coded Credentials\u003c/a\u003e", "id": "CVE-2015-7765", "lastModified": "2024-11-21T02:37:21.880", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-09T14:59:06.670", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/66" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" }, { "source": "cve@mitre.org", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.exploit-db.com/exploits/38221/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/66" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.exploit-db.com/exploits/38221/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-10-09 14:59
Modified
2024-11-21 02:37
Severity ?
Summary
PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | * | |
zohocorp | manageengine_opmanager | 11.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "47242C01-A219-4236-BC5A-FD55707B879E", "versionEndIncluding": "11.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.6:*:*:*:*:*:*:*", "matchCriteriaId": "BD940D38-D057-47D0-98EC-B38B0C781A3C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by \"INSERT/**/INTO.\"" }, { "lang": "es", "value": "PGSQL:SubmitQuery.do en ZOHO ManageEngine OpManager 11.6, 11.5 y anteriores permite a administradores remotos eludir las restricciones de consulta SQL a trav\u00e9s de un comentario en la consulta a api/json/admin/SubmitQuery, seg\u00fan lo demostrado por \u0027INSERT/**/INTO\u0027." } ], "id": "CVE-2015-7766", "lastModified": "2024-11-21T02:37:22.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-09T14:59:08.390", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/66" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" }, { "source": "cve@mitre.org", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.exploit-db.com/exploits/38221/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/66" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.exploit-db.com/exploits/38221/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-10 20:16
Modified
2024-11-21 07:14
Severity ?
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "95767F18-02DA-4B39-941E-3111639A8295", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "3D6B8568-FCE8-4283-A41A-98DDA07B3631", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "D6CF42CA-ED4F-4184-B392-B9BA6846A7D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "2AFC22CB-4540-498A-AAA1-0F6D1676F290", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "6585CDEA-9649-45A3-8965-E2CEAB1ADFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "5D9F4070-68B1-4444-991A-A2CB0063442A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "EF7CDF11-A00E-47B6-B8E3-512998134656", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "A0B3AA58-0D48-4152-BF08-357D4A2098AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "22171713-63E5-42F8-BD7B-835447371595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "D42A5730-622F-4903-991D-B54881349ABC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "EC69DF45-45F8-4C7B-8457-666270C95895", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "A33E48DB-3CC9-43FD-85F8-0F3C389B961E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "389CF8B9-F431-4369-A581-4BFBA1305A9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "DBD1E3BA-4112-4AD5-A616-BCFD2D5C5FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "4FFD8500-5E07-4B3E-88EC-27C403A9B44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "0BED22ED-D040-4439-AEC6-8CCD74F29217", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "4D1C56BB-D28D-48B6-BA6B-7B403E248648", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "A49349AE-4EA2-4CE4-B8B9-326D44264B33", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "BEC805D2-CFDC-40DE-AA70-42A91461BEE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "4767BF5A-B867-44BB-B152-E2AFA63B06D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "5855C471-07AB-4A96-9631-26C6C8B01F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "5075910F-3676-439A-879A-5CBE2C734347", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "20808F91-7F08-4BA9-9075-C54337EC68E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "C700CE3B-31B5-4B4D-A378-70EC26D6F88B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "574117B3-2785-4971-ABBE-55C08010E16B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "8C4AA98C-BFFE-46E9-A3C3-D37298A8F6F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "B907FD6F-BA43-4D8D-90C4-F51CD693E9B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "B6CF111E-B976-46D1-A246-B7D1750FFC45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "36CBCAF8-B7FE-4611-A9DE-C82BCDE81A86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "33D8FC4D-0EF1-4C5B-A677-7269FFF068C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "C510DE4D-B2AB-404D-BA49-3CE09FAECB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "6594EF08-E72F-4A59-86DB-B63E0CCE4463", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "219B0F9E-A087-4AA2-B723-E3D68BEC9D21", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "852A63FF-F97B-4BB9-869F-383E9FABE929", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "FA6C4793-6913-4C51-A2D4-B906D2CBEA94", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "3AF232D9-6735-4296-91C8-A451A1801287", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "855EA944-CB73-4193-94E0-9D706FF554C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "002FDBC8-72DE-46C6-A84B-B4A51F3228F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "AABA0E18-790D-4A86-91C4-1C50D2B6167C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "797C3F7A-E5CE-48B7-9BC1-4A637131C061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "7EE387F3-24C8-4933-A25E-D9C4026469D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "2D219374-C6A2-4A28-AF41-ABC633D8C9ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "88C4DF20-F8A7-4673-9639-42522C6BB3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "722ACCC8-EC9C-4700-A5D0-5C6EFE8E36AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "FC0970ED-62DC-442B-AA29-618ADBD66E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "8D6852F2-14B0-4EAE-B420-67A0103C10EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "BF0CBE7F-B124-4ABD-82F5-CB85341CAC86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "08A4CCDD-0892-4FF3-8E17-41D6AB8FC747", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "2DB6B15E-6513-4590-A5C1-A949341411F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "C1DF8B30-1820-4DA1-AB30-996FCC99192B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "09C0FF80-AF4C-47F9-B35C-12A7F2843D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "6445A4A5-E41D-4B60-88E7-0E5B66C2A096", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "645D9C07-A2F4-4E8B-B2FD-39330CD7BE14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "63739B14-BBAF-4F12-A178-36CE2C0F6B5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "1C14D389-AA7A-4CD3-A0B5-EF052907FEE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "48C09D5D-BC77-42DC-9A72-00A71F8C1A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "14269E88-7186-4F2C-B770-964D0AD7D414", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "C46D091F-095F-4F1D-8D16-1021E15BC963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "2AE780F5-EF56-45F3-A5E7-805A24C04A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "212A00BA-ED01-45F3-9E9C-9E6B75B82CDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "CBFA159F-0293-4E44-BB20-173021991107", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "27D49B1C-1140-4CA7-B10A-9B59ACE69208", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "1979F66B-749E-41F8-9CBD-E4AD4483B500", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "BC5A1967-8D4F-4090-A2BA-5FFCEAA2EFFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "50D85F0C-201C-44D3-92C7-261095B4B03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "36B6C5A9-FC13-4AB0-BE8B-9DFA8FDB0C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "342D59C3-B7A8-44AF-8298-743F5487CD91", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "9A6D1AC1-8480-42C9-90C6-F47E58B7E44B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "F31C74BA-085E-482C-A1E8-D6E9A69462B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "5D3E1BC5-7D01-45E9-A92D-7F2D623F1C4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "B15B6E60-9DF9-4524-8387-8CF0B2B6D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "06AEE3B8-3A71-466D-880F-B39E6E4D9899", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "C7E2FFFB-975D-4FFF-A54E-01336B2687BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "4C1FB9D8-1DA7-486C-9418-9C00F4D184D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "F78374E4-E4AF-4E77-9AE6-BEC58DCAB6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "989668B0-0AEB-4E8B-AC51-42058CC6AC3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "DC747248-7154-440A-BCD7-2E0F8ACFC042", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "F4791DD2-AD34-4239-85CB-D87080D97AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "F6E1060D-0E32-4330-BB0A-C35D5E11BCE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "FB7DAAA8-6A7B-41EF-8783-7EFDEE747332", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "EA101FBC-D697-4A7E-B539-79097228B735", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "4CC9EF3C-6768-4976-94C8-3FBEE6093ECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "B5934D8A-C10F-47BC-BB73-45B8CB71C686", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "59E334B0-6BF6-4674-9D9D-7E9C988BAB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "2BF85206-863D-493C-88F4-15B0BA5276A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "3C9DE996-1DEC-4AF0-89FD-1E3DA3967BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "75FF4D85-97C8-4DF4-ADE6-EDE8EC2DD5BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "9CAC6467-19F7-4CB2-A5FC-B57A14F4636C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "60EB56E2-7367-4488-A00D-41464E86B06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "3E315636-0897-4421-882D-E8196F7ACAD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "E3552F71-C708-41A4-9168-5673C086F507", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "9505C545-2540-4554-B774-6ECCD64D6115", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "06CF15AE-51A6-4FB4-A0DA-6097F0B2BE98", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "11A17B44-C69A-424A-A305-0AD61DCDA2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "8600CCB2-4642-4760-AE10-854446251673", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "087A0139-FA4B-4C85-BAAD-1BDCF7B5F91B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "2F3B1A89-93A9-43F1-9246-E2081F26DBBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "9A7C64F7-9B85-4C7F-95B9-468200D2EA7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "1EE78F81-5F9D-4B98-BA82-24EE281041C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "298A1371-E23E-4954-8C16-B0F70A575A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "BA174B71-5D43-4783-8744-1A4020A157C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "ADB451D9-106E-40DA-A499-B1D8DB1B78BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution." }, { "lang": "es", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer y OpUtils versiones anteriores a 29-07-2022 hasta 30-07-2022 ( 125658, 126003, 126105 y 126120) permiten a usuarios autenticados realizar cambios en la base de datos que conllevan a una ejecuci\u00f3n de c\u00f3digo remota" } ], "id": "CVE-2022-37024", "lastModified": "2024-11-21T07:14:18.503", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-10T20:16:05.147", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-30 17:15
Modified
2024-11-21 07:26
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Summary
A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve
a malicious XML payload to trigger this vulnerability.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "30BF0F86-635A-4637-A5F9-9FA122845610", "versionEndExcluding": "12.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "48C09D5D-BC77-42DC-9A72-00A71F8C1A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "14269E88-7186-4F2C-B770-964D0AD7D414", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126002:*:*:*:*:*:*", "matchCriteriaId": "31498701-6732-40E4-8F3D-55EE8A77D61B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126004:*:*:*:*:*:*", "matchCriteriaId": "B740E757-147B-4DEB-89C5-59EB9FFBD6BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126005:*:*:*:*:*:*", "matchCriteriaId": "BE1CA16B-558F-426A-B87B-23D47681F1AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "C46D091F-095F-4F1D-8D16-1021E15BC963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "2AE780F5-EF56-45F3-A5E7-805A24C04A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "212A00BA-ED01-45F3-9E9C-9E6B75B82CDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "CBFA159F-0293-4E44-BB20-173021991107", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126104:*:*:*:*:*:*", "matchCriteriaId": "356504E5-BE0A-4F54-8713-AC9EA29D189C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126107:*:*:*:*:*:*", "matchCriteriaId": "DBDA89CD-3D30-488F-9EE6-92E84507B95D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126108:*:*:*:*:*:*", "matchCriteriaId": "A535E330-A6ED-4E51-A3C0-5A6D04B024C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126109:*:*:*:*:*:*", "matchCriteriaId": "A231F874-62DD-4BAC-B115-CD6D61F23873", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126110:*:*:*:*:*:*", "matchCriteriaId": "2E6C0DE1-8B37-496C-90AF-38C0B189150E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "27D49B1C-1140-4CA7-B10A-9B59ACE69208", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "1979F66B-749E-41F8-9CBD-E4AD4483B500", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "BC5A1967-8D4F-4090-A2BA-5FFCEAA2EFFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "50D85F0C-201C-44D3-92C7-261095B4B03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "36B6C5A9-FC13-4AB0-BE8B-9DFA8FDB0C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126118:*:*:*:*:*:*", "matchCriteriaId": "B621572C-448C-43C4-AF8E-EEBCFADF3630", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126119:*:*:*:*:*:*", "matchCriteriaId": "AAAF3692-3979-494B-831A-D8BFE127A6C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126120:*:*:*:*:*:*", "matchCriteriaId": "EE7B18B3-87AD-4960-8FBE-D90BE5FF6776", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126121:*:*:*:*:*:*", "matchCriteriaId": "79F88190-237F-4D39-B70E-FC0CBCE65DE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126122:*:*:*:*:*:*", "matchCriteriaId": "3C6640CC-4BF7-4D7E-A128-0F36CC0DD3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126130:*:*:*:*:*:*", "matchCriteriaId": "CA2D7B9C-AE06-4A1C-8C88-FDAD9AADF73B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126131:*:*:*:*:*:*", "matchCriteriaId": "014DEAE0-EB0F-43BB-A922-5ED346E774A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126132:*:*:*:*:*:*", "matchCriteriaId": "3D63BDBE-E10F-4E57-8F26-C6D31A6CAB4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126134:*:*:*:*:*:*", "matchCriteriaId": "614916D2-74A2-45F5-BF8D-E0FD8F0000B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126135:*:*:*:*:*:*", "matchCriteriaId": "B0C9C18E-C143-46AF-8126-FB0A71E4E4CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126136:*:*:*:*:*:*", "matchCriteriaId": "5B93668B-4988-424B-BB81-6A18355F8624", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126139:*:*:*:*:*:*", "matchCriteriaId": "56EB1279-627C-43E1-80D7-A09BF047757E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126141:*:*:*:*:*:*", "matchCriteriaId": "F06D655C-29AC-4FDB-B22F-148743C469F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126147:*:*:*:*:*:*", "matchCriteriaId": "D2790B5B-F0F4-4B3B-8747-34685D988024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126148:*:*:*:*:*:*", "matchCriteriaId": "BD572C9F-3B99-4A1D-AC18-AF7163F06FA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126149:*:*:*:*:*:*", "matchCriteriaId": "AA0872FB-4491-45BA-9429-BEBDB7AA4B49", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126150:*:*:*:*:*:*", "matchCriteriaId": "1940E42F-0F5D-4262-888F-FD23830E73ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126151:*:*:*:*:*:*", "matchCriteriaId": "F3251E9C-8E78-464F-991C-3966B3E2E36D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126154:*:*:*:*:*:*", "matchCriteriaId": "6428F23E-AFC0-47F8-9059-655D2FF5AF11", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126155:*:*:*:*:*:*", "matchCriteriaId": "33577344-B3FC-4E14-8C76-C5A542FF5598", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126162:*:*:*:*:*:*", "matchCriteriaId": "5BECCAD7-9F39-4849-8327-96BA17414418", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126163:*:*:*:*:*:*", "matchCriteriaId": "3B4472BF-9646-4575-A440-8A11B7C5C090", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126164:*:*:*:*:*:*", "matchCriteriaId": "89A06D36-31CE-43DD-9E55-EFC78FA1D252", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126165:*:*:*:*:*:*", "matchCriteriaId": "17154C40-0DBC-405F-B68E-76672F28A700", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126166:*:*:*:*:*:*", "matchCriteriaId": "FAC1EB6D-CEA0-4B98-B988-448FB844B488", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126167:*:*:*:*:*:*", "matchCriteriaId": "7ECC8CA3-28B8-48BC-944E-0F9503382C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126168:*:*:*:*:*:*", "matchCriteriaId": "4F2863D4-D448-4843-9B99-1442A0A3C2FA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA7ACDA3-D9A0-4C03-B42A-5DE2517DCB65", "versionEndExcluding": "12.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "FB7DAAA8-6A7B-41EF-8783-7EFDEE747332", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126002:*:*:*:*:*:*", "matchCriteriaId": "87907DDD-12AF-435A-A005-893FED115AAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "EA101FBC-D697-4A7E-B539-79097228B735", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "4CC9EF3C-6768-4976-94C8-3FBEE6093ECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126104:*:*:*:*:*:*", "matchCriteriaId": "362871E6-BF7C-46D4-8EFE-C87E96C71799", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126107:*:*:*:*:*:*", "matchCriteriaId": "B352D823-74D2-401A-97A2-8B2A6391545F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "B5934D8A-C10F-47BC-BB73-45B8CB71C686", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "59E334B0-6BF6-4674-9D9D-7E9C988BAB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126119:*:*:*:*:*:*", "matchCriteriaId": "E866F2AE-FB51-4270-A673-B1299C7CD2F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126122:*:*:*:*:*:*", "matchCriteriaId": "823014A6-D8F5-430C-A813-373292450006", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126139:*:*:*:*:*:*", "matchCriteriaId": "E755C6A6-14DA-4AA5-A549-366E4E64F9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126140:*:*:*:*:*:*", "matchCriteriaId": "A7009FB6-8594-4115-BD9B-CC50CE186E30", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126141:*:*:*:*:*:*", "matchCriteriaId": "1F495163-C813-4CE5-95AE-EAA700AD05DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126154:*:*:*:*:*:*", "matchCriteriaId": "4136C288-60F2-455B-8A6B-C602294AFADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126155:*:*:*:*:*:*", "matchCriteriaId": "6037DF2D-1B68-45B6-A72C-C0AE37E2F29A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126264:*:*:*:*:*:*", "matchCriteriaId": "AAE8929C-4D00-4DCB-8605-82B86AC9CBDD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74946AD-F68D-474A-8634-DB6CEF999302", "versionEndExcluding": "12.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "B15B6E60-9DF9-4524-8387-8CF0B2B6D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126002:*:*:*:*:*:*", "matchCriteriaId": "DEB00990-C73C-4B46-B87D-80E3B5B39302", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "06AEE3B8-3A71-466D-880F-B39E6E4D9899", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "C7E2FFFB-975D-4FFF-A54E-01336B2687BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126104:*:*:*:*:*:*", "matchCriteriaId": "34A43740-26B4-4D73-BC53-7D14529BA78B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126107:*:*:*:*:*:*", "matchCriteriaId": "037A9312-321F-4A22-B17E-83B6A2BA9BB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "4C1FB9D8-1DA7-486C-9418-9C00F4D184D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "F78374E4-E4AF-4E77-9AE6-BEC58DCAB6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126119:*:*:*:*:*:*", "matchCriteriaId": "8912068D-3412-47E5-A790-0CDB29E05F20", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126122:*:*:*:*:*:*", "matchCriteriaId": "39C96D52-9AD6-42B8-AE99-3F6C1D520DF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126139:*:*:*:*:*:*", "matchCriteriaId": "BED90D90-615E-4E7B-9C02-CBE942589BF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126140:*:*:*:*:*:*", "matchCriteriaId": "30957BC1-C180-405E-A4D4-818F67819C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126141:*:*:*:*:*:*", "matchCriteriaId": "DD11A46A-8C7C-4AC0-B353-34C149AF4951", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126154:*:*:*:*:*:*", "matchCriteriaId": "B598B209-B85F-4968-8C49-B52B9D1D2BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126155:*:*:*:*:*:*", "matchCriteriaId": "6AB5E114-0705-41D3-8C40-D0F583180E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126264:*:*:*:*:*:*", "matchCriteriaId": "840B07B8-E0BE-4D34-B511-B7C593AFDDD5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve \r\na malicious XML payload to trigger this vulnerability." } ], "id": "CVE-2022-43473", "lastModified": "2024-11-21T07:26:33.497", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.7, "source": "talos-cna@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-30T17:15:06.750", "references": [ { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685" }, { "source": "talos-cna@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1685" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "talos-cna@cisco.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-08 17:15
Modified
2024-11-21 02:18
Severity ?
Summary
The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_applications_manager | * | |
zohocorp | manageengine_it360 | * | |
zohocorp | manageengine_opmanager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "26B406C4-8301-4D81-B59E-D35965300845", "versionEndIncluding": "11.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D1A4045-C496-430F-91AA-142165AC14F9", "versionEndIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A06A75D-BDDF-4D26-AA17-325C2C64859B", "versionEndIncluding": "11.5", "versionStartIncluding": "8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet." }, { "lang": "es", "value": "El servlet FailOverHelperServlet (tambi\u00e9n se conoce como FailServlet) en ZOHO ManageEngine Applications Manager versiones anteriores a 11.9 build 11912, OpManager versiones 8 hasta 11.5 build 11400 e IT360 versiones 10.5 y anteriores, no restringe el acceso apropiadamente, lo que permite a atacantes remotos y a usuarios autenticados remotos (1) leer archivos arbitrarios por medio del par\u00e1metro fileName en una operaci\u00f3n copyfile u (2) obtener informaci\u00f3n confidencial por medio de un listado de directorio en una operaci\u00f3n listdirectory en servlet/FailOverHelperServlet." } ], "id": "CVE-2014-7863", "lastModified": "2024-11-21T02:18:09.847", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-08T17:15:10.980", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/114" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-15 21:15
Modified
2024-11-21 04:32
Severity ?
Summary
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me-complete.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me-complete.html | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC6C8B88-B295-48DB-859A-7AF8E9027F62", "versionEndExcluding": "12.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:-:*:*:*:*:*:*", "matchCriteriaId": "B666DF1F-0EF8-41F0-9EA0-EB104F87405F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124000:*:*:*:*:*:*", "matchCriteriaId": "5B7042C9-FD7C-4A83-A755-1429D3CEF91D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124011:*:*:*:*:*:*", "matchCriteriaId": "86F61865-FB7B-4F12-B8EF-81A1DFB5E7E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124012:*:*:*:*:*:*", "matchCriteriaId": "5D81E915-18CC-4419-879D-A2D90472F526", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124013:*:*:*:*:*:*", "matchCriteriaId": "4B9314BA-7CA4-46C2-9ADD-AA15101081FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124014:*:*:*:*:*:*", "matchCriteriaId": "4A94FB0E-7487-4E18-A7AD-19E47B03BF1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124015:*:*:*:*:*:*", "matchCriteriaId": "D99A8A01-8EDC-4AE6-8ED9-C7AF12DEDA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124016:*:*:*:*:*:*", "matchCriteriaId": "44A9BF34-7B3B-4B5F-AEFD-AA7434C6A682", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124022:*:*:*:*:*:*", "matchCriteriaId": "33068139-B994-4145-B73A-2344A699A0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124023:*:*:*:*:*:*", "matchCriteriaId": "B798718E-3E01-4F3D-AD43-9BA7939E2EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124024:*:*:*:*:*:*", "matchCriteriaId": "E0C42019-0D5A-4938-87AB-F787C55E9834", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124025:*:*:*:*:*:*", "matchCriteriaId": "373AA6C3-DA45-4CCD-88EF-859858732FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124026:*:*:*:*:*:*", "matchCriteriaId": "13E24695-F223-4F62-B344-4CCB0BBE1050", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124027:*:*:*:*:*:*", "matchCriteriaId": "C8EDB65B-34E1-4F89-B2E0-CEE13F39DA90", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124030:*:*:*:*:*:*", "matchCriteriaId": "B8F7F90C-57BB-4E2F-BD79-1F56375A4E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124033:*:*:*:*:*:*", "matchCriteriaId": "A1343F39-5FAA-4EB7-B95A-5D5133AD5717", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124037:*:*:*:*:*:*", "matchCriteriaId": "C23F2AB2-714D-4548-B9F9-315CE31CF573", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124039:*:*:*:*:*:*", "matchCriteriaId": "AC8CDE36-EC3C-4F61-872C-8DD33688E0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124040:*:*:*:*:*:*", "matchCriteriaId": "D790A131-CA15-42A1-8F35-3DCF27D51060", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124041:*:*:*:*:*:*", "matchCriteriaId": "C91F973F-3910-41E6-9D2F-3506E8EF5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124042:*:*:*:*:*:*", "matchCriteriaId": "471FFC26-5DE7-42C6-B30B-EF5D1E1A35C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124043:*:*:*:*:*:*", "matchCriteriaId": "C5407B79-C1DF-481E-83A3-BCE36BEE29E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124051:*:*:*:*:*:*", "matchCriteriaId": "F09EF7FD-47EB-4989-8805-74EC075F91AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124053:*:*:*:*:*:*", "matchCriteriaId": "F91FCCC4-C8C0-49B2-86C7-B2896D72F019", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124054:*:*:*:*:*:*", "matchCriteriaId": "F7679A19-1874-4E97-87A5-60903A549A26", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124056:*:*:*:*:*:*", "matchCriteriaId": "D3B991A7-452F-46C6-AB37-78137A7B27CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124058:*:*:*:*:*:*", "matchCriteriaId": "66A7CEE9-8647-462A-8F50-9159132E01FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124065:*:*:*:*:*:*", "matchCriteriaId": "28D368E2-FBB1-4DC2-BDBF-7A4F994A14F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124066:*:*:*:*:*:*", "matchCriteriaId": "A9F3220A-D461-4412-9F73-B74EB299DBA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124067:*:*:*:*:*:*", "matchCriteriaId": "7442E3D2-83CC-4F75-89E3-64BAE5937722", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124069:*:*:*:*:*:*", "matchCriteriaId": "07B87F17-6AF0-4545-9527-154E0C6483C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124070:*:*:*:*:*:*", "matchCriteriaId": "B565B110-9A53-4BA1-BAB9-C6C16DEECD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124071:*:*:*:*:*:*", "matchCriteriaId": "AA46F3B7-0650-4630-9005-1FAC1EC22EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124074:*:*:*:*:*:*", "matchCriteriaId": "8706C9CD-0D79-4661-B0C5-AB1813DE1F0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124075:*:*:*:*:*:*", "matchCriteriaId": "2BACB527-2F9E-4C6B-8C7B-696EAD5251FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124081:*:*:*:*:*:*", "matchCriteriaId": "CC9D8F85-EFB8-4D0E-BD8F-6DBE239559F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124082:*:*:*:*:*:*", "matchCriteriaId": "0297A0EA-43F2-4AD0-BC73-E6014F1F74BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124085:*:*:*:*:*:*", "matchCriteriaId": "CA5F1F18-247B-4081-8B53-E34B1512D47F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124086:*:*:*:*:*:*", "matchCriteriaId": "2B8F85FF-78A7-4BF4-83C2-FC3ABFBC8715", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124087:*:*:*:*:*:*", "matchCriteriaId": "1C1A1836-D054-4B96-890E-E837050D6202", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Zoho ManageEngine OpManager versiones anteriores a 12.4 build 124089. El servlet OPMDeviceDetailsServlet es propenso a la inyecci\u00f3n SQL. Dependiendo de la configuraci\u00f3n, esta vulnerabilidad podr\u00eda ser explotada no autenticado o autenticado." } ], "id": "CVE-2019-17602", "lastModified": "2024-11-21T04:32:37.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-15T21:15:11.127", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-30 19:15
Modified
2024-11-21 06:25
Severity ?
Summary
Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467 | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF536B6C-4394-4CF7-813D-BE9E9DF84DBA", "versionEndIncluding": "12.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*", "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*", "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*", "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*", "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*", "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*", "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*", "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*", "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*", "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*", "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*", "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*", "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*", "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*", "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*", "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*", "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*", "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*", "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*", "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*", "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*", "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*", "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*", "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*", "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*", "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*", "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*", "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*", "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*", "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*", "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*", "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*", "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*", "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*", "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*", "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*", "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*", "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*", "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*", "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*", "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*", "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*", "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*", "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API." }, { "lang": "es", "value": "Zoho ManageEngine OpManager versi\u00f3n 125466 y por debajo, es vulnerable a una inyecci\u00f3n SQL en la API getReportData" } ], "id": "CVE-2021-41288", "lastModified": "2024-11-21T06:25:58.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-30T19:15:07.430", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 18:29
Modified
2024-11-21 03:08
Severity ?
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://manageengine.com | Vendor Advisory | |
cve@mitre.org | http://opmanager.com | Product | |
cve@mitre.org | https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://manageengine.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://opmanager.com | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | 12.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "4EF7ED07-3132-4670-831B-CCD6F34E5C3D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application." }, { "lang": "es", "value": "Fue encontrado un problema en ZOHO ManageEngine OpManager 12.2. Al agregar un Google Map a la aplicaci\u00f3n, un usuario autenticado puede cargar un archivo HTML. Este archivo HTML se procesa en varias ubicaciones de la aplicaci\u00f3n. JavaScript dentro del HTML cargado tambi\u00e9n es interpretado por la aplicaci\u00f3n. Por lo tanto, un atacante puede inyectar una carga maliciosa de JavaScript dentro del archivo HTML y cargarlo a la aplicaci\u00f3n." } ], "id": "CVE-2017-11560", "lastModified": "2024-11-21T03:08:01.283", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T18:29:00.637", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://manageengine.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://opmanager.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://manageengine.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://opmanager.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-17 08:29
Modified
2024-11-21 04:01
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*", "matchCriteriaId": "F3F7F501-1F21-4825-BD82-23ACA713FFD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*", "matchCriteriaId": "422417EA-FF20-428A-AC02-18D4F84DA123", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*", "matchCriteriaId": "59BCAF6B-CAC3-4142-B303-7B85B24C573C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*", "matchCriteriaId": "136E1AE8-723C-4A85-AC7A-A5FA557BE66F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*", "matchCriteriaId": "19BE3780-3FAB-46C9-9399-62C18EA1A322", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*", "matchCriteriaId": "D32CDFC3-8041-426B-BBE0-245703D4D74E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*", "matchCriteriaId": "6B95BC46-7679-415E-814B-29DA657A718E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API." }, { "lang": "es", "value": "Zoho ManageEngine OpManager en versiones 12.3 anteriores a la 123238 permite una inyecci\u00f3n SQL mediante la API getGraphData." } ], "id": "CVE-2018-20173", "lastModified": "2024-11-21T04:01:00.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-17T08:29:01.213", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-23 21:30
Modified
2024-11-21 03:55
Severity ?
Summary
Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Oct/42 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Oct/42 | Mailing List, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*", "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*", "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*", "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*", "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*", "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*", "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*", "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*", "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*", "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*", "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*", "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*", "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*", "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*", "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*", "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*", "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*", "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*", "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*", "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*", "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*", "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*", "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*", "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*", "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*", "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*", "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*", "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*", "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*", "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*", "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*", "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*", "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*", "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*", "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*", "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*", "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*", "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*", "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*", "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*", "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*", "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*", "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*", "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*", "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*", "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*", "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*", "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*", "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*", "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*", "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*", "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*", "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*", "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*", "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*", "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*", "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*", "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*", "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*", "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*", "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*", "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*", "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload." }, { "lang": "es", "value": "Zoho ManageEngine OpManager en versiones anteriores a la 12.3 build 123214 permite la subida de archivos arbitrarios sin restricci\u00f3n." } ], "id": "CVE-2018-18475", "lastModified": "2024-11-21T03:55:59.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-23T21:30:54.347", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Oct/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Oct/42" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-06 04:29
Modified
2024-11-21 03:56
Severity ?
Summary
An XML External Entity injection (XXE) vulnerability exists in Zoho ManageEngine Network Configuration Manager and OpManager before 12.3.214 via the RequestXML parameter in a /devices/ProcessRequest.do GET request. For example, the attacker can trigger the transmission of local files to an arbitrary remote FTP server.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/x-f1v3/ForCve/issues/5 | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/x-f1v3/ForCve/issues/5 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_network_configuration_manager | * | |
zohocorp | manageengine_opmanager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDAFA1E5-424D-48E1-B782-B3856F50B5E7", "versionEndExcluding": "12.3.214", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFE88E18-E01A-4FEF-B500-C68463E2BEAE", "versionEndExcluding": "12.3.214", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XML External Entity injection (XXE) vulnerability exists in Zoho ManageEngine Network Configuration Manager and OpManager before 12.3.214 via the RequestXML parameter in a /devices/ProcessRequest.do GET request. For example, the attacker can trigger the transmission of local files to an arbitrary remote FTP server." }, { "lang": "es", "value": "Existe una vulnerabilidad XEE (XML External Entity) en Zoho ManageEngine Network Configuration Manager y OpManager en versiones anteriores a la 12.3.214 mediante el par\u00e1metro RequestXML en una petici\u00f3n GET en /devices/ProcessRequest.do. Por ejemplo, el atacante puede desencadenar la transmisi\u00f3n de archivos locales a un servidor FTP remoto arbitrario." } ], "id": "CVE-2018-18980", "lastModified": "2024-11-21T03:56:58.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-06T04:29:00.347", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/x-f1v3/ForCve/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/x-f1v3/ForCve/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-15 06:29
Modified
2024-11-21 03:57
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/105960 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105960 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*", "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*", "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*", "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*", "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*", "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*", "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*", "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*", "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*", "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*", "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*", "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*", "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*", "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*", "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*", "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*", "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*", "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*", "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*", "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*", "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*", "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*", "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*", "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*", "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*", "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*", "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*", "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*", "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*", "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*", "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*", "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*", "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*", "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*", "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*", "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*", "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*", "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*", "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*", "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*", "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*", "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*", "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*", "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*", "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*", "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*", "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*", "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*", "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*", "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*", "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*", "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*", "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*", "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*", "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*", "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*", "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*", "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*", "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*", "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*", "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*", "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*", "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*", "matchCriteriaId": "CBF58EC7-2DDA-4EC0-8406-F3B711B62974", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*", "matchCriteriaId": "CD036146-E374-4571-9302-9978CD892805", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*", "matchCriteriaId": "7112E33A-C694-432D-8880-BB2211EBA5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*", "matchCriteriaId": "932A2D27-CC0E-4F33-AD0C-4876984F1F26", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123219:*:*:*:*:*:*", "matchCriteriaId": "2C55FF31-14E0-4D66-9F33-CF907B684C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123220:*:*:*:*:*:*", "matchCriteriaId": "4F8BD66B-6AB2-46C9-8133-6677ACBEDC10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123221:*:*:*:*:*:*", "matchCriteriaId": "54DA156C-85E1-4A2D-9612-02C05180AB06", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API." }, { "lang": "es", "value": "Zoho ManageEngine OpManager 12.3 antes de la build 123223 tiene Cross-Site Scripting (XSS) mediante la API updateWidget." } ], "id": "CVE-2018-19288", "lastModified": "2024-11-21T03:57:41.010", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-15T06:29:00.357", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105960" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-10 18:59
Modified
2024-11-21 02:18
Severity ?
Summary
Multiple directory traversal vulnerabilities in ZOHO ManageEngine OpManager 8 (build 88xx) through 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to write and execute arbitrary files via a .. (dot dot) in the (1) fileName parameter to the MigrateLEEData servlet or (2) zipFileName parameter in a downloadFileFromProbe operation to the MigrateCentralData servlet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_social_it_plus | 11.0 | |
zohocorp | manageengine_it360 | 10.3.0 | |
zohocorp | manageengine_it360 | 10.4 | |
zohocorp | manageengine_opmanager | 8.8 | |
zohocorp | manageengine_opmanager | 9.0 | |
zohocorp | manageengine_opmanager | 9.1 | |
zohocorp | manageengine_opmanager | 9.2 | |
zohocorp | manageengine_opmanager | 9.4 | |
zohocorp | manageengine_opmanager | 10.0 | |
zohocorp | manageengine_opmanager | 10.1 | |
zohocorp | manageengine_opmanager | 10.2 | |
zohocorp | manageengine_opmanager | 11.0 | |
zohocorp | manageengine_opmanager | 11.1 | |
zohocorp | manageengine_opmanager | 11.2 | |
zohocorp | manageengine_opmanager | 11.3 | |
zohocorp | manageengine_opmanager | 11.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "B68292A0-79E4-4CEE-844E-05342994E534", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9176D056-7350-4371-8F7E-87C2521EEBF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C71A803-6D67-4D8F-8072-73C10532BB30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "A35DA35B-6836-41FD-9B1D-E76809D19304", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B48CA686-28DF-4CE5-A950-1C62D162D987", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "504C45FC-1A8C-4C6A-AA55-4B2C21DF5BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E6403B7-8C3D-40D1-A32B-3A50B2A6D005", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.4:*:*:*:*:*:*:*", "matchCriteriaId": "DAD3BAD6-58BE-4099-994C-9DBFA2210D2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E30D446-E54B-414B-BEB0-E7C2AD6DC092", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "900914C7-4A60-45D2-90E1-3488998C77B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FE71B7E-88F9-45B3-911C-472B5438D062", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDEC9C04-2DA1-4307-8828-9E91352FB055", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0DD4D0DE-2B11-48AA-A60B-ED6B6DB94020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "0E7D1014-51CF-4A24-9935-BD385E1EE57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in ZOHO ManageEngine OpManager 8 (build 88xx) through 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to write and execute arbitrary files via a .. (dot dot) in the (1) fileName parameter to the MigrateLEEData servlet or (2) zipFileName parameter in a downloadFileFromProbe operation to the MigrateCentralData servlet." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de salto de directorio en ZOHO ManageEngine OpManager 8 (build 88xx) hasta 11.4, IT360 10.3 y 10.4, y Social IT Plus 11.0 permiten a atacantes remotos o usuarios remotos autenticados escribir y ejecutar ficheros arbitrarios a trav\u00e9s de un .. (punto punto) en (1) el par\u00e1metro fileName en el servlet MigrateLEEData o (2) el par\u00e1metro zipFileName en una operaci\u00f3n downloadFileFromProbe en el servlet MigrateCentralData." } ], "id": "CVE-2014-7866", "lastModified": "2024-11-21T02:18:10.173", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-10T18:59:00.077", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/21" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-04 02:15
Modified
2025-01-29 20:15
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "30BF0F86-635A-4637-A5F9-9FA122845610", "versionEndExcluding": "12.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "48C09D5D-BC77-42DC-9A72-00A71F8C1A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "14269E88-7186-4F2C-B770-964D0AD7D414", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126002:*:*:*:*:*:*", "matchCriteriaId": "31498701-6732-40E4-8F3D-55EE8A77D61B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126004:*:*:*:*:*:*", "matchCriteriaId": "B740E757-147B-4DEB-89C5-59EB9FFBD6BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126005:*:*:*:*:*:*", "matchCriteriaId": "BE1CA16B-558F-426A-B87B-23D47681F1AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "C46D091F-095F-4F1D-8D16-1021E15BC963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "2AE780F5-EF56-45F3-A5E7-805A24C04A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "212A00BA-ED01-45F3-9E9C-9E6B75B82CDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "CBFA159F-0293-4E44-BB20-173021991107", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126104:*:*:*:*:*:*", "matchCriteriaId": "356504E5-BE0A-4F54-8713-AC9EA29D189C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126107:*:*:*:*:*:*", "matchCriteriaId": "DBDA89CD-3D30-488F-9EE6-92E84507B95D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126108:*:*:*:*:*:*", "matchCriteriaId": "A535E330-A6ED-4E51-A3C0-5A6D04B024C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126109:*:*:*:*:*:*", "matchCriteriaId": "A231F874-62DD-4BAC-B115-CD6D61F23873", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126110:*:*:*:*:*:*", "matchCriteriaId": "2E6C0DE1-8B37-496C-90AF-38C0B189150E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "27D49B1C-1140-4CA7-B10A-9B59ACE69208", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "1979F66B-749E-41F8-9CBD-E4AD4483B500", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "BC5A1967-8D4F-4090-A2BA-5FFCEAA2EFFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "50D85F0C-201C-44D3-92C7-261095B4B03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "36B6C5A9-FC13-4AB0-BE8B-9DFA8FDB0C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126118:*:*:*:*:*:*", "matchCriteriaId": "B621572C-448C-43C4-AF8E-EEBCFADF3630", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126119:*:*:*:*:*:*", "matchCriteriaId": "AAAF3692-3979-494B-831A-D8BFE127A6C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126120:*:*:*:*:*:*", "matchCriteriaId": "EE7B18B3-87AD-4960-8FBE-D90BE5FF6776", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126121:*:*:*:*:*:*", "matchCriteriaId": "79F88190-237F-4D39-B70E-FC0CBCE65DE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126122:*:*:*:*:*:*", "matchCriteriaId": "3C6640CC-4BF7-4D7E-A128-0F36CC0DD3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126130:*:*:*:*:*:*", "matchCriteriaId": "CA2D7B9C-AE06-4A1C-8C88-FDAD9AADF73B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126131:*:*:*:*:*:*", "matchCriteriaId": "014DEAE0-EB0F-43BB-A922-5ED346E774A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126132:*:*:*:*:*:*", "matchCriteriaId": "3D63BDBE-E10F-4E57-8F26-C6D31A6CAB4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126134:*:*:*:*:*:*", "matchCriteriaId": "614916D2-74A2-45F5-BF8D-E0FD8F0000B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126135:*:*:*:*:*:*", "matchCriteriaId": "B0C9C18E-C143-46AF-8126-FB0A71E4E4CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126136:*:*:*:*:*:*", "matchCriteriaId": "5B93668B-4988-424B-BB81-6A18355F8624", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126139:*:*:*:*:*:*", "matchCriteriaId": "56EB1279-627C-43E1-80D7-A09BF047757E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126141:*:*:*:*:*:*", "matchCriteriaId": "F06D655C-29AC-4FDB-B22F-148743C469F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126147:*:*:*:*:*:*", "matchCriteriaId": "D2790B5B-F0F4-4B3B-8747-34685D988024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126148:*:*:*:*:*:*", "matchCriteriaId": "BD572C9F-3B99-4A1D-AC18-AF7163F06FA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126149:*:*:*:*:*:*", "matchCriteriaId": "AA0872FB-4491-45BA-9429-BEBDB7AA4B49", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126150:*:*:*:*:*:*", "matchCriteriaId": "1940E42F-0F5D-4262-888F-FD23830E73ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126151:*:*:*:*:*:*", "matchCriteriaId": "F3251E9C-8E78-464F-991C-3966B3E2E36D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126154:*:*:*:*:*:*", "matchCriteriaId": "6428F23E-AFC0-47F8-9059-655D2FF5AF11", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126155:*:*:*:*:*:*", "matchCriteriaId": "33577344-B3FC-4E14-8C76-C5A542FF5598", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126162:*:*:*:*:*:*", "matchCriteriaId": "5BECCAD7-9F39-4849-8327-96BA17414418", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126163:*:*:*:*:*:*", "matchCriteriaId": "3B4472BF-9646-4575-A440-8A11B7C5C090", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126164:*:*:*:*:*:*", "matchCriteriaId": "89A06D36-31CE-43DD-9E55-EFC78FA1D252", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126165:*:*:*:*:*:*", "matchCriteriaId": "17154C40-0DBC-405F-B68E-76672F28A700", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126166:*:*:*:*:*:*", "matchCriteriaId": "FAC1EB6D-CEA0-4B98-B988-448FB844B488", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126167:*:*:*:*:*:*", "matchCriteriaId": "7ECC8CA3-28B8-48BC-944E-0F9503382C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126168:*:*:*:*:*:*", "matchCriteriaId": "4F2863D4-D448-4843-9B99-1442A0A3C2FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126169:*:*:*:*:*:*", "matchCriteriaId": "5006325E-308B-4E08-95F5-15B9412A2BF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126262:*:*:*:*:*:*", "matchCriteriaId": "99CA6453-8D99-41A8-AF04-6FB2FCA0A4AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126264:*:*:*:*:*:*", "matchCriteriaId": "435229C9-FC8B-4C93-ABFE-C98518B60FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126275:*:*:*:*:*:*", "matchCriteriaId": "1DD61A2F-88D7-45A0-9319-47192344EA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126276:*:*:*:*:*:*", "matchCriteriaId": "DC4B331D-1FCA-4BD2-A630-6FBCC48B3599", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126277:*:*:*:*:*:*", "matchCriteriaId": "28B7BD39-A958-4C25-BECB-BEB94A83F553", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126278:*:*:*:*:*:*", "matchCriteriaId": "DE818DF8-FA7E-4B61-85A1-6D06CF1C2382", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126279:*:*:*:*:*:*", "matchCriteriaId": "FF4B34EF-B68F-4EAB-8CB3-90E83AA1CAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126280:*:*:*:*:*:*", "matchCriteriaId": "CA19FF74-8725-4144-8AC9-07C770CE1ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126283:*:*:*:*:*:*", "matchCriteriaId": "C22463C3-B9BA-4A21-BB66-23903AFDB56E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126284:*:*:*:*:*:*", "matchCriteriaId": "D4D9EA3A-5FC5-43E6-8B29-2B62549617D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126285:*:*:*:*:*:*", "matchCriteriaId": "2D5A86EC-53FD-4F85-BAB8-3F89880AD59E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126290:*:*:*:*:*:*", "matchCriteriaId": "0420517B-9660-458B-83A6-F08889A07F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126293:*:*:*:*:*:*", "matchCriteriaId": "93E003DB-D44B-4278-931D-A0321DABE732", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126294:*:*:*:*:*:*", "matchCriteriaId": "6051DD96-3EB1-4C54-94B4-7D6D19DDFC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126295:*:*:*:*:*:*", "matchCriteriaId": "F08902C5-6C2F-4791-BBB7-57BE3C6704B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126306:*:*:*:*:*:*", "matchCriteriaId": "DED80530-0627-487E-96C5-A6BE3EDFB925", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126308:*:*:*:*:*:*", "matchCriteriaId": "1E6CB40F-CA89-4C99-8E14-0209F5F889EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126310:*:*:*:*:*:*", "matchCriteriaId": "7FDF215D-73B3-41E9-86FB-01B3A6EA1AEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126311:*:*:*:*:*:*", "matchCriteriaId": "DEB0DC3F-E57F-4E69-AA89-B8502C010404", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126322:*:*:*:*:*:*", "matchCriteriaId": "1D34DF7D-F85F-4209-92ED-9E165E9C37F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126323:*:*:*:*:*:*", "matchCriteriaId": "3FBF6438-3A78-4527-9CE2-BAB5F91FF3FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers." } ], "id": "CVE-2023-31099", "lastModified": "2025-01-29T20:15:33.377", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-04T02:15:19.437", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://manageengine.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://manageengine.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-03 16:15
Modified
2024-11-21 05:23
Severity ?
Summary
Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233 | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet." }, { "lang": "es", "value": "Zoho ManageEngine OpManager Stable build anterior a 125203 (y compilaci\u00f3n Publicada anterior a 125233) permite una ejecuci\u00f3n de c\u00f3digo remota por medio del servlet Smart Update Manager (SUM)" } ], "id": "CVE-2020-28653", "lastModified": "2024-11-21T05:23:06.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-03T16:15:13.557", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-05 09:29
Modified
2024-11-21 03:56
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*", "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*", "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*", "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*", "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*", "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*", "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*", "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*", "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*", "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*", "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*", "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*", "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*", "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*", "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*", "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*", "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*", "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*", "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*", "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*", "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*", "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*", "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*", "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*", "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*", "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*", "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*", "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*", "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*", "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*", "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*", "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*", "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*", "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*", "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*", "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*", "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*", "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*", "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*", "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*", "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*", "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*", "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*", "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*", "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*", "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*", "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*", "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*", "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*", "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*", "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*", "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*", "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*", "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*", "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*", "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*", "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*", "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*", "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*", "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*", "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*", "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*", "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*", "matchCriteriaId": "CBF58EC7-2DDA-4EC0-8406-F3B711B62974", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*", "matchCriteriaId": "CD036146-E374-4571-9302-9978CD892805", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*", "matchCriteriaId": "7112E33A-C694-432D-8880-BB2211EBA5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*", "matchCriteriaId": "932A2D27-CC0E-4F33-AD0C-4876984F1F26", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123219:*:*:*:*:*:*", "matchCriteriaId": "2C55FF31-14E0-4D66-9F33-CF907B684C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123220:*:*:*:*:*:*", "matchCriteriaId": "4F8BD66B-6AB2-46C9-8133-6677ACBEDC10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123221:*:*:*:*:*:*", "matchCriteriaId": "54DA156C-85E1-4A2D-9612-02C05180AB06", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings." }, { "lang": "es", "value": "KindEditor hasta la versi\u00f3n 4.1.11 tiene una vulnerabilidad de salto de directorio en php/upload_json.php. Cualquiera puede buscar un archivo o directorio en la carpeta kindeditor/attached/ mediante el par\u00e1metro path sin autenticaci\u00f3n." } ], "id": "CVE-2018-18949", "lastModified": "2024-11-21T03:56:55.797", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-05T09:29:00.667", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-04 17:59
Modified
2024-11-21 02:13
Severity ?
Summary
Directory traversal vulnerability in the multipartRequest servlet in ZOHO ManageEngine OpManager 11.3 and earlier, Social IT Plus 11.0, and IT360 10.3, 10.4, and earlier allows remote attackers or remote authenticated users to delete arbitrary files via a .. (dot dot) in the fileName parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | * | |
zohocorp | manageengine_it360 | * | |
zohocorp | manageengine_it360 | 10.3.0 | |
zohocorp | manageengine_social_it_plus | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "66913D18-7CFF-4375-9FAB-3DB0D8802CB4", "versionEndIncluding": "11.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FA5A84F-8B14-4BC4-8CBD-37178AE42DB8", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9176D056-7350-4371-8F7E-87C2521EEBF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "B68292A0-79E4-4CEE-844E-05342994E534", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the multipartRequest servlet in ZOHO ManageEngine OpManager 11.3 and earlier, Social IT Plus 11.0, and IT360 10.3, 10.4, and earlier allows remote attackers or remote authenticated users to delete arbitrary files via a .. (dot dot) in the fileName parameter." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en el servlet multipartRequest en ZOHO ManageEngine OpManager 11.3 y anteriores, Social IT Plus 11.0, y IT360 10.3, 10.4, anteriores permite a atacantes remotos o usuarios remotos autenticados eliminar ficheros arbitrarios a trav\u00e9s de un .. (punto punto) en el par\u00e1metro fileName." } ], "id": "CVE-2014-6036", "lastModified": "2024-11-21T02:13:38.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-04T17:59:04.673", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 16:29
Modified
2024-11-21 03:08
Severity ?
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the "Group Chat" or "Alarm" section. This functionality can be abused by a malicious user by uploading a web shell.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://manageengine.com | Vendor Advisory | |
cve@mitre.org | http://opmanager.com | Product | |
cve@mitre.org | https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://manageengine.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://opmanager.com | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | 12.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "4EF7ED07-3132-4670-831B-CCD6F34E5C3D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the \"Group Chat\" or \"Alarm\" section. This functionality can be abused by a malicious user by uploading a web shell." }, { "lang": "es", "value": "Fue encontrado un problema en ZOHO ManageEngine OpManager versi\u00f3n 12.2. Un usuario autenticado puede cargar cualquier archivo que desee compartir en la secci\u00f3n \"Group Chat\" or \"Alarm\". Un usuario malicioso puede abusar de esta funcionalidad cargando un Web Shell ." } ], "id": "CVE-2017-11561", "lastModified": "2024-11-21T03:08:01.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T16:29:08.073", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://manageengine.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://opmanager.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://manageengine.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://opmanager.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-20 21:15
Modified
2024-11-21 04:58
Severity ?
Summary
Zoho ManageEngine OpManager before 125120 allows an unauthenticated user to retrieve an API key via a servlet call.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cwe.mitre.org/data/definitions/306.html | Third Party Advisory | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me-complete.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cwe.mitre.org/data/definitions/306.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me-complete.html | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 125120 allows an unauthenticated user to retrieve an API key via a servlet call." }, { "lang": "es", "value": "Zoho ManageEngine OpManager versiones anteriores a la versi\u00f3n 125120, permite a un usuario no autenticado recuperar una clave de la API por medio de una llamada del servlet." } ], "id": "CVE-2020-11946", "lastModified": "2024-11-21T04:58:57.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-20T21:15:13.367", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/306.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/306.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-13 23:15
Modified
2024-11-21 06:25
Severity ?
Summary
The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455 | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*", "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*", "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*", "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*", "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*", "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*", "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*", "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*", "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*", "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*", "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*", "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*", "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*", "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*", "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*", "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*", "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*", "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*", "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*", "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*", "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*", "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*", "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*", "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*", "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*", "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*", "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*", "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*", "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*", "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*", "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*", "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*", "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*", "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*", "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*", "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*", "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*", "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*", "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*", "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*", "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*", "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*", "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API." }, { "lang": "es", "value": "El analizador de NetFlow en Zoho ManageEngine OpManger versiones anteriores a 125455, es vulnerable a una inyecci\u00f3n SQL en la API del m\u00f3dulo de ataques" } ], "id": "CVE-2021-41075", "lastModified": "2024-11-21T06:25:23.673", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-13T23:15:07.327", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-18 13:15
Modified
2024-11-21 06:56
Severity ?
Summary
Zoho ManageEngine OpManager before 125588 (and before 125603) is vulnerable to authenticated SQL Injection in the Inventory Reports module.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*", "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*", "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*", "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*", "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*", "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*", "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*", "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*", "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*", "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*", "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*", "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*", "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*", "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*", "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*", "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*", "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*", "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*", "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*", "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*", "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*", "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*", "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*", "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*", "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*", "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*", "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*", "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*", "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*", "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*", "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*", "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*", "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*", "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*", "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*", "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*", "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*", "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*", "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*", "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*", "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*", "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*", "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*", "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*", "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*", "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*", "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*", "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*", "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*", "matchCriteriaId": "7D394493-D690-44F0-B3F0-FD39E46F31C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "AF8CBF57-EF1A-4C84-879B-1A4035F4236A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*", "matchCriteriaId": "2F1E924E-8896-41CE-82E2-F22943A02FCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*", "matchCriteriaId": "FB058840-E3D0-45FA-B95F-3445A7719118", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125589:*:*:*:*:*:*", "matchCriteriaId": "FD9B23C4-3458-4E6C-B1AB-D4A36BE8FFA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 125588 (and before 125603) is vulnerable to authenticated SQL Injection in the Inventory Reports module." }, { "lang": "es", "value": "Zoho ManageEngine OpManager versiones anteriores a 125588 (y antes de 125603) es vulnerable a una inyecci\u00f3n SQL autenticada en el m\u00f3dulo de informes de inventario" } ], "id": "CVE-2022-27908", "lastModified": "2024-11-21T06:56:27.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-18T13:15:08.177", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-17 14:29
Modified
2024-11-21 03:55
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before build 123214 has XSS.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Oct/34 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Oct/34 | Mailing List, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*", "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*", "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*", "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*", "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*", "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*", "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*", "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*", "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*", "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*", "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*", "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*", "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*", "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*", "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*", "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*", "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*", "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*", "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*", "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*", "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*", "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*", "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*", "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*", "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*", "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*", "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*", "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*", "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*", "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*", "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*", "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*", "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*", "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*", "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*", "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*", "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*", "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*", "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*", "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*", "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*", "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*", "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*", "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*", "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*", "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*", "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*", "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*", "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*", "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*", "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*", "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*", "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*", "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*", "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*", "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*", "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*", "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*", "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*", "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*", "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*", "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*", "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before build 123214 has XSS." }, { "lang": "es", "value": "Zoho ManageEngine OpManager 12.3 antes de la build 123214 tiene Cross-Site Scripting (XSS)." } ], "id": "CVE-2018-18262", "lastModified": "2024-11-21T03:55:37.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-17T14:29:01.350", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Oct/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Oct/34" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-29 21:15
Modified
2024-11-21 07:17
Severity ?
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://manageengine.com | Vendor Advisory | |
cve@mitre.org | https://www.manageengine.com/itom/advisory/cve-2022-38772.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://manageengine.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/itom/advisory/cve-2022-38772.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "BEC805D2-CFDC-40DE-AA70-42A91461BEE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "4767BF5A-B867-44BB-B152-E2AFA63B06D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "5855C471-07AB-4A96-9631-26C6C8B01F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "5075910F-3676-439A-879A-5CBE2C734347", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "20808F91-7F08-4BA9-9075-C54337EC68E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "C700CE3B-31B5-4B4D-A378-70EC26D6F88B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125459:*:*:*:*:*:*", "matchCriteriaId": "A05AFF4D-4EF9-4939-81CC-0AB55DA596F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125464:*:*:*:*:*:*", "matchCriteriaId": "86C3E31F-87E2-459F-8D1B-C6D1A237960D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "A3E7FC26-0000-4D4B-B489-DF0E2CD2B13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "13E6E0F9-9D03-4665-9C89-6BE62ADCB39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125471:*:*:*:*:*:*", "matchCriteriaId": "0DE52003-E959-420F-89A1-C86D8FB12DBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125476:*:*:*:*:*:*", "matchCriteriaId": "6E9C9051-7FDE-4DEE-85DC-0798524DC17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "5BE3598F-CEB4-4553-BB50-AA778BBF8BDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "4C71852D-D529-469A-9111-6D4DB8381BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125484:*:*:*:*:*:*", "matchCriteriaId": "EC3F7DA9-3FBF-4D67-8BA5-2643E706F64F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "53E2DF01-9A39-4E50-BEDE-D49988CE5CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "0015664D-11BC-4DEE-BC5B-DB3D1FE8DF82", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125490:*:*:*:*:*:*", "matchCriteriaId": "8B49F887-4574-4B3C-A8A7-57F75B27447F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125557:*:*:*:*:*:*", "matchCriteriaId": "C1E93E4D-0E54-41DF-843A-E8AE94EAD0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125566:*:*:*:*:*:*", "matchCriteriaId": "1617ADAD-2E13-4910-B600-3EC7E59B087C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "4E7B4955-F688-47DE-B1FF-D417EBDFF9C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125582:*:*:*:*:*:*", "matchCriteriaId": "5F982932-5513-411A-9CBF-3082C7ECEF0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125584:*:*:*:*:*:*", "matchCriteriaId": "0B5378E9-D011-4B12-8DEE-442F22789C08", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125585:*:*:*:*:*:*", "matchCriteriaId": "8232CBA1-55DA-4F3C-A9E5-A204A25231C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125606:*:*:*:*:*:*", "matchCriteriaId": "253569A5-4A2E-4163-88DC-C0FE6B79E06E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "A30281F3-4DE2-4ED3-91A7-AE7A091C31E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125647:*:*:*:*:*:*", "matchCriteriaId": "F76B196B-B5F8-4E84-9BBE-9D45A2FB2A26", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "F267C53D-6F27-4DFF-BB3C-7B299E07F487", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125657:*:*:*:*:*:*", "matchCriteriaId": "954239B1-B0FD-43EA-AAF7-ECB55E395E9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "574117B3-2785-4971-ABBE-55C08010E16B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "8C4AA98C-BFFE-46E9-A3C3-D37298A8F6F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "B907FD6F-BA43-4D8D-90C4-F51CD693E9B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "B6CF111E-B976-46D1-A246-B7D1750FFC45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "36CBCAF8-B7FE-4611-A9DE-C82BCDE81A86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "33D8FC4D-0EF1-4C5B-A677-7269FFF068C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "6594EF08-E72F-4A59-86DB-B63E0CCE4463", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "219B0F9E-A087-4AA2-B723-E3D68BEC9D21", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "852A63FF-F97B-4BB9-869F-383E9FABE929", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "FA6C4793-6913-4C51-A2D4-B906D2CBEA94", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "3AF232D9-6735-4296-91C8-A451A1801287", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126118:*:*:*:*:*:*", "matchCriteriaId": "11ACA60F-055A-44F5-8FE2-7FA61AE6F3CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126119:*:*:*:*:*:*", "matchCriteriaId": "9EC35E5A-0C46-458C-AF33-5B699B8F5EBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "855EA944-CB73-4193-94E0-9D706FF554C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "002FDBC8-72DE-46C6-A84B-B4A51F3228F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "AABA0E18-790D-4A86-91C4-1C50D2B6167C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "797C3F7A-E5CE-48B7-9BC1-4A637131C061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "7EE387F3-24C8-4933-A25E-D9C4026469D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "2D219374-C6A2-4A28-AF41-ABC633D8C9ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125459:*:*:*:*:*:*", "matchCriteriaId": "0C67D5FC-5965-4AC1-80A5-931BE60B5E86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125465:*:*:*:*:*:*", "matchCriteriaId": "139E25D9-A4C8-4041-ADF7-4618DFEEE8C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "6A65F3F7-45D3-49EB-9784-1F13FA2CBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125471:*:*:*:*:*:*", "matchCriteriaId": "3795D2DE-622F-4C82-B133-0993A01AC1FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125475:*:*:*:*:*:*", "matchCriteriaId": "C0DB9896-BC25-46E3-AA6F-496A442BE525", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "CE56A949-74AC-4138-8AD3-31F5763860EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "4A3DB867-FD46-46EB-AEF0-2B6E79371AF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "7881FBB4-AC09-4EB9-B02F-3EA19237E095", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "F391E432-98B8-4D97-8AD4-FB1A84FAF774", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125490:*:*:*:*:*:*", "matchCriteriaId": "61D908B2-446E-48EC-9F6B-91E8BF0F6A38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125565:*:*:*:*:*:*", "matchCriteriaId": "FD5F28B0-580E-4CD4-917A-496D35AD271A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "F0FC96AA-F2F4-4C35-8BF7-6318A2F624A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125583:*:*:*:*:*:*", "matchCriteriaId": "6EA008F1-4E47-4753-8506-769B29AB5BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125584:*:*:*:*:*:*", "matchCriteriaId": "7ED68CDE-1096-4490-8E6B-78F4AC2BB729", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125598:*:*:*:*:*:*", "matchCriteriaId": "34F8D9B7-3BD7-44C0-A292-162928729F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125612:*:*:*:*:*:*", "matchCriteriaId": "7446678C-E2DB-4EA2-BC9B-430C8EC7804B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "33C57314-5503-48BD-9ED2-D76517C9C0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125617:*:*:*:*:*:*", "matchCriteriaId": "AC201C68-2C1D-4E75-9443-C5F853A37AB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125646:*:*:*:*:*:*", "matchCriteriaId": "FBC08E48-51FA-497F-B5EB-349081888402", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125650:*:*:*:*:*:*", "matchCriteriaId": "FD78483C-8AC8-46B3-A1FB-2DA04468BCEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "D1DBA938-81D2-4CF8-B1F2-B71C4B82835D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125657:*:*:*:*:*:*", "matchCriteriaId": "187ADAD1-1AEC-447D-8818-C02AE12C4505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "88C4DF20-F8A7-4673-9639-42522C6BB3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "722ACCC8-EC9C-4700-A5D0-5C6EFE8E36AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "FC0970ED-62DC-442B-AA29-618ADBD66E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126002:*:*:*:*:*:*", "matchCriteriaId": "B09FDE60-23E6-4738-857C-8E4A974BDED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "8D6852F2-14B0-4EAE-B420-67A0103C10EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "BF0CBE7F-B124-4ABD-82F5-CB85341CAC86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "08A4CCDD-0892-4FF3-8E17-41D6AB8FC747", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "2DB6B15E-6513-4590-A5C1-A949341411F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126104:*:*:*:*:*:*", "matchCriteriaId": "F7367402-515B-4055-B19F-2FF7699C2C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "C1DF8B30-1820-4DA1-AB30-996FCC99192B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "09C0FF80-AF4C-47F9-B35C-12A7F2843D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "6445A4A5-E41D-4B60-88E7-0E5B66C2A096", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "645D9C07-A2F4-4E8B-B2FD-39330CD7BE14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "63739B14-BBAF-4F12-A178-36CE2C0F6B5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126118:*:*:*:*:*:*", "matchCriteriaId": "B4E90D5B-95BB-4443-B7A6-8083245677B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126119:*:*:*:*:*:*", "matchCriteriaId": "229795D9-D38B-4EAE-8725-208D245E02FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125457:*:*:*:*:*:*", "matchCriteriaId": "BC457292-04FE-4643-8F1D-05DAEF3F70BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*", "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*", "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*", "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125476:*:*:*:*:*:*", "matchCriteriaId": "BE930B14-4B22-4299-8DE8-7625342FC4E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*", "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*", "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*", "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*", "matchCriteriaId": "7D394493-D690-44F0-B3F0-FD39E46F31C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "AF8CBF57-EF1A-4C84-879B-1A4035F4236A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*", "matchCriteriaId": "2F1E924E-8896-41CE-82E2-F22943A02FCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*", "matchCriteriaId": "FB058840-E3D0-45FA-B95F-3445A7719118", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125589:*:*:*:*:*:*", "matchCriteriaId": "FD9B23C4-3458-4E6C-B1AB-D4A36BE8FFA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125597:*:*:*:*:*:*", "matchCriteriaId": "D2A7AA89-7233-4624-894A-B2B996D1D270", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125598:*:*:*:*:*:*", "matchCriteriaId": "B6B402ED-8B64-4FB0-B9E7-76E499A4115F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125599:*:*:*:*:*:*", "matchCriteriaId": "4E8B01F2-0A03-48CF-8BAE-556A9C3D88FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125601:*:*:*:*:*:*", "matchCriteriaId": "3C07E022-B75C-4491-8A30-9A1532D0472C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125603:*:*:*:*:*:*", "matchCriteriaId": "00E92DB5-8D53-4129-92D0-AD1DA0F1FEB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125604:*:*:*:*:*:*", "matchCriteriaId": "913CD99C-8F47-47BD-BD7C-33762861BB08", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125605:*:*:*:*:*:*", "matchCriteriaId": "67B7F52E-7D7A-4AA9-9241-FFCC3DD49BBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125611:*:*:*:*:*:*", "matchCriteriaId": "D02650C3-1A7F-4889-B6CB-11994054B5F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125612:*:*:*:*:*:*", "matchCriteriaId": "01FEA1CA-351B-4E2B-A78E-60338682F97F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125613:*:*:*:*:*:*", "matchCriteriaId": "04C9E097-FE04-42BD-96C8-2A3A9FD50B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125614:*:*:*:*:*:*", "matchCriteriaId": "94F895DB-C865-4AED-A1D9-CE69C0EF52FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "8B565B12-283F-4323-9C88-FD3CF5646DD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125616:*:*:*:*:*:*", "matchCriteriaId": "9FDC3394-293E-44CF-A83F-FE047A4E4DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125617:*:*:*:*:*:*", "matchCriteriaId": "01846F8F-D7D6-4CD9-B83E-41B70C691761", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125628:*:*:*:*:*:*", "matchCriteriaId": "CAE013FC-357D-42DA-B223-D40B3C813089", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125629:*:*:*:*:*:*", "matchCriteriaId": "E4BA87E9-5E37-41EE-835C-13F68ABC9C06", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125630:*:*:*:*:*:*", "matchCriteriaId": "D2034E17-2DB9-4229-B7D4-D14761CEE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125631:*:*:*:*:*:*", "matchCriteriaId": "39FBAFB9-5703-4EEA-BFF3-45B958E0805F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125632:*:*:*:*:*:*", "matchCriteriaId": "775D060A-773F-40BE-8FF3-6353EEA6A6BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125634:*:*:*:*:*:*", "matchCriteriaId": "D8326A48-9DDB-4502-B97F-ABCB151E2C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125635:*:*:*:*:*:*", "matchCriteriaId": "94ACC068-8260-4331-8B1C-E19B66D0738B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125638:*:*:*:*:*:*", "matchCriteriaId": "FE3C3B0A-BD28-4291-BD28-61A1EEB7AE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125639:*:*:*:*:*:*", "matchCriteriaId": "94A96109-2BDE-4836-B1BF-FC90003DC018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125645:*:*:*:*:*:*", "matchCriteriaId": "E1303424-7BCA-4445-BDBC-B4B546E0ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125648:*:*:*:*:*:*", "matchCriteriaId": "EFFB585B-80EB-4EA3-BEC6-4E34FE952948", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125649:*:*:*:*:*:*", "matchCriteriaId": "8D7B62B9-AAD9-4021-A806-21E61719E437", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125651:*:*:*:*:*:*", "matchCriteriaId": "F1BF50D1-031E-4E39-9D15-FFC2CFB636D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125652:*:*:*:*:*:*", "matchCriteriaId": "F045D3C8-315C-42AB-B9D0-4B5267E70417", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125653:*:*:*:*:*:*", "matchCriteriaId": "AC4FD2D6-9BA7-4889-96A2-DC946831469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125654:*:*:*:*:*:*", "matchCriteriaId": "3D86914B-49B5-4002-A4C7-3712C87F7626", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125655:*:*:*:*:*:*", "matchCriteriaId": "9B2EBC6B-0C4D-40A7-A1B7-4AC7BF98A744", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "2C5ED401-A964-44D5-AB2F-C07D35BD96D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125657:*:*:*:*:*:*", "matchCriteriaId": "E424B820-3C4E-45C0-B74F-470E1E331127", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "1C14D389-AA7A-4CD3-A0B5-EF052907FEE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "48C09D5D-BC77-42DC-9A72-00A71F8C1A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "14269E88-7186-4F2C-B770-964D0AD7D414", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126002:*:*:*:*:*:*", "matchCriteriaId": "31498701-6732-40E4-8F3D-55EE8A77D61B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "C46D091F-095F-4F1D-8D16-1021E15BC963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "2AE780F5-EF56-45F3-A5E7-805A24C04A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "212A00BA-ED01-45F3-9E9C-9E6B75B82CDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "CBFA159F-0293-4E44-BB20-173021991107", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126104:*:*:*:*:*:*", "matchCriteriaId": "356504E5-BE0A-4F54-8713-AC9EA29D189C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "27D49B1C-1140-4CA7-B10A-9B59ACE69208", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "1979F66B-749E-41F8-9CBD-E4AD4483B500", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "BC5A1967-8D4F-4090-A2BA-5FFCEAA2EFFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "50D85F0C-201C-44D3-92C7-261095B4B03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "36B6C5A9-FC13-4AB0-BE8B-9DFA8FDB0C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126118:*:*:*:*:*:*", "matchCriteriaId": "B621572C-448C-43C4-AF8E-EEBCFADF3630", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126119:*:*:*:*:*:*", "matchCriteriaId": "AAAF3692-3979-494B-831A-D8BFE127A6C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "342D59C3-B7A8-44AF-8298-743F5487CD91", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "9A6D1AC1-8480-42C9-90C6-F47E58B7E44B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125657:*:*:*:*:*:*", "matchCriteriaId": "8BBD4797-AC5A-4CBE-8878-067116BB8E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "F31C74BA-085E-482C-A1E8-D6E9A69462B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "5D3E1BC5-7D01-45E9-A92D-7F2D623F1C4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "B15B6E60-9DF9-4524-8387-8CF0B2B6D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126002:*:*:*:*:*:*", "matchCriteriaId": "DEB00990-C73C-4B46-B87D-80E3B5B39302", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "06AEE3B8-3A71-466D-880F-B39E6E4D9899", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "C7E2FFFB-975D-4FFF-A54E-01336B2687BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126104:*:*:*:*:*:*", "matchCriteriaId": "34A43740-26B4-4D73-BC53-7D14529BA78B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "4C1FB9D8-1DA7-486C-9418-9C00F4D184D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "F78374E4-E4AF-4E77-9AE6-BEC58DCAB6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126119:*:*:*:*:*:*", "matchCriteriaId": "8912068D-3412-47E5-A790-0CDB29E05F20", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "989668B0-0AEB-4E8B-AC51-42058CC6AC3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "DC747248-7154-440A-BCD7-2E0F8ACFC042", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125657:*:*:*:*:*:*", "matchCriteriaId": "6A811C73-AE4A-4B56-841E-A8F2649463E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "F4791DD2-AD34-4239-85CB-D87080D97AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "F6E1060D-0E32-4330-BB0A-C35D5E11BCE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "FB7DAAA8-6A7B-41EF-8783-7EFDEE747332", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126002:*:*:*:*:*:*", "matchCriteriaId": "87907DDD-12AF-435A-A005-893FED115AAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "EA101FBC-D697-4A7E-B539-79097228B735", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "4CC9EF3C-6768-4976-94C8-3FBEE6093ECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126104:*:*:*:*:*:*", "matchCriteriaId": "362871E6-BF7C-46D4-8EFE-C87E96C71799", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "B5934D8A-C10F-47BC-BB73-45B8CB71C686", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "59E334B0-6BF6-4674-9D9D-7E9C988BAB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126119:*:*:*:*:*:*", "matchCriteriaId": "E866F2AE-FB51-4270-A673-B1299C7CD2F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "2BF85206-863D-493C-88F4-15B0BA5276A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "3C9DE996-1DEC-4AF0-89FD-1E3DA3967BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "75FF4D85-97C8-4DF4-ADE6-EDE8EC2DD5BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "9CAC6467-19F7-4CB2-A5FC-B57A14F4636C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "60EB56E2-7367-4488-A00D-41464E86B06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "3E315636-0897-4421-882D-E8196F7ACAD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125657:*:*:*:*:*:*", "matchCriteriaId": "6DC52F3E-EC5F-404B-ABD7-615B8AB522A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "E3552F71-C708-41A4-9168-5673C086F507", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "9505C545-2540-4554-B774-6ECCD64D6115", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "06CF15AE-51A6-4FB4-A0DA-6097F0B2BE98", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126002:*:*:*:*:*:*", "matchCriteriaId": "7B97826F-4765-4D11-972E-EEA0E23CE7CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "11A17B44-C69A-424A-A305-0AD61DCDA2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "8600CCB2-4642-4760-AE10-854446251673", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "087A0139-FA4B-4C85-BAAD-1BDCF7B5F91B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "2F3B1A89-93A9-43F1-9246-E2081F26DBBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126104:*:*:*:*:*:*", "matchCriteriaId": "D24EB0A7-64AB-4203-BDAC-57867083FF6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "9A7C64F7-9B85-4C7F-95B9-468200D2EA7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "1EE78F81-5F9D-4B98-BA82-24EE281041C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "298A1371-E23E-4954-8C16-B0F70A575A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "BA174B71-5D43-4783-8744-1A4020A157C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "ADB451D9-106E-40DA-A499-B1D8DB1B78BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126119:*:*:*:*:*:*", "matchCriteriaId": "156225CC-1B65-4AB2-80CE-806491E0E973", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature." }, { "lang": "es", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer y OpUtils versiones anteriores a 125658, 126003, 126105 y 126120, permiten a usuarios autenticados realizar cambios en la base de datos que conllevan a una ejecuci\u00f3n de c\u00f3digo remota en la funci\u00f3n NMAP" } ], "id": "CVE-2022-38772", "lastModified": "2024-11-21T07:17:03.677", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-29T21:15:09.227", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://manageengine.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://manageengine.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-04 17:59
Modified
2024-11-21 02:13
Severity ?
Summary
Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_social_it_plus | 11.0 | |
zohocorp | manageengine_it360 | * | |
zohocorp | manageengine_opmanager | 8.8 | |
zohocorp | manageengine_opmanager | 9.0 | |
zohocorp | manageengine_opmanager | 9.1 | |
zohocorp | manageengine_opmanager | 9.2 | |
zohocorp | manageengine_opmanager | 9.4 | |
zohocorp | manageengine_opmanager | 10.0 | |
zohocorp | manageengine_opmanager | 10.1 | |
zohocorp | manageengine_opmanager | 10.2 | |
zohocorp | manageengine_opmanager | 11.0 | |
zohocorp | manageengine_opmanager | 11.1 | |
zohocorp | manageengine_opmanager | 11.2 | |
zohocorp | manageengine_opmanager | 11.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "B68292A0-79E4-4CEE-844E-05342994E534", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FA5A84F-8B14-4BC4-8CBD-37178AE42DB8", "versionEndIncluding": "10.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "A35DA35B-6836-41FD-9B1D-E76809D19304", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B48CA686-28DF-4CE5-A950-1C62D162D987", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "504C45FC-1A8C-4C6A-AA55-4B2C21DF5BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E6403B7-8C3D-40D1-A32B-3A50B2A6D005", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:9.4:*:*:*:*:*:*:*", "matchCriteriaId": "DAD3BAD6-58BE-4099-994C-9DBFA2210D2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E30D446-E54B-414B-BEB0-E7C2AD6DC092", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "900914C7-4A60-45D2-90E1-3488998C77B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:10.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FE71B7E-88F9-45B3-911C-472B5438D062", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDEC9C04-2DA1-4307-8828-9E91352FB055", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0DD4D0DE-2B11-48AA-A60B-ED6B6DB94020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "0E7D1014-51CF-4A24-9935-BD385E1EE57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en el servlet com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector en ZOHO ManageEngine OpManager 8.8 hasta 11.3, Social IT Plus 11.0, y IT360 10.4 y anteriores permite a atacantes remotos o usuarios remotos autenticados escribir y ejecutar ficheros WAR arbitrarios a trav\u00e9s de un .. (punto punto) en el par\u00e1metro regionID." } ], "id": "CVE-2014-6034", "lastModified": "2024-11-21T02:13:38.180", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-04T17:59:02.863", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-04 17:15
Modified
2024-11-21 04:58
Severity ?
Summary
In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC6C8B88-B295-48DB-859A-7AF8E9027F62", "versionEndExcluding": "12.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:-:*:*:*:*:*:*", "matchCriteriaId": "B666DF1F-0EF8-41F0-9EA0-EB104F87405F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124000:*:*:*:*:*:*", "matchCriteriaId": "5B7042C9-FD7C-4A83-A755-1429D3CEF91D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124011:*:*:*:*:*:*", "matchCriteriaId": "86F61865-FB7B-4F12-B8EF-81A1DFB5E7E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124012:*:*:*:*:*:*", "matchCriteriaId": "5D81E915-18CC-4419-879D-A2D90472F526", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124013:*:*:*:*:*:*", "matchCriteriaId": "4B9314BA-7CA4-46C2-9ADD-AA15101081FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124014:*:*:*:*:*:*", "matchCriteriaId": "4A94FB0E-7487-4E18-A7AD-19E47B03BF1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124015:*:*:*:*:*:*", "matchCriteriaId": "D99A8A01-8EDC-4AE6-8ED9-C7AF12DEDA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124016:*:*:*:*:*:*", "matchCriteriaId": "44A9BF34-7B3B-4B5F-AEFD-AA7434C6A682", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124022:*:*:*:*:*:*", "matchCriteriaId": "33068139-B994-4145-B73A-2344A699A0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124023:*:*:*:*:*:*", "matchCriteriaId": "B798718E-3E01-4F3D-AD43-9BA7939E2EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124024:*:*:*:*:*:*", "matchCriteriaId": "E0C42019-0D5A-4938-87AB-F787C55E9834", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124025:*:*:*:*:*:*", "matchCriteriaId": "373AA6C3-DA45-4CCD-88EF-859858732FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124026:*:*:*:*:*:*", "matchCriteriaId": "13E24695-F223-4F62-B344-4CCB0BBE1050", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124027:*:*:*:*:*:*", "matchCriteriaId": "C8EDB65B-34E1-4F89-B2E0-CEE13F39DA90", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124030:*:*:*:*:*:*", "matchCriteriaId": "B8F7F90C-57BB-4E2F-BD79-1F56375A4E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124033:*:*:*:*:*:*", "matchCriteriaId": "A1343F39-5FAA-4EB7-B95A-5D5133AD5717", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124037:*:*:*:*:*:*", "matchCriteriaId": "C23F2AB2-714D-4548-B9F9-315CE31CF573", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124039:*:*:*:*:*:*", "matchCriteriaId": "AC8CDE36-EC3C-4F61-872C-8DD33688E0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124040:*:*:*:*:*:*", "matchCriteriaId": "D790A131-CA15-42A1-8F35-3DCF27D51060", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124041:*:*:*:*:*:*", "matchCriteriaId": "C91F973F-3910-41E6-9D2F-3506E8EF5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124042:*:*:*:*:*:*", "matchCriteriaId": "471FFC26-5DE7-42C6-B30B-EF5D1E1A35C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124043:*:*:*:*:*:*", "matchCriteriaId": "C5407B79-C1DF-481E-83A3-BCE36BEE29E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124051:*:*:*:*:*:*", "matchCriteriaId": "F09EF7FD-47EB-4989-8805-74EC075F91AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124053:*:*:*:*:*:*", "matchCriteriaId": "F91FCCC4-C8C0-49B2-86C7-B2896D72F019", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124054:*:*:*:*:*:*", "matchCriteriaId": "F7679A19-1874-4E97-87A5-60903A549A26", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124056:*:*:*:*:*:*", "matchCriteriaId": "D3B991A7-452F-46C6-AB37-78137A7B27CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124058:*:*:*:*:*:*", "matchCriteriaId": "66A7CEE9-8647-462A-8F50-9159132E01FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124065:*:*:*:*:*:*", "matchCriteriaId": "28D368E2-FBB1-4DC2-BDBF-7A4F994A14F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124066:*:*:*:*:*:*", "matchCriteriaId": "A9F3220A-D461-4412-9F73-B74EB299DBA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124067:*:*:*:*:*:*", "matchCriteriaId": "7442E3D2-83CC-4F75-89E3-64BAE5937722", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124069:*:*:*:*:*:*", "matchCriteriaId": "07B87F17-6AF0-4545-9527-154E0C6483C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124070:*:*:*:*:*:*", "matchCriteriaId": "B565B110-9A53-4BA1-BAB9-C6C16DEECD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124071:*:*:*:*:*:*", "matchCriteriaId": "AA46F3B7-0650-4630-9005-1FAC1EC22EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124074:*:*:*:*:*:*", "matchCriteriaId": "8706C9CD-0D79-4661-B0C5-AB1813DE1F0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124075:*:*:*:*:*:*", "matchCriteriaId": "2BACB527-2F9E-4C6B-8C7B-696EAD5251FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124081:*:*:*:*:*:*", "matchCriteriaId": "CC9D8F85-EFB8-4D0E-BD8F-6DBE239559F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124082:*:*:*:*:*:*", "matchCriteriaId": "0297A0EA-43F2-4AD0-BC73-E6014F1F74BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124085:*:*:*:*:*:*", "matchCriteriaId": "CA5F1F18-247B-4081-8B53-E34B1512D47F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124086:*:*:*:*:*:*", "matchCriteriaId": "2B8F85FF-78A7-4BF4-83C2-FC3ABFBC8715", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124087:*:*:*:*:*:*", "matchCriteriaId": "1C1A1836-D054-4B96-890E-E837050D6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124089:*:*:*:*:*:*", "matchCriteriaId": "25CD5A10-84D3-4EE6-B2A3-2F7B2E7D7CF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124095:*:*:*:*:*:*", "matchCriteriaId": "57245302-3114-408E-AE0B-8A2B0E1CC16E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124096:*:*:*:*:*:*", "matchCriteriaId": "570DF8F0-FEE0-48D2-B4B5-9A42AC710BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124097:*:*:*:*:*:*", "matchCriteriaId": "D3A1D662-A800-4CD4-AA9C-A9A5806547AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124098:*:*:*:*:*:*", "matchCriteriaId": "597EFA52-C830-472F-966A-DE6E0CF5C013", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124099:*:*:*:*:*:*", "matchCriteriaId": "6CD48702-4DA4-452C-8225-A37A57EF0B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124100:*:*:*:*:*:*", "matchCriteriaId": "05ED4A61-EECA-4B98-AACC-0203BE796885", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124101:*:*:*:*:*:*", "matchCriteriaId": "C6E5D010-9928-4AD6-84DD-8B9DE39B220F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124102:*:*:*:*:*:*", "matchCriteriaId": "384D799A-4E16-494B-BA57-52245B25E718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124168:*:*:*:*:*:*", "matchCriteriaId": "3A48C69B-4AA3-445F-B8B4-608F372712FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124169:*:*:*:*:*:*", "matchCriteriaId": "84A6CE26-B08A-4EDF-8F00-EEBCDC326F35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124175:*:*:*:*:*:*", "matchCriteriaId": "162FB7D6-19DF-4701-A969-496166ED1A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124176:*:*:*:*:*:*", "matchCriteriaId": "5623BBD0-4FED-4D66-8446-FB67824536F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124178:*:*:*:*:*:*", "matchCriteriaId": "7F459491-376E-46D2-A396-31E76FCD84AD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files." }, { "lang": "es", "value": "En Zoho ManageEngine OpManager versiones anteriores a 12.4.181, un atacante remoto no autenticado puede enviar un URI especialmente dise\u00f1ado para leer archivos arbitrarios." } ], "id": "CVE-2020-11527", "lastModified": "2024-11-21T04:58:04.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-04T17:15:14.047", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-04 13:15
Modified
2024-11-21 05:01
Severity ?
Summary
In Zoho ManageEngine OpManager before 125144, when <cachestart> is used, directory traversal validation can be bypassed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | * | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 | |
zohocorp | manageengine_opmanager | 12.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Zoho ManageEngine OpManager before 125144, when \u003ccachestart\u003e is used, directory traversal validation can be bypassed." }, { "lang": "es", "value": "En Zoho ManageEngine OpManager versiones anteriores a 125144, cuando es usado (cachestart), una comprobaci\u00f3n de salto de directorio puede ser omitida" } ], "id": "CVE-2020-13818", "lastModified": "2024-11-21T05:01:55.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-04T13:15:11.117", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "source": "cve@mitre.org", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-23 14:15
Modified
2024-12-19 20:21
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Zohocorp ManageEngine OpManager and Remote Monitoring and Management versions 128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "36BBC867-6304-4D20-B700-AF90A6E9AD92", "versionEndIncluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.8:build128102:*:*:*:*:*:*", "matchCriteriaId": "EFEEB6AC-CE71-4F6A-BF9A-745AE8AA659B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.8:build128103:*:*:*:*:*:*", "matchCriteriaId": "6E4D7FF9-8DBC-472A-B9E7-3190E4EDFE07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.8:build128104:*:*:*:*:*:*", "matchCriteriaId": "8333DEF5-F041-496D-9762-CF7CB86CB730", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.8:build128186:*:*:*:*:*:*", "matchCriteriaId": "04C88F59-5059-4FF5-A9A7-B4539418003C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.8:build128187:*:*:*:*:*:*", "matchCriteriaId": "7E824E22-6F35-4B19-98B6-E2D7295D3B88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CB1F9C1-FB50-451E-B2D1-D907F1A36276", "versionEndIncluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.8:build128102:*:*:*:*:*:*", "matchCriteriaId": "E611698E-49FD-48FA-8B23-32C4D3F655E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.8:build128103:*:*:*:*:*:*", "matchCriteriaId": "54F928AD-C6AD-4CCC-8ACF-3DE93EB6DD13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.8:build128104:*:*:*:*:*:*", "matchCriteriaId": "E73E5594-3491-4373-806C-A0E8335F4E93", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.8:build128186:*:*:*:*:*:*", "matchCriteriaId": "BA04AF9C-D59B-4CE0-82F6-65621E2C0058", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.8:build128187:*:*:*:*:*:*", "matchCriteriaId": "50067B64-1E4D-4A4E-BAE0-7940FC025C1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A855895-5EEC-406D-B3ED-7BF3318368F0", "versionEndIncluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.8:build128102:*:*:*:*:*:*", "matchCriteriaId": "E4538191-BBDC-4E82-9C4B-A00E9D845CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.8:build128103:*:*:*:*:*:*", "matchCriteriaId": "0E6D15B3-EF3D-4278-9231-9D4B3292EC84", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.8:build128104:*:*:*:*:*:*", "matchCriteriaId": "E307E12D-316E-481E-A9BC-CF91FF4FE15B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.8:build128186:*:*:*:*:*:*", "matchCriteriaId": "750D9A65-423C-48B1-9DC6-2C75AD115535", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.8:build128187:*:*:*:*:*:*", "matchCriteriaId": "17A772EF-75E0-43DB-95B8-6D1A00C76101", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_remote_monitoring_and_management_central:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1704E80-F82B-4205-94B3-0EC5F6C78415", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zohocorp ManageEngine OpManager and\u00a0Remote Monitoring and Management versions\u00a0128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option." }, { "lang": "es", "value": "Zohocorp ManageEngine OpManager y Remote Monitoring and Management versiones 128329 e inferiores son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo autenticado en la opci\u00f3n de implementaci\u00f3n del agente." } ], "id": "CVE-2024-5466", "lastModified": "2024-12-19T20:21:12.243", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "0fc0942c-577d-436f-ae8e-945763c79b02", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-23T14:15:11.073", "references": [ { "source": "0fc0942c-577d-436f-ae8e-945763c79b02", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2024-5466.html" } ], "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "0fc0942c-577d-436f-ae8e-945763c79b02", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-04 17:59
Modified
2024-11-21 02:18
Severity ?
Summary
SQL injection vulnerability in the com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus servlet in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the probeName parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | 11.3 | |
zohocorp | manageengine_opmanager | 11.4 | |
zohocorp | manageengine_social_it_plus | 11.0 | |
zohocorp | manageengine_it360 | 10.3.0 | |
zohocorp | manageengine_it360 | 10.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F0AD4AB-F837-415E-B264-8490B6A50C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_social_it_plus:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "B68292A0-79E4-4CEE-844E-05342994E534", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9176D056-7350-4371-8F7E-87C2521EEBF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_it360:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C71A803-6D67-4D8F-8072-73C10532BB30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus servlet in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the probeName parameter." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en el servlet com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus en ZOHO ManageEngine OpManager 11.3 y 11.4, IT360 10.3 y 10.4, y Social IT Plus 11.0 permite a atacantes remotos o usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro probeName." } ], "id": "CVE-2014-7867", "lastModified": "2024-11-21T02:18:10.323", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-04T17:59:05.737", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-10 20:16
Modified
2024-11-21 07:14
Severity ?
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user's API key, and then access external APIs.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "95767F18-02DA-4B39-941E-3111639A8295", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "3D6B8568-FCE8-4283-A41A-98DDA07B3631", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "D6CF42CA-ED4F-4184-B392-B9BA6846A7D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "2AFC22CB-4540-498A-AAA1-0F6D1676F290", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "6585CDEA-9649-45A3-8965-E2CEAB1ADFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "5D9F4070-68B1-4444-991A-A2CB0063442A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "EF7CDF11-A00E-47B6-B8E3-512998134656", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "A0B3AA58-0D48-4152-BF08-357D4A2098AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "22171713-63E5-42F8-BD7B-835447371595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "D42A5730-622F-4903-991D-B54881349ABC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "EC69DF45-45F8-4C7B-8457-666270C95895", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "A33E48DB-3CC9-43FD-85F8-0F3C389B961E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "389CF8B9-F431-4369-A581-4BFBA1305A9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "DBD1E3BA-4112-4AD5-A616-BCFD2D5C5FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "4FFD8500-5E07-4B3E-88EC-27C403A9B44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "0BED22ED-D040-4439-AEC6-8CCD74F29217", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "4D1C56BB-D28D-48B6-BA6B-7B403E248648", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "A49349AE-4EA2-4CE4-B8B9-326D44264B33", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "BEC805D2-CFDC-40DE-AA70-42A91461BEE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "4767BF5A-B867-44BB-B152-E2AFA63B06D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "5855C471-07AB-4A96-9631-26C6C8B01F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "5075910F-3676-439A-879A-5CBE2C734347", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "20808F91-7F08-4BA9-9075-C54337EC68E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "C700CE3B-31B5-4B4D-A378-70EC26D6F88B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "574117B3-2785-4971-ABBE-55C08010E16B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "8C4AA98C-BFFE-46E9-A3C3-D37298A8F6F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "B907FD6F-BA43-4D8D-90C4-F51CD693E9B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "B6CF111E-B976-46D1-A246-B7D1750FFC45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "36CBCAF8-B7FE-4611-A9DE-C82BCDE81A86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "33D8FC4D-0EF1-4C5B-A677-7269FFF068C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "C510DE4D-B2AB-404D-BA49-3CE09FAECB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "6594EF08-E72F-4A59-86DB-B63E0CCE4463", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "219B0F9E-A087-4AA2-B723-E3D68BEC9D21", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "852A63FF-F97B-4BB9-869F-383E9FABE929", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "FA6C4793-6913-4C51-A2D4-B906D2CBEA94", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "3AF232D9-6735-4296-91C8-A451A1801287", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "855EA944-CB73-4193-94E0-9D706FF554C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "002FDBC8-72DE-46C6-A84B-B4A51F3228F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "AABA0E18-790D-4A86-91C4-1C50D2B6167C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "797C3F7A-E5CE-48B7-9BC1-4A637131C061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "7EE387F3-24C8-4933-A25E-D9C4026469D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "2D219374-C6A2-4A28-AF41-ABC633D8C9ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "88C4DF20-F8A7-4673-9639-42522C6BB3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "722ACCC8-EC9C-4700-A5D0-5C6EFE8E36AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "FC0970ED-62DC-442B-AA29-618ADBD66E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "8D6852F2-14B0-4EAE-B420-67A0103C10EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "BF0CBE7F-B124-4ABD-82F5-CB85341CAC86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "08A4CCDD-0892-4FF3-8E17-41D6AB8FC747", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "2DB6B15E-6513-4590-A5C1-A949341411F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "C1DF8B30-1820-4DA1-AB30-996FCC99192B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "09C0FF80-AF4C-47F9-B35C-12A7F2843D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "6445A4A5-E41D-4B60-88E7-0E5B66C2A096", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "645D9C07-A2F4-4E8B-B2FD-39330CD7BE14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "63739B14-BBAF-4F12-A178-36CE2C0F6B5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "1C14D389-AA7A-4CD3-A0B5-EF052907FEE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "48C09D5D-BC77-42DC-9A72-00A71F8C1A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "14269E88-7186-4F2C-B770-964D0AD7D414", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "C46D091F-095F-4F1D-8D16-1021E15BC963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "2AE780F5-EF56-45F3-A5E7-805A24C04A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "212A00BA-ED01-45F3-9E9C-9E6B75B82CDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "CBFA159F-0293-4E44-BB20-173021991107", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "27D49B1C-1140-4CA7-B10A-9B59ACE69208", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "1979F66B-749E-41F8-9CBD-E4AD4483B500", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "BC5A1967-8D4F-4090-A2BA-5FFCEAA2EFFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "50D85F0C-201C-44D3-92C7-261095B4B03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "36B6C5A9-FC13-4AB0-BE8B-9DFA8FDB0C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "342D59C3-B7A8-44AF-8298-743F5487CD91", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "9A6D1AC1-8480-42C9-90C6-F47E58B7E44B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "F31C74BA-085E-482C-A1E8-D6E9A69462B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "5D3E1BC5-7D01-45E9-A92D-7F2D623F1C4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "B15B6E60-9DF9-4524-8387-8CF0B2B6D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "06AEE3B8-3A71-466D-880F-B39E6E4D9899", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "C7E2FFFB-975D-4FFF-A54E-01336B2687BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "4C1FB9D8-1DA7-486C-9418-9C00F4D184D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "F78374E4-E4AF-4E77-9AE6-BEC58DCAB6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "989668B0-0AEB-4E8B-AC51-42058CC6AC3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "DC747248-7154-440A-BCD7-2E0F8ACFC042", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "F4791DD2-AD34-4239-85CB-D87080D97AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "F6E1060D-0E32-4330-BB0A-C35D5E11BCE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "FB7DAAA8-6A7B-41EF-8783-7EFDEE747332", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "EA101FBC-D697-4A7E-B539-79097228B735", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "4CC9EF3C-6768-4976-94C8-3FBEE6093ECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "B5934D8A-C10F-47BC-BB73-45B8CB71C686", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "59E334B0-6BF6-4674-9D9D-7E9C988BAB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "2BF85206-863D-493C-88F4-15B0BA5276A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "3C9DE996-1DEC-4AF0-89FD-1E3DA3967BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "75FF4D85-97C8-4DF4-ADE6-EDE8EC2DD5BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "9CAC6467-19F7-4CB2-A5FC-B57A14F4636C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "60EB56E2-7367-4488-A00D-41464E86B06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "3E315636-0897-4421-882D-E8196F7ACAD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "E3552F71-C708-41A4-9168-5673C086F507", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126000:*:*:*:*:*:*", "matchCriteriaId": "9505C545-2540-4554-B774-6ECCD64D6115", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126001:*:*:*:*:*:*", "matchCriteriaId": "06CF15AE-51A6-4FB4-A0DA-6097F0B2BE98", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126100:*:*:*:*:*:*", "matchCriteriaId": "11A17B44-C69A-424A-A305-0AD61DCDA2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126101:*:*:*:*:*:*", "matchCriteriaId": "8600CCB2-4642-4760-AE10-854446251673", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126102:*:*:*:*:*:*", "matchCriteriaId": "087A0139-FA4B-4C85-BAAD-1BDCF7B5F91B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126103:*:*:*:*:*:*", "matchCriteriaId": "2F3B1A89-93A9-43F1-9246-E2081F26DBBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126113:*:*:*:*:*:*", "matchCriteriaId": "9A7C64F7-9B85-4C7F-95B9-468200D2EA7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126114:*:*:*:*:*:*", "matchCriteriaId": "1EE78F81-5F9D-4B98-BA82-24EE281041C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126115:*:*:*:*:*:*", "matchCriteriaId": "298A1371-E23E-4954-8C16-B0F70A575A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126116:*:*:*:*:*:*", "matchCriteriaId": "BA174B71-5D43-4783-8744-1A4020A157C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.6:build126117:*:*:*:*:*:*", "matchCriteriaId": "ADB451D9-106E-40DA-A499-B1D8DB1B78BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user\u0027s API key, and then access external APIs." }, { "lang": "es", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer y OpUtils versiones anteriores a 27-07-2022 hasta 28-07-2022 (125657, 126002, 126104 y 126118) permiten a atacantes no autenticados obtener la clave API de un usuario y luego acceder a APIs externas" } ], "id": "CVE-2022-36923", "lastModified": "2024-11-21T07:14:05.603", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-10T20:16:03.343", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-06-29 12:29
Modified
2024-11-21 03:46
Severity ?
Summary
A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:firewall_analyzer:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DFC3545-5EE0-4722-BFB6-58B3AF246F87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:-:*:*:*:*:*:*:*", "matchCriteriaId": "0940949F-4EB4-460B-8CE9-56B6387250F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1C4C73-FD72-4EE7-BE63-D83C373E6A3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:-:*:*:*:*:*:*:*", "matchCriteriaId": "91373406-389A-404C-81A1-BA994B0C06DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AE5990D-D4B9-4D55-B221-20A9BF765C0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter \u0027operation\u0027 to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet." }, { "lang": "es", "value": "Una vulnerabilidad Cross-Site Scripting (XSS) reflejado en Zoho ManageEngine Netflow Analyzer antes de la build 123137, Network Configuration Manager antes de la build 123128, OpManager antes de la build 123148, OpUtils antes de la build 123161, y Firewall Analyzer antes de la build 123147 permite a los atacantes remotos inyectar scripts web o HTML arbitrarios a trav\u00e9s del par\u00e1metro \"operation\" en /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet." } ], "id": "CVE-2018-12998", "lastModified": "2024-11-21T03:46:13.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-06-29T12:29:00.500", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Jul/75" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/unh3x/just4cve/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Jul/75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/unh3x/just4cve/issues/10" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-21 09:29
Modified
2024-11-21 04:01
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/106302 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106302 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*", "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*", "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*", "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*", "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*", "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*", "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*", "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*", "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*", "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*", "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*", "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*", "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*", "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*", "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*", "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*", "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*", "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*", "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*", "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*", "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*", "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*", "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*", "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*", "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*", "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*", "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*", "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*", "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*", "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*", "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*", "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*", "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*", "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*", "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*", "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*", "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*", "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*", "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*", "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*", "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*", "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*", "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*", "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*", "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*", "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*", "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*", "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*", "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*", "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*", "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*", "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*", "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*", "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*", "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*", "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*", "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*", "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*", "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*", "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*", "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*", "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*", "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*", "matchCriteriaId": "F3F7F501-1F21-4825-BD82-23ACA713FFD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*", "matchCriteriaId": "422417EA-FF20-428A-AC02-18D4F84DA123", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*", "matchCriteriaId": "59BCAF6B-CAC3-4142-B303-7B85B24C573C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*", "matchCriteriaId": "136E1AE8-723C-4A85-AC7A-A5FA557BE66F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*", "matchCriteriaId": "19BE3780-3FAB-46C9-9399-62C18EA1A322", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*", "matchCriteriaId": "D32CDFC3-8041-426B-BBE0-245703D4D74E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*", "matchCriteriaId": "6B95BC46-7679-415E-814B-29DA657A718E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123238:*:*:*:*:*:*", "matchCriteriaId": "C4C6D08A-13C8-4BE9-870A-9EB4591F984A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section." }, { "lang": "es", "value": "Zoho ManageEngine OpManager, en versiones 12.3 anteriores a la build 123239, permite una inyecci\u00f3n SQL en la secci\u00f3n Alarms." } ], "id": "CVE-2018-20338", "lastModified": "2024-11-21T04:01:16.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-21T09:29:00.403", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106302" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-05-07 20:15
Modified
2024-11-21 04:59
Severity ?
Summary
Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD5FAEF6-F6BD-4624-A0E6-E2AE4E515D48", "versionEndIncluding": "12.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:-:*:*:*:*:*:*", "matchCriteriaId": "B666DF1F-0EF8-41F0-9EA0-EB104F87405F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124000:*:*:*:*:*:*", "matchCriteriaId": "5B7042C9-FD7C-4A83-A755-1429D3CEF91D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124011:*:*:*:*:*:*", "matchCriteriaId": "86F61865-FB7B-4F12-B8EF-81A1DFB5E7E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124012:*:*:*:*:*:*", "matchCriteriaId": "5D81E915-18CC-4419-879D-A2D90472F526", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124013:*:*:*:*:*:*", "matchCriteriaId": "4B9314BA-7CA4-46C2-9ADD-AA15101081FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124014:*:*:*:*:*:*", "matchCriteriaId": "4A94FB0E-7487-4E18-A7AD-19E47B03BF1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124015:*:*:*:*:*:*", "matchCriteriaId": "D99A8A01-8EDC-4AE6-8ED9-C7AF12DEDA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124016:*:*:*:*:*:*", "matchCriteriaId": "44A9BF34-7B3B-4B5F-AEFD-AA7434C6A682", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124022:*:*:*:*:*:*", "matchCriteriaId": "33068139-B994-4145-B73A-2344A699A0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124023:*:*:*:*:*:*", "matchCriteriaId": "B798718E-3E01-4F3D-AD43-9BA7939E2EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124024:*:*:*:*:*:*", "matchCriteriaId": "E0C42019-0D5A-4938-87AB-F787C55E9834", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124025:*:*:*:*:*:*", "matchCriteriaId": "373AA6C3-DA45-4CCD-88EF-859858732FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124026:*:*:*:*:*:*", "matchCriteriaId": "13E24695-F223-4F62-B344-4CCB0BBE1050", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124027:*:*:*:*:*:*", "matchCriteriaId": "C8EDB65B-34E1-4F89-B2E0-CEE13F39DA90", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124030:*:*:*:*:*:*", "matchCriteriaId": "B8F7F90C-57BB-4E2F-BD79-1F56375A4E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124033:*:*:*:*:*:*", "matchCriteriaId": "A1343F39-5FAA-4EB7-B95A-5D5133AD5717", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124037:*:*:*:*:*:*", "matchCriteriaId": "C23F2AB2-714D-4548-B9F9-315CE31CF573", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124039:*:*:*:*:*:*", "matchCriteriaId": "AC8CDE36-EC3C-4F61-872C-8DD33688E0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124040:*:*:*:*:*:*", "matchCriteriaId": "D790A131-CA15-42A1-8F35-3DCF27D51060", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124041:*:*:*:*:*:*", "matchCriteriaId": "C91F973F-3910-41E6-9D2F-3506E8EF5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124042:*:*:*:*:*:*", "matchCriteriaId": "471FFC26-5DE7-42C6-B30B-EF5D1E1A35C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124043:*:*:*:*:*:*", "matchCriteriaId": "C5407B79-C1DF-481E-83A3-BCE36BEE29E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124051:*:*:*:*:*:*", "matchCriteriaId": "F09EF7FD-47EB-4989-8805-74EC075F91AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124053:*:*:*:*:*:*", "matchCriteriaId": "F91FCCC4-C8C0-49B2-86C7-B2896D72F019", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124054:*:*:*:*:*:*", "matchCriteriaId": "F7679A19-1874-4E97-87A5-60903A549A26", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124056:*:*:*:*:*:*", "matchCriteriaId": "D3B991A7-452F-46C6-AB37-78137A7B27CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124058:*:*:*:*:*:*", "matchCriteriaId": "66A7CEE9-8647-462A-8F50-9159132E01FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124065:*:*:*:*:*:*", "matchCriteriaId": "28D368E2-FBB1-4DC2-BDBF-7A4F994A14F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124066:*:*:*:*:*:*", "matchCriteriaId": "A9F3220A-D461-4412-9F73-B74EB299DBA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124067:*:*:*:*:*:*", "matchCriteriaId": "7442E3D2-83CC-4F75-89E3-64BAE5937722", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124069:*:*:*:*:*:*", "matchCriteriaId": "07B87F17-6AF0-4545-9527-154E0C6483C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124070:*:*:*:*:*:*", "matchCriteriaId": "B565B110-9A53-4BA1-BAB9-C6C16DEECD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124071:*:*:*:*:*:*", "matchCriteriaId": "AA46F3B7-0650-4630-9005-1FAC1EC22EE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124072:*:*:*:*:*:*", "matchCriteriaId": "3A3F721D-209A-41B3-850F-6464E4D611D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124074:*:*:*:*:*:*", "matchCriteriaId": "8706C9CD-0D79-4661-B0C5-AB1813DE1F0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124075:*:*:*:*:*:*", "matchCriteriaId": "2BACB527-2F9E-4C6B-8C7B-696EAD5251FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124081:*:*:*:*:*:*", "matchCriteriaId": "CC9D8F85-EFB8-4D0E-BD8F-6DBE239559F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124082:*:*:*:*:*:*", "matchCriteriaId": "0297A0EA-43F2-4AD0-BC73-E6014F1F74BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124085:*:*:*:*:*:*", "matchCriteriaId": "CA5F1F18-247B-4081-8B53-E34B1512D47F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124086:*:*:*:*:*:*", "matchCriteriaId": "2B8F85FF-78A7-4BF4-83C2-FC3ABFBC8715", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124087:*:*:*:*:*:*", "matchCriteriaId": "1C1A1836-D054-4B96-890E-E837050D6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124089:*:*:*:*:*:*", "matchCriteriaId": "25CD5A10-84D3-4EE6-B2A3-2F7B2E7D7CF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124095:*:*:*:*:*:*", "matchCriteriaId": "57245302-3114-408E-AE0B-8A2B0E1CC16E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124096:*:*:*:*:*:*", "matchCriteriaId": "570DF8F0-FEE0-48D2-B4B5-9A42AC710BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124097:*:*:*:*:*:*", "matchCriteriaId": "D3A1D662-A800-4CD4-AA9C-A9A5806547AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124098:*:*:*:*:*:*", "matchCriteriaId": "597EFA52-C830-472F-966A-DE6E0CF5C013", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124099:*:*:*:*:*:*", "matchCriteriaId": "6CD48702-4DA4-452C-8225-A37A57EF0B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124100:*:*:*:*:*:*", "matchCriteriaId": "05ED4A61-EECA-4B98-AACC-0203BE796885", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124101:*:*:*:*:*:*", "matchCriteriaId": "C6E5D010-9928-4AD6-84DD-8B9DE39B220F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124102:*:*:*:*:*:*", "matchCriteriaId": "384D799A-4E16-494B-BA57-52245B25E718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124168:*:*:*:*:*:*", "matchCriteriaId": "3A48C69B-4AA3-445F-B8B4-608F372712FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124169:*:*:*:*:*:*", "matchCriteriaId": "84A6CE26-B08A-4EDF-8F00-EEBCDC326F35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124175:*:*:*:*:*:*", "matchCriteriaId": "162FB7D6-19DF-4701-A969-496166ED1A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124176:*:*:*:*:*:*", "matchCriteriaId": "5623BBD0-4FED-4D66-8446-FB67824536F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124178:*:*:*:*:*:*", "matchCriteriaId": "7F459491-376E-46D2-A396-31E76FCD84AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124181:*:*:*:*:*:*", "matchCriteriaId": "B2B042D9-E237-46EB-ABAB-EADD34B454F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124182:*:*:*:*:*:*", "matchCriteriaId": "7F94D4CC-A8C9-4D8D-BBBE-1F4A33F8A5F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124183:*:*:*:*:*:*", "matchCriteriaId": "62313BC2-EC7E-4B8A-B0AD-29EBB7F68D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124189:*:*:*:*:*:*", "matchCriteriaId": "A435381D-0006-4768-901D-86D09A7696A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124190:*:*:*:*:*:*", "matchCriteriaId": "910F065E-6DD1-4551-B6B6-A89991E91FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124191:*:*:*:*:*:*", "matchCriteriaId": "F57577CF-FC3E-48BE-9459-ACA39A29B4C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request." }, { "lang": "es", "value": "Zoho ManageEngine OpManager Stable build anterior a 124196 y Released build anterior a 125125, permite a un atacante no autenticado leer archivos arbitrarios en el servidor mediante el env\u00edo de una petici\u00f3n dise\u00f1ada." } ], "id": "CVE-2020-12116", "lastModified": "2024-11-21T04:59:16.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-07T20:15:12.297", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-21 15:15
Modified
2024-11-21 04:32
Severity ?
Summary
Incorrect file permissions on the packaged Nipper executable file in Zoho ManageEngine OpManager 12.4.072 and Firewall Analyzer 12.4.072 allow local users to elevate privileges to root by overwriting this file with a malicious payload.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html | Third Party Advisory | |
cve@mitre.org | https://twitter.com/va_start | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/va_start | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_firewall_analyzer | 12.4 | |
zohocorp | manageengine_opmanager | 12.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.4:124072:*:*:*:*:*:*", "matchCriteriaId": "6EF981EA-1C02-49C7-BA1B-0E4896B8F8AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124072:*:*:*:*:*:*", "matchCriteriaId": "3A3F721D-209A-41B3-850F-6464E4D611D0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect file permissions on the packaged Nipper executable file in Zoho ManageEngine OpManager 12.4.072 and Firewall Analyzer 12.4.072 allow local users to elevate privileges to root by overwriting this file with a malicious payload." }, { "lang": "es", "value": "Los permisos de archivo incorrectos en el archivo ejecutable Nipper empaquetado en Zoho ManageEngine OpManager versi\u00f3n 12.4.072 y Firewall Analyzer versi\u00f3n 12.4.072, permiten a usuarios locales elevar los privilegios de root al sobrescribir este archivo con una carga maliciosa." } ], "id": "CVE-2019-17421", "lastModified": "2024-11-21T04:32:18.050", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-21T15:15:14.790", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://twitter.com/va_start" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://twitter.com/va_start" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-18 13:15
Modified
2024-11-21 07:11
Severity ?
Summary
ManageEngine Password Manager Pro 12100 and prior and OPManager 126100 and prior are vulnerable to unauthorized file and directory creation on a server machine.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://manageengine.com | Vendor Advisory | |
cve@mitre.org | https://www.manageengine.com/itom/advisory/cve-2022-35404.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://manageengine.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/itom/advisory/cve-2022-35404.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*", "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*", "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*", "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*", "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*", "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*", "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*", "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*", "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*", "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*", "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*", "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*", "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*", "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*", "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*", "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*", "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*", "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*", "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*", "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*", "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*", "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*", "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*", "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*", "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*", "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*", "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*", "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*", "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*", "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*", "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*", "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*", "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*", "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*", "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*", "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*", "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*", "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*", "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*", "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*", "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*", "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*", "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125457:*:*:*:*:*:*", "matchCriteriaId": "BC457292-04FE-4643-8F1D-05DAEF3F70BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*", "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*", "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*", "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125476:*:*:*:*:*:*", "matchCriteriaId": "BE930B14-4B22-4299-8DE8-7625342FC4E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*", "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*", "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*", "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*", "matchCriteriaId": "7D394493-D690-44F0-B3F0-FD39E46F31C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "AF8CBF57-EF1A-4C84-879B-1A4035F4236A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*", "matchCriteriaId": "2F1E924E-8896-41CE-82E2-F22943A02FCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*", "matchCriteriaId": "FB058840-E3D0-45FA-B95F-3445A7719118", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125589:*:*:*:*:*:*", "matchCriteriaId": "FD9B23C4-3458-4E6C-B1AB-D4A36BE8FFA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125597:*:*:*:*:*:*", "matchCriteriaId": "D2A7AA89-7233-4624-894A-B2B996D1D270", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125598:*:*:*:*:*:*", "matchCriteriaId": "B6B402ED-8B64-4FB0-B9E7-76E499A4115F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125599:*:*:*:*:*:*", "matchCriteriaId": "4E8B01F2-0A03-48CF-8BAE-556A9C3D88FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125601:*:*:*:*:*:*", "matchCriteriaId": "3C07E022-B75C-4491-8A30-9A1532D0472C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125603:*:*:*:*:*:*", "matchCriteriaId": "00E92DB5-8D53-4129-92D0-AD1DA0F1FEB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125604:*:*:*:*:*:*", "matchCriteriaId": "913CD99C-8F47-47BD-BD7C-33762861BB08", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125605:*:*:*:*:*:*", "matchCriteriaId": "67B7F52E-7D7A-4AA9-9241-FFCC3DD49BBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125611:*:*:*:*:*:*", "matchCriteriaId": "D02650C3-1A7F-4889-B6CB-11994054B5F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125612:*:*:*:*:*:*", "matchCriteriaId": "01FEA1CA-351B-4E2B-A78E-60338682F97F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125613:*:*:*:*:*:*", "matchCriteriaId": "04C9E097-FE04-42BD-96C8-2A3A9FD50B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125614:*:*:*:*:*:*", "matchCriteriaId": "94F895DB-C865-4AED-A1D9-CE69C0EF52FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "8B565B12-283F-4323-9C88-FD3CF5646DD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125616:*:*:*:*:*:*", "matchCriteriaId": "9FDC3394-293E-44CF-A83F-FE047A4E4DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125617:*:*:*:*:*:*", "matchCriteriaId": "01846F8F-D7D6-4CD9-B83E-41B70C691761", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125628:*:*:*:*:*:*", "matchCriteriaId": "CAE013FC-357D-42DA-B223-D40B3C813089", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125629:*:*:*:*:*:*", "matchCriteriaId": "E4BA87E9-5E37-41EE-835C-13F68ABC9C06", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125630:*:*:*:*:*:*", "matchCriteriaId": "D2034E17-2DB9-4229-B7D4-D14761CEE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125631:*:*:*:*:*:*", "matchCriteriaId": "39FBAFB9-5703-4EEA-BFF3-45B958E0805F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125632:*:*:*:*:*:*", "matchCriteriaId": "775D060A-773F-40BE-8FF3-6353EEA6A6BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125634:*:*:*:*:*:*", "matchCriteriaId": "D8326A48-9DDB-4502-B97F-ABCB151E2C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125635:*:*:*:*:*:*", "matchCriteriaId": "94ACC068-8260-4331-8B1C-E19B66D0738B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125638:*:*:*:*:*:*", "matchCriteriaId": "FE3C3B0A-BD28-4291-BD28-61A1EEB7AE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125645:*:*:*:*:*:*", "matchCriteriaId": "E1303424-7BCA-4445-BDBC-B4B546E0ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125648:*:*:*:*:*:*", "matchCriteriaId": "EFFB585B-80EB-4EA3-BEC6-4E34FE952948", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125649:*:*:*:*:*:*", "matchCriteriaId": "8D7B62B9-AAD9-4021-A806-21E61719E437", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125651:*:*:*:*:*:*", "matchCriteriaId": "F1BF50D1-031E-4E39-9D15-FFC2CFB636D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125652:*:*:*:*:*:*", "matchCriteriaId": "F045D3C8-315C-42AB-B9D0-4B5267E70417", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125653:*:*:*:*:*:*", "matchCriteriaId": "AC4FD2D6-9BA7-4889-96A2-DC946831469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125654:*:*:*:*:*:*", "matchCriteriaId": "3D86914B-49B5-4002-A4C7-3712C87F7626", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "2C5ED401-A964-44D5-AB2F-C07D35BD96D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125657:*:*:*:*:*:*", "matchCriteriaId": "E424B820-3C4E-45C0-B74F-470E1E331127", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "1C14D389-AA7A-4CD3-A0B5-EF052907FEE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCB0C7A9-5511-4AC9-B5E4-74AAE6973E34", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "D6268D81-10E3-4BD0-A593-3639B2745577", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "BDA5DDA4-A67C-4370-B41D-02755FCF1F6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "3D99CD97-1D6B-4C67-A909-E1CE28A78E10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "70FEC14F-A53C-437C-981A-214B867142E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125115:*:*:*:*:*:*", "matchCriteriaId": "895E57EA-A8F6-425B-9D08-654E03B92B30", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "9EE0C771-B2F6-4766-82FD-203967CE37D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "0DCD6102-19F7-42D2-A81B-C85824CA351D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "3C2C0A08-66BF-4FDC-A209-769234438844", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "8DDC3649-12A9-41F3-A27D-646B5DF05E93", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125129:*:*:*:*:*:*", "matchCriteriaId": "4F037A2A-4B9A-4EBC-94E2-87502960FF20", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "B15E99A3-989F-4EFD-BA26-DEC6992BD1CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125142:*:*:*:*:*:*", "matchCriteriaId": "B85BF117-503B-435F-8667-481D9AC7A788", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125149:*:*:*:*:*:*", "matchCriteriaId": "3AC2A038-F59B-4137-B02F-4C26E2EB9152", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "F605C78F-8BE4-4E02-A7FB-CA9D24AFE7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "15557A07-E0E9-40DB-B013-0F4AD9556BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125199:*:*:*:*:*:*", "matchCriteriaId": "79082C84-9F25-4A63-86AF-18CC4ADF71CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "A88678CE-DB64-4D66-8F2A-3C60058DC5CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "88009BAC-1ECF-4BA3-855F-96C8789E476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "E64F7B54-6B09-4B7E-B2AB-5EA73FD8E0AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "2B94DFD2-374C-47A9-9D54-3FDB63197FFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "9B0330D9-1276-4228-BA7E-B9E3B828E5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "89736956-D05D-437B-BC7A-850AA459C123", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125234:*:*:*:*:*:*", "matchCriteriaId": "63B26424-7292-4F37-B86F-2A4E0AD32B85", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "2D2629FB-0A83-43CC-8C83-444036D05F7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125325:*:*:*:*:*:*", "matchCriteriaId": "4CFD99D1-CB43-437B-8E7D-6712DA5C9835", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125327:*:*:*:*:*:*", "matchCriteriaId": "6FEBA58F-E5B4-4B91-B78F-620C6EB9D3BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "F9F9D406-FE99-45C0-B1C0-4DEB5E843FE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "F4B86974-C598-4E1A-9FF0-5AF9638C1AD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125345:*:*:*:*:*:*", "matchCriteriaId": "C2838623-6F3F-417A-A644-FA226CCD8BB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125358:*:*:*:*:*:*", "matchCriteriaId": "454EDD2A-E79A-4D46-B841-BE5EC12C63D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "1557A740-D19D-4220-9B3E-395EFCB86F9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125363:*:*:*:*:*:*", "matchCriteriaId": "9C7DB404-A5C7-4EDB-BCB2-079A41E31428", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125378:*:*:*:*:*:*", "matchCriteriaId": "B738952C-DE7B-4C3D-85B9-ADBEDF007AFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125392:*:*:*:*:*:*", "matchCriteriaId": "897D140C-20FF-454D-8928-B11FFC84C016", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "18F93D7C-E8FC-4D4C-AEA0-C1187FB6D9D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125417:*:*:*:*:*:*", "matchCriteriaId": "2E799367-7DC7-478D-948A-17D717507DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125436:*:*:*:*:*:*", "matchCriteriaId": "F63F4324-8D54-43A9-8172-1BC6960146B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125445:*:*:*:*:*:*", "matchCriteriaId": "74A5591E-75A4-4ACA-9C34-4907D645AA88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "7EE387F3-24C8-4933-A25E-D9C4026469D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125459:*:*:*:*:*:*", "matchCriteriaId": "0C67D5FC-5965-4AC1-80A5-931BE60B5E86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125465:*:*:*:*:*:*", "matchCriteriaId": "139E25D9-A4C8-4041-ADF7-4618DFEEE8C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "6A65F3F7-45D3-49EB-9784-1F13FA2CBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125471:*:*:*:*:*:*", "matchCriteriaId": "3795D2DE-622F-4C82-B133-0993A01AC1FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125475:*:*:*:*:*:*", "matchCriteriaId": "C0DB9896-BC25-46E3-AA6F-496A442BE525", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "CE56A949-74AC-4138-8AD3-31F5763860EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "4A3DB867-FD46-46EB-AEF0-2B6E79371AF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "7881FBB4-AC09-4EB9-B02F-3EA19237E095", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "F391E432-98B8-4D97-8AD4-FB1A84FAF774", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125490:*:*:*:*:*:*", "matchCriteriaId": "61D908B2-446E-48EC-9F6B-91E8BF0F6A38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125565:*:*:*:*:*:*", "matchCriteriaId": "FD5F28B0-580E-4CD4-917A-496D35AD271A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "F0FC96AA-F2F4-4C35-8BF7-6318A2F624A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125583:*:*:*:*:*:*", "matchCriteriaId": "6EA008F1-4E47-4753-8506-769B29AB5BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125584:*:*:*:*:*:*", "matchCriteriaId": "7ED68CDE-1096-4490-8E6B-78F4AC2BB729", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125598:*:*:*:*:*:*", "matchCriteriaId": "34F8D9B7-3BD7-44C0-A292-162928729F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125612:*:*:*:*:*:*", "matchCriteriaId": "7446678C-E2DB-4EA2-BC9B-430C8EC7804B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "33C57314-5503-48BD-9ED2-D76517C9C0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125617:*:*:*:*:*:*", "matchCriteriaId": "AC201C68-2C1D-4E75-9443-C5F853A37AB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125646:*:*:*:*:*:*", "matchCriteriaId": "FBC08E48-51FA-497F-B5EB-349081888402", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125650:*:*:*:*:*:*", "matchCriteriaId": "FD78483C-8AC8-46B3-A1FB-2DA04468BCEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "D1DBA938-81D2-4CF8-B1F2-B71C4B82835D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "88C4DF20-F8A7-4673-9639-42522C6BB3C2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*", "matchCriteriaId": "340D8561-6110-49D8-BCDC-78A762FCD3E6", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "6280B6AB-C233-480A-95E6-E03D58AA7B5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "C61E9B3D-A39D-428E-A82F-5C4C225906C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "423D3372-F910-4006-9FE8-49A6B730AEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125109:*:*:*:*:*:*", "matchCriteriaId": "02B0ED3C-4729-4C70-8F06-6B507ED75BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125115:*:*:*:*:*:*", "matchCriteriaId": "3CE0B4B2-CC4C-4F0F-B97E-A90C84377989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "DC2E4C62-9867-4D14-85B3-95F359BD0551", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "356A4F91-FA5B-4A09-841E-A380F580BA88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125129:*:*:*:*:*:*", "matchCriteriaId": "CBBDC611-498B-4175-9A88-5914ED6D3A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125141:*:*:*:*:*:*", "matchCriteriaId": "10F3C9AD-9C1B-4FBD-8325-B56FCF96FFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125149:*:*:*:*:*:*", "matchCriteriaId": "F4EE5C24-C4AE-4F9D-B808-8930102A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125160:*:*:*:*:*:*", "matchCriteriaId": "E0F45A48-5006-4748-B683-6C7CB469286A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125179:*:*:*:*:*:*", "matchCriteriaId": "9796C62A-8FCA-4E1E-855E-7D67F77C9AD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "1A1AC2FD-91BA-4B78-BB14-B9F2CEB09071", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125200:*:*:*:*:*:*", "matchCriteriaId": "A4B99FDC-EC68-4006-B359-E845AEF72FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "240A8575-F963-4DB4-B9C6-BE584A2F8271", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "B97F1BEE-F3C0-4DDD-B767-23C4BE9054AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125217:*:*:*:*:*:*", "matchCriteriaId": "3B3482FA-9483-4EC7-9B09-E1BB63F02790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "2600FBC5-8358-4126-88F2-00F3BEE9B537", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "FDD47CB0-3680-4ED9-821C-B673EACB953D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "D27B76C3-B8C8-48A6-AEF3-E9145B57EDA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125357:*:*:*:*:*:*", "matchCriteriaId": "6D77C576-035E-403B-A2B3-992496FAD202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "70608921-F02A-4121-BE90-919DD68DD0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "93C50660-6ECF-4353-A15A-4F7B0F06D33A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "06D8864A-E6CC-4742-A2CF-B060E8DFA740", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125393:*:*:*:*:*:*", "matchCriteriaId": "D2572B3B-3BC4-4A83-92D5-8D7579821F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "0DD78F90-5231-4848-8971-9AB5ABBD2C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125412:*:*:*:*:*:*", "matchCriteriaId": "7C94C142-168F-421C-B00B-3F42AA1CC9D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125429:*:*:*:*:*:*", "matchCriteriaId": "77CE4835-6540-4CF6-A31C-255DA52BB073", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125447:*:*:*:*:*:*", "matchCriteriaId": "E0544AE8-92B3-43A7-8F42-299AED1A40CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125459:*:*:*:*:*:*", "matchCriteriaId": "A05AFF4D-4EF9-4939-81CC-0AB55DA596F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125464:*:*:*:*:*:*", "matchCriteriaId": "86C3E31F-87E2-459F-8D1B-C6D1A237960D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "A3E7FC26-0000-4D4B-B489-DF0E2CD2B13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125471:*:*:*:*:*:*", "matchCriteriaId": "0DE52003-E959-420F-89A1-C86D8FB12DBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125476:*:*:*:*:*:*", "matchCriteriaId": "6E9C9051-7FDE-4DEE-85DC-0798524DC17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "5BE3598F-CEB4-4553-BB50-AA778BBF8BDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "4C71852D-D529-469A-9111-6D4DB8381BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125484:*:*:*:*:*:*", "matchCriteriaId": "EC3F7DA9-3FBF-4D67-8BA5-2643E706F64F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "53E2DF01-9A39-4E50-BEDE-D49988CE5CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "0015664D-11BC-4DEE-BC5B-DB3D1FE8DF82", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125490:*:*:*:*:*:*", "matchCriteriaId": "8B49F887-4574-4B3C-A8A7-57F75B27447F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125557:*:*:*:*:*:*", "matchCriteriaId": "C1E93E4D-0E54-41DF-843A-E8AE94EAD0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125566:*:*:*:*:*:*", "matchCriteriaId": "1617ADAD-2E13-4910-B600-3EC7E59B087C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125582:*:*:*:*:*:*", "matchCriteriaId": "5F982932-5513-411A-9CBF-3082C7ECEF0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125585:*:*:*:*:*:*", "matchCriteriaId": "8232CBA1-55DA-4F3C-A9E5-A204A25231C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "A30281F3-4DE2-4ED3-91A7-AE7A091C31E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125647:*:*:*:*:*:*", "matchCriteriaId": "F76B196B-B5F8-4E84-9BBE-9D45A2FB2A26", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125656:*:*:*:*:*:*", "matchCriteriaId": "F267C53D-6F27-4DFF-BB3C-7B299E07F487", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "574117B3-2785-4971-ABBE-55C08010E16B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9FF3515-61C7-4A7A-9781-6D4A0340B2EC", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "52CC9C40-3F01-424F-84FB-C9CC20427D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "77AA96FD-5AF0-4F80-8402-BAB460FF8B75", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125003:*:*:*:*:*:*", "matchCriteriaId": "3095B4D1-170A-48B0-8C4A-7A7A54E42149", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8CE4267C-DAAE-4CEC-A6E3-D2213AA5EE57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125109:*:*:*:*:*:*", "matchCriteriaId": "92EB7DC6-F227-40B3-A093-4D9495BBE272", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125115:*:*:*:*:*:*", "matchCriteriaId": "40C478D3-7C1C-4FCE-99FA-976EE2754680", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "DE6C88E4-D382-4729-AF5D-5697DCE26A67", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125122:*:*:*:*:*:*", "matchCriteriaId": "6447F4D8-0943-4C8C-BBA7-42BECC181D80", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "422B8CB6-3A14-4452-9192-F4CD5BF5D030", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125141:*:*:*:*:*:*", "matchCriteriaId": "41AB6C1A-CBEC-4DC1-94A4-9D14E82BA542", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125142:*:*:*:*:*:*", "matchCriteriaId": "6A2C060F-770B-4245-8490-5D2EB970FCA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125149:*:*:*:*:*:*", "matchCriteriaId": "16E635CC-1591-4535-89EA-B8470BD885F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125150:*:*:*:*:*:*", "matchCriteriaId": "D5F9E623-A42D-446D-ADDD-5F3C8F7BD9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125160:*:*:*:*:*:*", "matchCriteriaId": "1E235AF0-4453-4439-A25D-FF78A89BB117", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125179:*:*:*:*:*:*", "matchCriteriaId": "620E40E9-9D83-4E14-8898-10C0718B1A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "1D72F651-BD8C-4564-AC1A-84A91F21EADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "19DD9FF2-583B-4079-9375-E1643FF9A54B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125200:*:*:*:*:*:*", "matchCriteriaId": "69EDC39C-68EE-488D-B740-9E45229BDF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "EC374820-208A-40EF-965C-50C19467BD82", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "397B1FAC-EB6E-4F17-B5D7-CBD47D581DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125217:*:*:*:*:*:*", "matchCriteriaId": "E771BCA5-9E65-4C8B-BF36-E90F641D2015", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125221:*:*:*:*:*:*", "matchCriteriaId": "A658460A-FAE0-4487-8CD6-FB3384664F9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "6F104D17-7D08-42A5-BAF3-DEA475308FC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "9F875BFA-18C2-42BF-8BC4-D02E15B395E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "3BBD9D22-7E92-4648-972E-E17D9472E08D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125357:*:*:*:*:*:*", "matchCriteriaId": "7219F9A0-CD1D-4BB4-A5E1-FA0495B49114", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125361:*:*:*:*:*:*", "matchCriteriaId": "0CBB0F67-9C81-44BC-9836-DE5FE40DDBBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "6D7C0250-52DA-423D-B061-0CDF39D15068", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "6FC34D3F-FED3-4266-AB29-98FFC2002507", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "DD1460AC-A719-4B75-B28B-748B6C262A87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "B9024FE1-536C-4180-8115-6D97E7C324D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125410:*:*:*:*:*:*", "matchCriteriaId": "8CD6EB21-3DC6-47A7-939A-AA3C8EFE278F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125429:*:*:*:*:*:*", "matchCriteriaId": "3A5911F7-7A45-499D-B345-D9C082932BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125447:*:*:*:*:*:*", "matchCriteriaId": "CBBD7A90-4F97-4DFD-B8E6-F24A9B72A1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125459:*:*:*:*:*:*", "matchCriteriaId": "87C6DCE0-5F40-4F50-8538-29CFF2DCC9EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125464:*:*:*:*:*:*", "matchCriteriaId": "BECA9FA7-887B-4ECC-AA23-F75F96E42CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "CFD6D448-337E-4A63-8BE2-4DFC50AE7413", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125475:*:*:*:*:*:*", "matchCriteriaId": "33F2625D-0750-4ED1-8BA7-8141D8B7FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "A7D6DD58-62F3-4727-9AC1-E6B5EA71BB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "33991587-174F-48D9-821D-BF44CF24924D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125484:*:*:*:*:*:*", "matchCriteriaId": "18B8D15F-0286-4D64-96F8-D213E241813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "EB8483C1-6586-4936-8BF8-ECE3F0F4D5F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "A9318551-C41F-46E9-A196-5C01EAE276F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125490:*:*:*:*:*:*", "matchCriteriaId": "5030E129-0401-457B-B4FB-974AD5A0A948", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125557:*:*:*:*:*:*", "matchCriteriaId": "74DAFF5A-7090-427F-A69E-2E90456485C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "8EB26A23-108E-4F39-84E3-2F1C197C8CE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125582:*:*:*:*:*:*", "matchCriteriaId": "DF57D557-B1B9-4B2E-81A5-B23C1A8521E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125605:*:*:*:*:*:*", "matchCriteriaId": "E37E20B2-B678-45C1-9EF9-7D65172B485F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "17CC4F0C-E69E-4FA5-8119-D71AD9C13E63", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125621:*:*:*:*:*:*", "matchCriteriaId": "B8DA03F6-8EF8-48E1-B4CF-A2B0CB6F1DEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125647:*:*:*:*:*:*", "matchCriteriaId": "CA595DC9-C13C-4545-985E-DC1D611147E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125648:*:*:*:*:*:*", "matchCriteriaId": "48F8E2D7-67A6-42EA-85DD-DD6488D267BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "EF7CDF11-A00E-47B6-B8E3-512998134656", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ManageEngine Password Manager Pro 12100 and prior and OPManager 126100 and prior are vulnerable to unauthorized file and directory creation on a server machine." }, { "lang": "es", "value": "ManageEngine Password Manager Pro versiones 12100 y anteriores y OPManager versiones 126100 y anteriores son vulnerables a una creaci\u00f3n no autorizada de archivos y directorios en un equipo servidor" } ], "id": "CVE-2022-35404", "lastModified": "2024-11-21T07:11:06.367", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-18T13:15:10.510", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://manageengine.com" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://manageengine.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-20 19:29
Modified
2024-11-21 03:56
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Nov/6 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://seclists.org/bugtraq/2018/Oct/61 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Nov/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2018/Oct/61 | Mailing List, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE120C-35D5-4D2E-A00D-5B75A6C6BFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "371AF6D4-091B-41E2-9B82-902650F87702", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*", "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*", "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*", "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*", "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*", "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*", "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*", "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*", "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*", "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*", "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*", "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*", "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*", "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*", "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*", "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*", "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*", "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*", "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*", "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*", "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*", "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*", "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*", "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*", "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*", "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*", "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*", "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*", "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*", "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*", "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*", "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*", "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*", "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*", "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*", "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*", "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*", "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*", "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*", "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*", "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*", "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*", "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*", "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*", "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*", "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*", "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*", "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*", "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*", "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*", "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*", "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*", "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*", "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*", "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*", "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*", "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*", "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*", "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*", "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*", "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*", "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*", "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*", "matchCriteriaId": "CBF58EC7-2DDA-4EC0-8406-F3B711B62974", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*", "matchCriteriaId": "CD036146-E374-4571-9302-9978CD892805", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*", "matchCriteriaId": "7112E33A-C694-432D-8880-BB2211EBA5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*", "matchCriteriaId": "932A2D27-CC0E-4F33-AD0C-4876984F1F26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability." }, { "lang": "es", "value": "Zoho ManageEngine OpManager 12.3 antes de la build 123219 tiene una vulnerabilidad Self Cross-Site Scripting (XSS)." } ], "id": "CVE-2018-18716", "lastModified": "2024-11-21T03:56:26.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-20T19:29:01.150", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Nov/6" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2018/Oct/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Nov/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2018/Oct/61" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-20 19:29
Modified
2024-11-21 03:56
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Nov/3 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://seclists.org/bugtraq/2018/Oct/60 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Nov/3 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2018/Oct/60 | Mailing List, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "11843753-531F-4D94-AC7F-F23D6EC8728F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*", "matchCriteriaId": "92283FA5-E9BF-4526-8335-21CAC337507A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*", "matchCriteriaId": "4E7DBDD1-5CD0-48E6-8DD1-BF32C38A4CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*", "matchCriteriaId": "D62F2677-2A2B-4BC3-B165-D3EEF7013A03", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*", "matchCriteriaId": "BA918111-577F-4A12-9EBC-E9AED63CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*", "matchCriteriaId": "F0934788-71B1-4BEA-BF01-4BDD87B3F8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*", "matchCriteriaId": "A1CA9C41-987C-48F1-831D-67ADB6F2C020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*", "matchCriteriaId": "892F3D78-767F-4D09-A465-E875EF27C595", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*", "matchCriteriaId": "9FA31E62-2C3A-416D-B472-2BB20981274F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*", "matchCriteriaId": "E1791915-2039-4108-AEC2-7505D7CF4A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*", "matchCriteriaId": "9B8E718C-D235-4393-8839-C715C9391406", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*", "matchCriteriaId": "C746C3B4-B96C-4277-BCF1-9F3FBE4E52C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*", "matchCriteriaId": "506FC691-EF45-407F-AB6F-A6260C7F5825", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*", "matchCriteriaId": "7F77AF32-BDB4-4366-8CC6-51452FC7C01C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*", "matchCriteriaId": "5C72DC47-6E38-4C4D-BAC4-11FC8CA15D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*", "matchCriteriaId": "F056F4E7-5FFF-4F7D-A2A0-B90E818A8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*", "matchCriteriaId": "30BEFF4D-8F03-4DEA-9441-3C8009DC0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*", "matchCriteriaId": "194EF105-2F2C-4FBE-83EA-99E46A3E1A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*", "matchCriteriaId": "5A3BB136-FB9D-4326-BB92-E3E95FF3D0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*", "matchCriteriaId": "25ED8015-6FF6-4762-A3CE-C765F3DFC2EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*", "matchCriteriaId": "2D0A8CFE-0EC7-4798-8F78-A95CFDD46DCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*", "matchCriteriaId": "181D3E21-D22B-43DC-AB61-85EADB051DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*", "matchCriteriaId": "8623755B-843B-4A35-9EA1-DDADC6D04790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*", "matchCriteriaId": "5069B771-C164-42B6-A69E-E7FB6D1659BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*", "matchCriteriaId": "2A54234E-07E7-4E2B-B6B1-3D9593EECA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*", "matchCriteriaId": "D8199FCF-96B0-4F2A-9843-C58794D9AA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*", "matchCriteriaId": "3A1FA00E-7E1C-4DD3-85ED-6FE876EB3070", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*", "matchCriteriaId": "7913B5C1-8918-4B72-9EE5-7CC566ABC06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*", "matchCriteriaId": "EF306D16-22D0-4021-9AEA-58037B8E1817", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*", "matchCriteriaId": "EB9F1053-4BEA-41CC-8690-7CD91A93809E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*", "matchCriteriaId": "71DC8E77-BEA1-4C5D-A893-F0B1777914F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*", "matchCriteriaId": "284144C0-7D49-4B3D-AFD0-1B5CB588E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*", "matchCriteriaId": "E929F1C7-6360-4B62-BCA2-481E6BDA9343", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*", "matchCriteriaId": "D631CE06-3699-41EF-A16A-29317863EE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*", "matchCriteriaId": "DEBF570C-37E6-495E-B440-1BE770B52C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*", "matchCriteriaId": "E77B59F9-C293-4825-9C20-0217913FFCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*", "matchCriteriaId": "4E47C098-A3A5-430F-9868-76AFD1F4880A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*", "matchCriteriaId": "003FD386-8F7C-419E-A32A-56BCDE939758", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*", "matchCriteriaId": "B0CE1909-73A7-4985-91BD-2504EAEEC7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*", "matchCriteriaId": "5432A121-8A79-4BB7-BA34-889F268862BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*", "matchCriteriaId": "D7A1BDA3-BC80-4713-9A61-368D0D2034C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*", "matchCriteriaId": "595A8799-10FD-4CBD-A31D-862AF3811D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*", "matchCriteriaId": "A8DB1791-3C3D-4B32-A053-F32CF75157AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*", "matchCriteriaId": "F80D628A-0EEE-4CAE-B554-FF049563486C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*", "matchCriteriaId": "7D6C0821-9F50-46F1-9D80-716084D4D449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*", "matchCriteriaId": "26272C3B-E7F4-422B-8820-5D1E1060B449", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*", "matchCriteriaId": "0D93D99C-237B-4C71-A287-ECDE1576E045", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*", "matchCriteriaId": "908CDBFD-130A-4C5C-BFB6-2D2C71E4F7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*", "matchCriteriaId": "FA117A3F-5FEF-41B4-AE65-49BC47FFCF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*", "matchCriteriaId": "1524EFB3-8B49-4002-800E-2C222EDFA894", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*", "matchCriteriaId": "59C93D3E-9E2F-434D-ACBB-0DDA7365AA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*", "matchCriteriaId": "A26D17E0-8283-4C03-86F8-CCCA8586D54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*", "matchCriteriaId": "9A1A7F93-72B0-474B-A670-FF0D60824FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*", "matchCriteriaId": "70FDBF91-DDC1-48FC-B99B-37DF3F804AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*", "matchCriteriaId": "459A77F8-CC7C-4017-8D35-58C3266C0804", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*", "matchCriteriaId": "FA91D7C0-DB3B-4366-907B-3E1202930466", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*", "matchCriteriaId": "873F377A-6CEE-4FF2-8471-AEEF49E27901", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*", "matchCriteriaId": "7C72013D-D878-4E62-9795-007F34449121", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*", "matchCriteriaId": "2C37D72E-9307-455D-92E6-98CC28E1531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*", "matchCriteriaId": "5A56B778-8672-402C-87A9-E20D8779F29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*", "matchCriteriaId": "64757ED0-29EA-45FB-80F5-A1E036343535", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*", "matchCriteriaId": "C265797E-90CF-40FA-A6F1-A98C5DCC5EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*", "matchCriteriaId": "524E2761-4B43-46FC-AE7E-134476556B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*", "matchCriteriaId": "CBF58EC7-2DDA-4EC0-8406-F3B711B62974", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*", "matchCriteriaId": "CD036146-E374-4571-9302-9978CD892805", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*", "matchCriteriaId": "7112E33A-C694-432D-8880-BB2211EBA5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*", "matchCriteriaId": "932A2D27-CC0E-4F33-AD0C-4876984F1F26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS." }, { "lang": "es", "value": "Zoho ManageEngine OpManager 12.3 antes de la build 123219 tiene Cross-Site Scripting (XSS) persistente." } ], "id": "CVE-2018-18715", "lastModified": "2024-11-21T03:56:26.097", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-20T19:29:01.073", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Nov/3" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2018/Oct/60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Nov/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2018/Oct/60" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-21 03:29
Modified
2024-11-21 03:54
Severity ?
Summary
Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/x-f1v3/ForCve/issues/4 | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/x-f1v3/ForCve/issues/4 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A479DB39-D6A7-4D36-8AE4-76CF1E74D6F4", "versionEndExcluding": "12.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter." }, { "lang": "es", "value": "Zoho ManageEngine OpManager en versiones anteriores a la 12.3 Build 123196 no requiere autenticaci\u00f3n para las peticiones /oputilsServlet, tal y como queda demostrado con una petici\u00f3n /oputilsServlet?action=getAPIKey que puede aprovecharse contra Firewall Analyzer para a\u00f1adir un usuario administrador mediante /api/json/v2/admin/addUser o llevar a cabo un ataque de inyecci\u00f3n SQL mediante el par\u00e1metro name en /api/json/device/setManaged." } ], "id": "CVE-2018-17283", "lastModified": "2024-11-21T03:54:10.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-21T03:29:00.407", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/x-f1v3/ForCve/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/x-f1v3/ForCve/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 18:29
Modified
2024-11-21 03:08
Severity ?
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. The 'apiKey' parameter of "/api/json/admin/getmailserversettings" and "/api/json/dashboard/gotoverviewlist" is vulnerable to a Blind SQL Injection attack.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://manageengine.com | Vendor Advisory | |
cve@mitre.org | http://opmanager.com | Product | |
cve@mitre.org | https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://manageengine.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://opmanager.com | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | 12.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "4EF7ED07-3132-4670-831B-CCD6F34E5C3D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. The \u0027apiKey\u0027 parameter of \"/api/json/admin/getmailserversettings\" and \"/api/json/dashboard/gotoverviewlist\" is vulnerable to a Blind SQL Injection attack." }, { "lang": "es", "value": "Fue encontrado un problema en ZOHO ManageEngine OpManager 12.2. El par\u00e1metro \u0027apiKey\u0027 de \"/ api / json / admin / getmailserversettings\" y \"/ api / json / dashboard / gotoverviewviewlist\" es vulnerable a un ataque de Inyecci\u00f3n de tipo Blind SQL." } ], "id": "CVE-2017-11559", "lastModified": "2024-11-21T03:08:01.127", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T18:29:00.560", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://manageengine.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://opmanager.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://manageengine.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://opmanager.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-13 06:15
Modified
2024-11-21 04:55
Severity ?
Summary
Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_opmanager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F5220E2-844B-4B64-A9AD-05114BEAF70D", "versionEndExcluding": "12.4.179", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108." }, { "lang": "es", "value": "Zoho ManageEngine OpManager versiones anteriores a 12.4.179, permite una ejecuci\u00f3n de c\u00f3digo remota por medio de una petici\u00f3n especialmente dise\u00f1ada de la API Mail Server Settings v1. Esto fue corregido en la versi\u00f3n 12.5.108." } ], "id": "CVE-2020-10541", "lastModified": "2024-11-21T04:55:32.783", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-13T06:15:11.190", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-15 21:15
Modified
2025-02-13 18:16
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_analytics_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "725AEAF1-8E3C-4D33-B65D-C8304506A131", "versionEndExcluding": "5.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_appcreator:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A753D74-F09F-4C42-A7C2-4D3A280FCACC", "versionEndExcluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_application_control_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AEDFE0E-9C9A-4DF6-9918-B5BD4DC67624", "versionEndExcluding": "11.2.2328.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_browser_security_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "21C65599-8166-4066-BF0F-5C3CC55F544A", "versionEndExcluding": "11.2.2328.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_device_control_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6CB1749-097D-4F9F-94DB-F35E72A42034", "versionEndExcluding": "11.2.2328.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_endpoint_central:*:*:*:*:*:*:*:*", "matchCriteriaId": "06579974-7085-42B3-9F9F-A733A1CA37D9", "versionEndExcluding": "11.2.2322.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_endpoint_central_msp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F551AC16-6CBA-4460-A05D-D083967BDF07", "versionEndExcluding": "11.2.2322.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_endpoint_dlp_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFE96B83-9684-4955-81C5-AD5B5BC817DF", "versionEndExcluding": "11.2.2328.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FC58FEB-B8E4-4B1C-AE55-F4577D7BF505", "versionEndExcluding": "10.1.2204.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:10.1.2207.4:*:*:*:*:*:*:*", "matchCriteriaId": "A5B65D12-7DAE-4815-993C-7C5903E990DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_os_deployer:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C070B9E-FE09-4CFE-B489-DC9CED210CF1", "versionEndExcluding": "1.2.2331.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_manager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B9C6675-2DDB-4FD6-8FA6-B3EE56F87F69", "versionEndExcluding": "11.2.2328.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_remote_access_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA4B79F8-4D04-4EA4-8754-355DB6CA71B8", "versionEndExcluding": "11.2.2328.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_remote_monitoring_and_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAA39630-6CE1-46E3-AF49-67DB09308C5D", "versionEndExcluding": "10.2.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_vulnerability_manager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4D89B41-A239-4329-9BEA-6D52EE8644D8", "versionEndExcluding": "11.2.2328.01", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD7707C-0FE5-475D-8FB2-CDB19363421A", "versionEndExcluding": "6.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6300:*:*:*:*:*:*", "matchCriteriaId": "F0C93DB0-3029-4D49-B180-6EFAEC4B712B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6301:*:*:*:*:*:*", "matchCriteriaId": "F69BFD56-BA90-426C-9EF1-4BD925657BDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6302:*:*:*:*:*:*", "matchCriteriaId": "1171C259-086C-42CA-BE56-5B410677F72C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6303:*:*:*:*:*:*", "matchCriteriaId": "827B0C20-903F-48A5-8918-81F39202C21F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "7927FC8C-ED61-4E24-AF57-2D5C0E06AB2A", "versionEndExcluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7200:*:*:*:*:*:*", "matchCriteriaId": "1AE608DF-E02C-4A63-AD3E-7E3C1B921C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7201:*:*:*:*:*:*", "matchCriteriaId": "72C14C6D-5C72-4A39-A8FF-93CD89C831C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7202:*:*:*:*:*:*", "matchCriteriaId": "D47DA377-0AF4-453E-9605-A5F87FA14E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7203:*:*:*:*:*:*", "matchCriteriaId": "BC919233-CE66-416C-8649-B94A23F131F5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "E802FD77-E67A-438C-82CE-9FC7536FB14E", "versionEndExcluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7200:*:*:*:*:*:*", "matchCriteriaId": "0FAF63F4-AED2-4EA4-BA5B-45961B2E29B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7201:*:*:*:*:*:*", "matchCriteriaId": "237AA2F5-B9A3-4C40-92AC-61FE47A017BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7202:*:*:*:*:*:*", "matchCriteriaId": "4C23A64C-65CB-447B-9B5F-4BB22F68FC79", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7203:*:*:*:*:*:*", "matchCriteriaId": "3489D84B-5960-4FA7-A2DD-88AE35C34CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7210:*:*:*:*:*:*", "matchCriteriaId": "D86AB1CC-0FDE-4CC1-BF64-E0C61EAF652F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7211:*:*:*:*:*:*", "matchCriteriaId": "076FDAE7-9DB2-4A04-B09E-E53858D208C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7212:*:*:*:*:*:*", "matchCriteriaId": "07C08B57-FA76-4E24-BC10-B837597BC7E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7213:*:*:*:*:*:*", "matchCriteriaId": "0D734ACB-33E8-4315-8A79-2B97CE1D0509", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7215:*:*:*:*:*:*", "matchCriteriaId": "9314CA98-7A69-4D2B-9928-40F55888C9FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7220:*:*:*:*:*:*", "matchCriteriaId": "BCE7999C-D6AE-4406-A563-A520A171381D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7250:*:*:*:*:*:*", "matchCriteriaId": "D5716895-4553-4613-B774-0964D3E88AA0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "5618AEE3-0F6A-47CC-9783-DF9B5C8AC12F", "versionEndExcluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4100:*:*:*:*:*:*", "matchCriteriaId": "BFD452AD-7053-4C13-97DA-326C3DC6E26C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4101:*:*:*:*:*:*", "matchCriteriaId": "0B87956F-9C45-4A65-BEB2-77A247BD7A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4102:*:*:*:*:*:*", "matchCriteriaId": "17BE6347-1605-47DB-8CFE-B587E3AB4223", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4103:*:*:*:*:*:*", "matchCriteriaId": "C47F9F56-B1DE-426B-B5CF-A1BB5973D6E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4104:*:*:*:*:*:*", "matchCriteriaId": "E6A7C5C6-0137-4279-A7EA-3439BE477A3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4105:*:*:*:*:*:*", "matchCriteriaId": "C921F1B2-69B4-448F-AC7C-2F4474507FAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4106:*:*:*:*:*:*", "matchCriteriaId": "91DB9017-1BCF-48DB-97AE-4214150BAE77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4107:*:*:*:*:*:*", "matchCriteriaId": "D066B999-8554-49F0-92C3-1A4DDEA6E32D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4108:*:*:*:*:*:*", "matchCriteriaId": "635F80E1-4A73-48DC-A128-D61716D70839", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4109:*:*:*:*:*:*", "matchCriteriaId": "E74FE1C4-471A-4040-96A4-0BE46745199B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4110:*:*:*:*:*:*", "matchCriteriaId": "C31E2485-2F3A-4BC1-92CC-F7DCB464B5D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4111:*:*:*:*:*:*", "matchCriteriaId": "99C928C2-4711-4765-BDF2-E7FB448F5771", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4112:*:*:*:*:*:*", "matchCriteriaId": "EDF77387-21C7-45CA-B843-EBA956EE2BB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4113:*:*:*:*:*:*", "matchCriteriaId": "5C2C0067-538B-4102-8B4E-603BD4CE8F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4115:*:*:*:*:*:*", "matchCriteriaId": "DAF47C10-AAE9-40CF-A033-44D54A81E69F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4116:*:*:*:*:*:*", "matchCriteriaId": "36D0331C-58EA-4B68-88C4-7A193BE5C62E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4117:*:*:*:*:*:*", "matchCriteriaId": "3CA59781-E48C-487E-B3AF-96560F3152EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4118:*:*:*:*:*:*", "matchCriteriaId": "E4812B9E-15CA-4700-9115-EAE0A97F0E3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4119:*:*:*:*:*:*", "matchCriteriaId": "CE513A2B-0371-4D3C-A502-CDA3DB474F3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4120:*:*:*:*:*:*", "matchCriteriaId": "5E498ACE-8332-4824-9AFE-73975D0AC9EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4121:*:*:*:*:*:*", "matchCriteriaId": "F070B928-CF57-4502-BE26-AD3F13A6ED4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4122:*:*:*:*:*:*", "matchCriteriaId": "635D24F2-9C60-4E1A-BD5F-E5312FA953A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4130:*:*:*:*:*:*", "matchCriteriaId": "5E983854-36F8-407F-95C8-E386E0F82366", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4131:*:*:*:*:*:*", "matchCriteriaId": "29BFE206-CAB1-41CA-B5A5-E8CB67BCCA4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4140:*:*:*:*:*:*", "matchCriteriaId": "7820751F-E181-4BB7-8DAF-BF21129B24D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4141:*:*:*:*:*:*", "matchCriteriaId": "14ADB666-EEB9-4C6D-93F4-5A45EBA55705", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4150:*:*:*:*:*:*", "matchCriteriaId": "93C4B398-8F9A-44AC-8E43-C4C471DE9565", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4160:*:*:*:*:*:*", "matchCriteriaId": "47FD0E59-3D75-4CF5-81A6-20C3B7FDE962", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4161:*:*:*:*:*:*", "matchCriteriaId": "C7EF76FE-3FD9-4548-A372-22E280484ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4162:*:*:*:*:*:*", "matchCriteriaId": "0F95BCBE-399F-4CCC-A17B-C0C3A03A99AB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "93C3ECBE-AE6A-4E5B-822B-2F905AA806DB", "versionEndExcluding": "6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6100:*:*:*:*:*:*", "matchCriteriaId": "DFEB1B4D-A7B2-464A-BEA7-5754D3BE1F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6101:*:*:*:*:*:*", "matchCriteriaId": "C12C9470-3D3B-426E-93F9-79D8B9B25F69", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6110:*:*:*:*:*:*", "matchCriteriaId": "227F1242-E0A9-45C5-9198-FD8D01F68ABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6111:*:*:*:*:*:*", "matchCriteriaId": "2FE57085-2085-4F62-9900-7B8DFC558418", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6120:*:*:*:*:*:*", "matchCriteriaId": "CAB7FA92-DC12-4E8A-91CC-3C98ED74E47B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6121:*:*:*:*:*:*", "matchCriteriaId": "D04530C2-E4D0-4717-95DB-B7C224348502", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6125:*:*:*:*:*:*", "matchCriteriaId": "9BBD018F-C1FD-4A0F-A145-253D86185F6E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DA0580F-8167-450E-A1E9-0F1F7FC7E2C9", "versionEndExcluding": "5.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5700:*:*:*:*:*:*", "matchCriteriaId": "E913F3D6-9F94-4130-94FF-37F4D81BAEF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5701:*:*:*:*:*:*", "matchCriteriaId": "34D23B58-2BB8-40EE-952C-1595988335CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5702:*:*:*:*:*:*", "matchCriteriaId": "322920C4-4487-4E44-9C40-2959F478A4FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5703:*:*:*:*:*:*", "matchCriteriaId": "3AD735B9-2CE2-46BA-9A14-A22E3FE21C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5704:*:*:*:*:*:*", "matchCriteriaId": "014DB85C-DB28-4EBB-971A-6F8F964CE6FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5705:*:*:*:*:*:*", "matchCriteriaId": "5E9B0013-ABF8-4616-BC92-15DF9F5CB359", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5706:*:*:*:*:*:*", "matchCriteriaId": "5B744F32-FD43-47B8-875C-6777177677CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5707:*:*:*:*:*:*", "matchCriteriaId": "F1BB6EEA-2BAA-4C48-8DA8-1E87B3DE611F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5708:*:*:*:*:*:*", "matchCriteriaId": "D3012C17-87F5-4FFD-B67B-BEFF2A390613", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5709:*:*:*:*:*:*", "matchCriteriaId": "1E33D368-2D81-4C7E-9405-7C0A86E97217", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5710:*:*:*:*:*:*", "matchCriteriaId": "7AA9384F-6401-4495-B558-23E5A7A7528C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5711:*:*:*:*:*:*", "matchCriteriaId": "E492F955-0734-4AE4-A59F-572ADF0CFE75", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5712:*:*:*:*:*:*", "matchCriteriaId": "11B71FFC-FD2E-4F84-BB1E-55BCA5B51099", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9BB59DF-8786-4DC0-9254-F88417CA7077", "versionEndExcluding": "4.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4500:*:*:*:*:*:*", "matchCriteriaId": "6BA1E99E-789C-4FDD-AA89-4C5391B95320", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4502:*:*:*:*:*:*", "matchCriteriaId": "7EA6EC34-6702-4D1A-8C63-5026416E01A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4503:*:*:*:*:*:*", "matchCriteriaId": "0720F912-A070-43E9-BD23-4FAD00026DCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4504:*:*:*:*:*:*", "matchCriteriaId": "161C81D2-7281-4F89-9944-1B468B06C264", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4505:*:*:*:*:*:*", "matchCriteriaId": "718EEA01-B792-4B7E-946F-863F846E8132", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4507:*:*:*:*:*:*", "matchCriteriaId": "DB72E7C9-FAC6-43E8-AC2A-5A7CBEAB919E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4508:*:*:*:*:*:*", "matchCriteriaId": "47BBC46A-16C7-4E9B-A49A-8101F3039D0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4509:*:*:*:*:*:*", "matchCriteriaId": "D989FB08-624D-406B-8F53-A387900940F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4510:*:*:*:*:*:*", "matchCriteriaId": "8ADB6CFE-1915-488C-93FE-96E8DF3655F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4511:*:*:*:*:*:*", "matchCriteriaId": "EDCCB442-D0E4-47C7-A558-36657A70B3CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4512:*:*:*:*:*:*", "matchCriteriaId": "8794F807-1D50-44D4-8969-FD68EFF2F643", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4513:*:*:*:*:*:*", "matchCriteriaId": "AFA2B4BA-1FBF-4C2E-872E-AD14084D1D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4514:*:*:*:*:*:*", "matchCriteriaId": "6976DCDA-E27A-4367-8EFE-74DC6F63018F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4516:*:*:*:*:*:*", "matchCriteriaId": "101908A5-CAEF-44F8-A6C8-FE01CA9FA836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4517:*:*:*:*:*:*", "matchCriteriaId": "F957BE56-474A-4593-8710-F86DB13C7407", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4518:*:*:*:*:*:*", "matchCriteriaId": "B8479442-1A4A-4F27-9778-664C7693C815", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4519:*:*:*:*:*:*", "matchCriteriaId": "EEF00ADC-105F-4B7E-857B-17565D67C7D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4520:*:*:*:*:*:*", "matchCriteriaId": "CA292949-6E99-49A5-94F7-23448494F5C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4523:*:*:*:*:*:*", "matchCriteriaId": "863CBE20-60A5-4A08-BF16-4E40E88B9AB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4525:*:*:*:*:*:*", "matchCriteriaId": "28A105B4-7BF0-4054-AAE7-8453E13E2B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4527:*:*:*:*:*:*", "matchCriteriaId": "94C78301-44B7-45B2-836E-15E45FAC8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4528:*:*:*:*:*:*", "matchCriteriaId": "F408067C-13C1-40BE-8488-9EB7FF0EDF9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4529:*:*:*:*:*:*", "matchCriteriaId": "A83FBC34-E024-47DA-AD8A-BF569F1F7EE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4531:*:*:*:*:*:*", "matchCriteriaId": "DC06E46F-441E-445B-A780-702B170901DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4532:*:*:*:*:*:*", "matchCriteriaId": "A8A98287-DB5D-44A3-B835-54BACFC12944", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4533:*:*:*:*:*:*", "matchCriteriaId": "53F32DE7-F211-4BEF-99C1-CE38EFDBCCC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4535:*:*:*:*:*:*", "matchCriteriaId": "91C3EE55-B71B-432C-A68E-BB126A715375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4536:*:*:*:*:*:*", "matchCriteriaId": "FD48F21A-2D38-4EB8-B190-58CF176C1EEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4537:*:*:*:*:*:*", "matchCriteriaId": "76346162-0BF0-4B21-82D2-2548A989396A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4538:*:*:*:*:*:*", "matchCriteriaId": "5313C4EF-A960-4BCA-AA97-EDC88402A175", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4282B6D-6C85-4F13-B789-E641FB5986FE", "versionEndExcluding": "4.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4500:*:*:*:*:*:*", "matchCriteriaId": "A160274C-F07A-43D9-A4DB-8773F004B9B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4502:*:*:*:*:*:*", "matchCriteriaId": "341DF953-3DC7-476E-A79D-8CBD011C52A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4503:*:*:*:*:*:*", "matchCriteriaId": "AB6582AC-03DB-4905-BD03-EEDC314EB289", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4504:*:*:*:*:*:*", "matchCriteriaId": "2C3F1FDE-41F7-4541-B0F7-00DB7994ACB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4505:*:*:*:*:*:*", "matchCriteriaId": "92ADF3D2-0051-46E9-BF7A-7D429ABEC09A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4507:*:*:*:*:*:*", "matchCriteriaId": "1592B321-1D60-418D-9CD8-61AEA57D8D90", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4508:*:*:*:*:*:*", "matchCriteriaId": "E582FA9F-A043-4193-961D-A49159F1C921", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4509:*:*:*:*:*:*", "matchCriteriaId": "F3A22F3D-C45F-4FD5-8EEC-3BF2EDA807A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4510:*:*:*:*:*:*", "matchCriteriaId": "28EAB920-2F01-483E-9492-97DBFBD7535F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4511:*:*:*:*:*:*", "matchCriteriaId": "92F1D0A8-8761-4876-92C1-EE9F6BF61C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4512:*:*:*:*:*:*", "matchCriteriaId": "37976BE2-4233-46F7-B6BB-EFA778442AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4513:*:*:*:*:*:*", "matchCriteriaId": "A0FF0731-4694-427A-8C9A-EBA7AEF6F1D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4514:*:*:*:*:*:*", "matchCriteriaId": "C069FF04-4061-4560-BA55-1784312047A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4516:*:*:*:*:*:*", "matchCriteriaId": "0D428FA6-08BA-4F7E-B1C7-4AFD17919899", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4517:*:*:*:*:*:*", "matchCriteriaId": "C7AB124C-63E2-4CC2-B5C9-E7141E23D56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4518:*:*:*:*:*:*", "matchCriteriaId": "0E2D49D5-6F95-42F5-8EF0-DAD47C51D141", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4519:*:*:*:*:*:*", "matchCriteriaId": "EF9477F5-C6FD-4589-917B-FD206371DB33", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4520:*:*:*:*:*:*", "matchCriteriaId": "B51D61F5-7198-4B33-8AFD-A78E34F6B1AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4523:*:*:*:*:*:*", "matchCriteriaId": "8CB27467-3157-466A-B01C-461348BD95C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4525:*:*:*:*:*:*", "matchCriteriaId": "2D575B4D-D58A-4B92-9723-4AB54E29924A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4527:*:*:*:*:*:*", "matchCriteriaId": "E76BB070-9BC9-4712-B021-156871C3B06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4528:*:*:*:*:*:*", "matchCriteriaId": "52D35850-9BE1-479A-B0AF-339E42BCA708", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4529:*:*:*:*:*:*", "matchCriteriaId": "681A77B6-7E22-4132-803B-A0AD117CE7C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4531:*:*:*:*:*:*", "matchCriteriaId": "EF72A1BF-EE5D-4F43-B463-7E51285D4D5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4532:*:*:*:*:*:*", "matchCriteriaId": "2FDD429A-E938-483A-BCCF-50A2AD4096CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4533:*:*:*:*:*:*", "matchCriteriaId": "162D604A-7F0E-44CF-9E48-D8B54F8F3509", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4535:*:*:*:*:*:*", "matchCriteriaId": "AD38FA0F-B94F-4731-A652-07702EE0B808", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4536:*:*:*:*:*:*", "matchCriteriaId": "F2C3767E-A56B-4580-AF8C-9BF5852EE414", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4537:*:*:*:*:*:*", "matchCriteriaId": "5434E8CB-8DD0-4245-AF61-CF3A69BD0C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4538:*:*:*:*:*:*", "matchCriteriaId": "C2403DA1-FBF8-495E-B996-4060F6BE6EE9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "30C9A012-AD39-45B2-BA3F-8D7180FC5390", "versionEndExcluding": "4.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4400:*:*:*:*:*:*", "matchCriteriaId": "7C5E7CE6-F85E-49B2-9078-F661AA3723C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4401:*:*:*:*:*:*", "matchCriteriaId": "1194B4C2-FBF2-4015-B666-235897971DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4402:*:*:*:*:*:*", "matchCriteriaId": "4F5F0CA5-CEC3-4342-A7D1-3616C482B965", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4403:*:*:*:*:*:*", "matchCriteriaId": "B7B8A2F3-5F46-40B2-A4E7-118341443C53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4404:*:*:*:*:*:*", "matchCriteriaId": "767BF16D-8CD8-4E8A-9A3B-CB11EB48FB9D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "658DC76D-E0FE-40FA-B966-6DA6ED531FCD", "versionEndExcluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6001:*:*:*:*:*:*", "matchCriteriaId": "948993BE-7B9E-4CCB-A97F-28B46DFE52A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6003:*:*:*:*:*:*", "matchCriteriaId": "9F8D6CDF-1BD5-4457-94AA-CFCC351F55A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6005:*:*:*:*:*:*", "matchCriteriaId": "E54CE38D-C9CA-4CC1-B3BC-83F593A576D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6011:*:*:*:*:*:*", "matchCriteriaId": "4C8B3F77-7886-4F80-B75A-59063C762307", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6016:*:*:*:*:*:*", "matchCriteriaId": "ADCB6ADF-5B04-4682-B541-4BC8BB5762DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6017:*:*:*:*:*:*", "matchCriteriaId": "A708628C-31E8-4A52-AEF7-297E2DDFA0C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6020:*:*:*:*:*:*", "matchCriteriaId": "A8A01385-A493-42C0-ABBE-6A30C8594F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6025:*:*:*:*:*:*", "matchCriteriaId": "E7A6CA95-9572-4FCA-ADD2-A5F4D8C2216B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6026:*:*:*:*:*:*", "matchCriteriaId": "B6865936-A773-4353-8891-8269508B2180", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6030:*:*:*:*:*:*", "matchCriteriaId": "9CAD778E-8FDB-4CE2-A593-75EEA75F6361", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6031:*:*:*:*:*:*", "matchCriteriaId": "52A9BA64-A248-4490-BDA7-671D64C0B3CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6032:*:*:*:*:*:*", "matchCriteriaId": "DFF0A7E8-888B-4CBE-B799-16557244DDF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6041:*:*:*:*:*:*", "matchCriteriaId": "8B480202-7632-4CFA-A485-DDFF1D1DB757", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6042:*:*:*:*:*:*", "matchCriteriaId": "AB9B0721-49FD-49E7-97E4-E4E3EBF64856", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6043:*:*:*:*:*:*", "matchCriteriaId": "874F5DDD-EA8D-4C1E-824A-321C52959649", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6044:*:*:*:*:*:*", "matchCriteriaId": "8CAA4713-DA95-46AC-AFA5-9D22F8819B06", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6047:*:*:*:*:*:*", "matchCriteriaId": "C9D4BB2E-D0D0-4058-88C9-3E73A793A85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6049:*:*:*:*:*:*", "matchCriteriaId": "832AAAAF-5C34-4DDF-96A4-080002F9BC6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6050:*:*:*:*:*:*", "matchCriteriaId": "29ED63C4-FB06-41AC-ABCD-63B3233658A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6051:*:*:*:*:*:*", "matchCriteriaId": "6EEA1BA5-F6A7-4BE0-8E77-993FB9E5CC91", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6053:*:*:*:*:*:*", "matchCriteriaId": "2C21AC8A-8358-46BE-A0C6-7CDEF1E73904", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6054:*:*:*:*:*:*", "matchCriteriaId": "51400F37-6310-44A3-A683-068DF64D20F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6056:*:*:*:*:*:*", "matchCriteriaId": "F3F43DBF-CD65-47D0-8CEE-D5EE8337188B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6057:*:*:*:*:*:*", "matchCriteriaId": "78CB8751-856A-41AC-904A-70FA1E15A946", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6058:*:*:*:*:*:*", "matchCriteriaId": "72B7E27E-1443-46DC-8389-FBD337E612F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6060:*:*:*:*:*:*", "matchCriteriaId": "F9BB1077-C1F5-4368-9930-8E7424E7EB98", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6061:*:*:*:*:*:*", "matchCriteriaId": "EE307CE4-574D-4FF7-BED6-5BBECF886578", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6062:*:*:*:*:*:*", "matchCriteriaId": "49E40C74-7077-4366-82A7-52B454725B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6070:*:*:*:*:*:*", "matchCriteriaId": "038D7936-C837-4E49-89BC-D11DF2C875D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6071:*:*:*:*:*:*", "matchCriteriaId": "D1DC87E8-3053-4823-BFDB-46BAF3FCEFF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6072:*:*:*:*:*:*", "matchCriteriaId": "E384B5D8-CF9A-4C6D-AB4A-5B1A66768ADB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC606E6A-3523-41D5-94C9-A62E8630A687", "versionEndExcluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4010:*:*:*:*:*:*", "matchCriteriaId": "7001A0A7-159C-48A3-9800-DAFBA31D05BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4011:*:*:*:*:*:*", "matchCriteriaId": "583B46D4-529F-404F-9CF3-4D7526889682", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4015:*:*:*:*:*:*", "matchCriteriaId": "0D89C2A2-CE20-4954-8821-C73F9E3EC767", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4016:*:*:*:*:*:*", "matchCriteriaId": "A6B8B05F-0ECD-41C1-9FFD-0ADCF4046D39", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4020:*:*:*:*:*:*", "matchCriteriaId": "233874F0-A19F-447C-ACE2-5DD06829C920", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4021:*:*:*:*:*:*", "matchCriteriaId": "C4447E47-C6DB-440D-AF35-8130687E9BB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4023:*:*:*:*:*:*", "matchCriteriaId": "405ECB05-7E35-4927-A19A-92A4B7FE8B1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4024:*:*:*:*:*:*", "matchCriteriaId": "9F1EC2A5-7498-40F9-91A4-B004AEA1136C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4025:*:*:*:*:*:*", "matchCriteriaId": "CEBB1CED-7B88-4E4B-89E8-E0E2B882E34C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4026:*:*:*:*:*:*", "matchCriteriaId": "DD3B14B6-8329-43C4-AE42-13279E77275E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4027:*:*:*:*:*:*", "matchCriteriaId": "7792B448-4D34-42F8-919C-344783D625E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4028:*:*:*:*:*:*", "matchCriteriaId": "E297C040-0523-4A50-97AB-349880D5B3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4030:*:*:*:*:*:*", "matchCriteriaId": "F86FEB8D-8A75-4C92-947D-CA7EDF8E0F5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4031:*:*:*:*:*:*", "matchCriteriaId": "A238ED1B-6C11-44C9-BDBF-8A724AB7FE1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4034:*:*:*:*:*:*", "matchCriteriaId": "8ADCADB6-9764-4CA8-AB54-BCE6D0363E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4035:*:*:*:*:*:*", "matchCriteriaId": "6E0C9493-EB87-4197-AF8B-BCA25488BCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4036:*:*:*:*:*:*", "matchCriteriaId": "E4FD31D3-69EB-4699-B31B-C18A0EA9D9C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4040:*:*:*:*:*:*", "matchCriteriaId": "FBD7855F-4B66-4F43-960C-73E69C52E865", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4043:*:*:*:*:*:*", "matchCriteriaId": "0C9C8B4D-CFFE-4CB4-8F11-FC778462CB10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4045:*:*:*:*:*:*", "matchCriteriaId": "36A68C2E-978A-4F82-AC61-E9E7CA9908A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4046:*:*:*:*:*:*", "matchCriteriaId": "6C8D7EA7-7CC3-48B0-B966-71A69FDE6A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4047:*:*:*:*:*:*", "matchCriteriaId": "05D804B6-5990-42A7-A072-8F904A5262E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4048:*:*:*:*:*:*", "matchCriteriaId": "0C720653-317E-4B1C-AFA8-90FAE97430C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90001:*:*:*:*:*:*", "matchCriteriaId": "A9C350FA-E483-4C06-A784-5679ED0471BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90063:*:*:*:*:*:*", "matchCriteriaId": "15A47AA7-8B49-41EC-AB57-5706989DF756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90064:*:*:*:*:*:*", "matchCriteriaId": "D1CCB7C8-86B9-4DA8-93D0-F96B81C82F32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90065:*:*:*:*:*:*", "matchCriteriaId": "397140D3-2424-42D9-9900-625EC4E95D22", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90066:*:*:*:*:*:*", "matchCriteriaId": "BA8C9A27-572E-407F-826A-1206394044D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90067:*:*:*:*:*:*", "matchCriteriaId": "7601CC24-FC2D-4805-A975-2D307DECDF2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90068:*:*:*:*:*:*", "matchCriteriaId": "A513B136-7DC5-48DD-BDCB-1620A14849B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90069:*:*:*:*:*:*", "matchCriteriaId": "0858CFDE-7D76-4A63-BE21-A73310AD17BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90070:*:*:*:*:*:*", "matchCriteriaId": "1BD8F9F8-89EB-422E-A4B1-E715AFD72341", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90071:*:*:*:*:*:*", "matchCriteriaId": "E0271D12-94E8-4345-9666-4A47A5AAB824", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90072:*:*:*:*:*:*", "matchCriteriaId": "513337E6-D805-461B-812F-D6EEA0921883", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90073:*:*:*:*:*:*", "matchCriteriaId": "8EB5C610-33AC-486C-AF48-4A889D429420", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90074:*:*:*:*:*:*", "matchCriteriaId": "81FC1ED5-99FF-4C30-BCE0-5CDC7A5E4C03", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90075:*:*:*:*:*:*", "matchCriteriaId": "EA473C80-4100-4170-9601-8C9EEB5F64CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90076:*:*:*:*:*:*", "matchCriteriaId": "5D2C41A7-1602-43CD-9E6D-A0178931C020", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90077:*:*:*:*:*:*", "matchCriteriaId": "238E3508-0230-441E-8114-6EEB79E22632", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90078:*:*:*:*:*:*", "matchCriteriaId": "2C85C7DB-BC46-4D0A-8353-C2DB51BFFD85", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90079:*:*:*:*:*:*", "matchCriteriaId": "0BAAFCD6-5945-46BE-9380-5C2F79060B8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90080:*:*:*:*:*:*", "matchCriteriaId": "B6E108C0-075A-493D-B8AE-343D81BEC9C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90081:*:*:*:*:*:*", "matchCriteriaId": "CA614153-4E29-45AB-BBC2-9BA0CDAD4B8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90082:*:*:*:*:*:*", "matchCriteriaId": "F95B1920-005C-494C-A9A9-C72502E45723", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90083:*:*:*:*:*:*", "matchCriteriaId": "DA3C51B7-B8A0-42F4-ADC9-C949B610EE2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90084:*:*:*:*:*:*", "matchCriteriaId": "180D4816-E5D0-406B-B289-4B1984250B50", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90085:*:*:*:*:*:*", "matchCriteriaId": "57883D51-1188-4C14-B2EF-26FD4B156526", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90086:*:*:*:*:*:*", "matchCriteriaId": "D5A59B7E-74CF-425F-B814-313D5F1F7670", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90087:*:*:*:*:*:*", "matchCriteriaId": "327F6B11-9176-4791-96D0-FAD8EBE9D5E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90088:*:*:*:*:*:*", "matchCriteriaId": "5E057023-0175-4DB5-98A4-942FB81AF59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90089:*:*:*:*:*:*", "matchCriteriaId": "28E12A60-CEB6-46BD-A4E8-48651A651E5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90090:*:*:*:*:*:*", "matchCriteriaId": "25FA111C-01EA-49CA-BF67-A8C8C9A6E415", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90091:*:*:*:*:*:*", "matchCriteriaId": "855DD295-DB63-4AF1-8C5A-0904BF049658", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90092:*:*:*:*:*:*", "matchCriteriaId": "CDFE095C-C659-44BE-9740-C8B712165912", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90093:*:*:*:*:*:*", "matchCriteriaId": "FFB28D66-83BF-4685-9015-0B30021C59C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90094:*:*:*:*:*:*", "matchCriteriaId": "9B82AA92-96B6-4841-BAC0-AA1487CBEB7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90095:*:*:*:*:*:*", "matchCriteriaId": "81A65567-42E6-416B-8FB0-2571FDF60207", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90096:*:*:*:*:*:*", "matchCriteriaId": "2193F4C6-5679-487B-82B8-C55A874ED5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90097:*:*:*:*:*:*", "matchCriteriaId": "124CB5EC-44C1-4136-B495-053F2299E59C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90098:*:*:*:*:*:*", "matchCriteriaId": "A183735E-12AF-4692-A228-FE3B1169ABBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90099:*:*:*:*:*:*", "matchCriteriaId": "3C1C57BB-73A7-4B48-B99C-A18E1CE55553", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90100:*:*:*:*:*:*", "matchCriteriaId": "020F4E45-45D2-4F1A-BAF8-8C61F45F5770", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90101:*:*:*:*:*:*", "matchCriteriaId": "039F68D9-A36A-44BE-A457-790ECCB20FD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90102:*:*:*:*:*:*", "matchCriteriaId": "23BDB028-FCCE-4A9D-887B-6A6F8166CFCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90103:*:*:*:*:*:*", "matchCriteriaId": "5210BAA8-2ECC-49AA-8408-815433DC28D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90104:*:*:*:*:*:*", "matchCriteriaId": "C8DC19CC-3F95-4753-8037-FB627D1D6167", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90105:*:*:*:*:*:*", "matchCriteriaId": "93F07AFE-4E9A-4001-A17A-606A7B5E83F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90106:*:*:*:*:*:*", "matchCriteriaId": "06B25C38-DE86-4F3E-918E-BC70FCC0054B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90107:*:*:*:*:*:*", "matchCriteriaId": "E3F2E0E6-01D2-418D-872E-B117259E990F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90108:*:*:*:*:*:*", "matchCriteriaId": "41D80E46-35FE-45E5-96D6-28691C0847DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90109:*:*:*:*:*:*", "matchCriteriaId": "4D7768DA-1111-4557-A0D6-D3A74AC7FA54", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90110:*:*:*:*:*:*", "matchCriteriaId": "B3001463-3729-4216-B420-602A11C74244", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90111:*:*:*:*:*:*", "matchCriteriaId": "9A68EC19-3A57-41C4-90FA-CB1BF20EB8DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90112:*:*:*:*:*:*", "matchCriteriaId": "193913B2-25D1-4779-B7E6-ACC5992AFC97", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90113:*:*:*:*:*:*", "matchCriteriaId": "E7AA77AA-E00E-4125-A698-12B30434F632", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90114:*:*:*:*:*:*", "matchCriteriaId": "229FBCFC-2810-44D1-9687-A7C060F6F9D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90115:*:*:*:*:*:*", "matchCriteriaId": "99C3BBC2-F1D3-4873-A8FB-1B79A2163F74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90116:*:*:*:*:*:*", "matchCriteriaId": "4A06EF86-915C-4D09-965B-3A9D4DFC96B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90117:*:*:*:*:*:*", "matchCriteriaId": "3D67F80D-E999-4E46-8386-8122DC17DBCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90118:*:*:*:*:*:*", "matchCriteriaId": "2593B38A-1281-41C9-B065-E6EFDF6BD71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90119:*:*:*:*:*:*", "matchCriteriaId": "B61541E8-5818-475B-9E54-C45C71C14A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90120:*:*:*:*:*:*", "matchCriteriaId": "84DE1BA0-8C36-44DF-91A0-96EA6EF736D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90121:*:*:*:*:*:*", "matchCriteriaId": "BB2F2DEA-5E03-442E-A46B-B6C218BF3273", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90122:*:*:*:*:*:*", "matchCriteriaId": "CCEFA415-47D7-4DA2-B541-DD0B67AF30A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90123:*:*:*:*:*:*", "matchCriteriaId": "B147B06A-969E-4541-A863-DF4045D39527", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "B20C46B3-C23E-42AF-BA81-117B8541171B", "versionEndExcluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90012:*:*:*:*:*:*", "matchCriteriaId": "A897E8C8-6058-4BEC-BF00-3E8614238E0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90013:*:*:*:*:*:*", "matchCriteriaId": "8B39A3B3-5B9E-4B31-9CE2-3625EA9C9AD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90014:*:*:*:*:*:*", "matchCriteriaId": "FBF5AF44-E30B-4948-B0E2-42EE062DC3A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90015:*:*:*:*:*:*", "matchCriteriaId": "356F078A-9887-423A-8BA7-74201DE109F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90016:*:*:*:*:*:*", "matchCriteriaId": "9B8887A3-14C6-4DFB-9EBF-35966B4E6158", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90017:*:*:*:*:*:*", "matchCriteriaId": "3A0FE6B3-E037-45F4-A907-51CD99E7B8DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90018:*:*:*:*:*:*", "matchCriteriaId": "250CFA85-89C5-4F75-AF0F-BEA9C816E54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90019:*:*:*:*:*:*", "matchCriteriaId": "85B8B8F4-951D-446C-A8F8-EEBDC385D83E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90020:*:*:*:*:*:*", "matchCriteriaId": "288C8246-7367-4D10-A0D4-5426B7EA17A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90021:*:*:*:*:*:*", "matchCriteriaId": "59326535-A08E-4588-BAB8-9DF094FB61F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90022:*:*:*:*:*:*", "matchCriteriaId": "077B9DBD-190C-4F20-BD3A-64D6887B7930", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90030:*:*:*:*:*:*", "matchCriteriaId": "0587320F-C57E-41F7-B31F-1EA52ED234B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90031:*:*:*:*:*:*", "matchCriteriaId": "0911BEEC-A6E4-440C-8217-A7FAAC1D3972", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90032:*:*:*:*:*:*", "matchCriteriaId": "A9D9805F-4F6B-4A15-A444-3B6538BCDDB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90033:*:*:*:*:*:*", "matchCriteriaId": "48901205-BDE9-4CBA-9E3B-779D949CBF58", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90034:*:*:*:*:*:*", "matchCriteriaId": "69539391-6C6A-498A-B952-D4F12C2FEC4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90035:*:*:*:*:*:*", "matchCriteriaId": "4A36B8AA-987B-4112-8B67-5BC306F9CF86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90036:*:*:*:*:*:*", "matchCriteriaId": "96E9422A-CA9D-4BC8-90DB-3E3A1966E94C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90041:*:*:*:*:*:*", "matchCriteriaId": "11A2E17D-3B33-4531-B78B-156BC2C7E53A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90042:*:*:*:*:*:*", "matchCriteriaId": "4C34129B-5A15-4BE9-BB15-66101A5EAB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90043:*:*:*:*:*:*", "matchCriteriaId": "DA9A87D7-0707-4321-B5D2-2B4CBC66E838", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90044:*:*:*:*:*:*", "matchCriteriaId": "C2C06D73-9BEA-4604-BE73-3CE8A2DDD52A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90056:*:*:*:*:*:*", "matchCriteriaId": "DAA7B941-6FE6-45CA-931D-6414DFEA9B50", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90057:*:*:*:*:*:*", "matchCriteriaId": "F7EEEF6C-DD29-4E6F-BED7-AE10184C2F9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90058:*:*:*:*:*:*", "matchCriteriaId": "D36AD9EC-82D0-451B-ADD4-1EEC0FDC389B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90072:*:*:*:*:*:*", "matchCriteriaId": "F68164FC-9A09-4145-97B8-99EE5532E6E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90074:*:*:*:*:*:*", "matchCriteriaId": "2FB5646D-11C7-4878-9471-4F6D483CE979", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90075:*:*:*:*:*:*", "matchCriteriaId": "BBC0A0C3-C33E-46E9-A099-A5A66F576138", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90076:*:*:*:*:*:*", "matchCriteriaId": "76584957-0388-4421-8336-75EE90D00349", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90077:*:*:*:*:*:*", "matchCriteriaId": "05C542D5-7E3A-46E2-8CB6-A13159EFA4B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90078:*:*:*:*:*:*", "matchCriteriaId": "7E7BF415-29D3-4BD0-8613-317D7EC7C992", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90079:*:*:*:*:*:*", "matchCriteriaId": "7F046602-4595-48C8-83F5-A43FD501003F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90080:*:*:*:*:*:*", "matchCriteriaId": "FC5B464F-D327-4181-A911-2E3683B914B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90081:*:*:*:*:*:*", "matchCriteriaId": "025D8F22-968F-44B6-83E1-13DAB7A514A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90082:*:*:*:*:*:*", "matchCriteriaId": "F9F60549-59CE-47D0-BF2A-91B84A0B1984", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90083:*:*:*:*:*:*", "matchCriteriaId": "6F982139-0EDC-411C-A074-A29963DCA328", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90084:*:*:*:*:*:*", "matchCriteriaId": "FBED4ED7-E991-48D0-AE27-71F9DEA5EDA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90085:*:*:*:*:*:*", "matchCriteriaId": "8C6BE721-D851-406E-9AAF-01F9A9E15ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90086:*:*:*:*:*:*", "matchCriteriaId": "F1D6E935-53D3-462D-9DD8-91BFEC90BB2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90087:*:*:*:*:*:*", "matchCriteriaId": "E580F0AB-B840-4293-8639-4B7DD7981EAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90088:*:*:*:*:*:*", "matchCriteriaId": "2CC8FE34-A5C9-4EF7-AA05-BEE403AB3B73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90090:*:*:*:*:*:*", "matchCriteriaId": "A80444F6-755F-4FE3-96B3-744A842D40AD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*", "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*", "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*", "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*", "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*", "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*", "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*", "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*", "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*", "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*", "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*", "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*", "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*", "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*", "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*", "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*", "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*", "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*", "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*", "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*", "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*", "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*", "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*", "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*", "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*", "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*", "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*", "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*", "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*", "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*", "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*", "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*", "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*", "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*", "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*", "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*", "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*", "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*", "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*", "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*", "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*", "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*", "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "DC13FB20-119C-47F9-870D-399811661896", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125457:*:*:*:*:*:*", "matchCriteriaId": "BC457292-04FE-4643-8F1D-05DAEF3F70BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*", "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*", "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*", "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125476:*:*:*:*:*:*", "matchCriteriaId": "BE930B14-4B22-4299-8DE8-7625342FC4E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*", "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*", "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*", "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*", "matchCriteriaId": "7D394493-D690-44F0-B3F0-FD39E46F31C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "AF8CBF57-EF1A-4C84-879B-1A4035F4236A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*", "matchCriteriaId": "2F1E924E-8896-41CE-82E2-F22943A02FCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*", "matchCriteriaId": "FB058840-E3D0-45FA-B95F-3445A7719118", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125589:*:*:*:*:*:*", "matchCriteriaId": "FD9B23C4-3458-4E6C-B1AB-D4A36BE8FFA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125597:*:*:*:*:*:*", "matchCriteriaId": "D2A7AA89-7233-4624-894A-B2B996D1D270", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125598:*:*:*:*:*:*", "matchCriteriaId": "B6B402ED-8B64-4FB0-B9E7-76E499A4115F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125599:*:*:*:*:*:*", "matchCriteriaId": "4E8B01F2-0A03-48CF-8BAE-556A9C3D88FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125601:*:*:*:*:*:*", "matchCriteriaId": "3C07E022-B75C-4491-8A30-9A1532D0472C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125603:*:*:*:*:*:*", "matchCriteriaId": "00E92DB5-8D53-4129-92D0-AD1DA0F1FEB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125604:*:*:*:*:*:*", "matchCriteriaId": "913CD99C-8F47-47BD-BD7C-33762861BB08", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125605:*:*:*:*:*:*", "matchCriteriaId": "67B7F52E-7D7A-4AA9-9241-FFCC3DD49BBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125611:*:*:*:*:*:*", "matchCriteriaId": "D02650C3-1A7F-4889-B6CB-11994054B5F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125612:*:*:*:*:*:*", "matchCriteriaId": "01FEA1CA-351B-4E2B-A78E-60338682F97F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125613:*:*:*:*:*:*", "matchCriteriaId": "04C9E097-FE04-42BD-96C8-2A3A9FD50B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125614:*:*:*:*:*:*", "matchCriteriaId": "94F895DB-C865-4AED-A1D9-CE69C0EF52FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "8B565B12-283F-4323-9C88-FD3CF5646DD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125616:*:*:*:*:*:*", "matchCriteriaId": "9FDC3394-293E-44CF-A83F-FE047A4E4DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125617:*:*:*:*:*:*", "matchCriteriaId": "01846F8F-D7D6-4CD9-B83E-41B70C691761", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125628:*:*:*:*:*:*", "matchCriteriaId": "CAE013FC-357D-42DA-B223-D40B3C813089", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125629:*:*:*:*:*:*", "matchCriteriaId": "E4BA87E9-5E37-41EE-835C-13F68ABC9C06", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125630:*:*:*:*:*:*", "matchCriteriaId": "D2034E17-2DB9-4229-B7D4-D14761CEE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125631:*:*:*:*:*:*", "matchCriteriaId": "39FBAFB9-5703-4EEA-BFF3-45B958E0805F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "93A02A7E-02A8-4B74-AA9F-3DA0492748EF", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127000:*:*:*:*:*:*", "matchCriteriaId": "24B04D73-0C55-49A8-B599-27C8C04948C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127001:*:*:*:*:*:*", "matchCriteriaId": "97E74846-1666-4773-910D-77E0E19A7FCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127002:*:*:*:*:*:*", "matchCriteriaId": "BB90B809-9D97-469F-B8F6-41B4AEAA2D3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127003:*:*:*:*:*:*", "matchCriteriaId": "423C8618-9F3B-4B83-902C-FF01027EC54A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127004:*:*:*:*:*:*", "matchCriteriaId": "7E974B56-7A00-4582-AF8B-0D09B94477BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127100:*:*:*:*:*:*", "matchCriteriaId": "7B6F8404-F624-41AA-BE8D-170D843EC290", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127101:*:*:*:*:*:*", "matchCriteriaId": "D0FF81E5-2134-4F45-9B39-2E3D5208BB80", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127102:*:*:*:*:*:*", "matchCriteriaId": "0D5DA95F-7C0F-4D05-BD35-DED356D01692", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127103:*:*:*:*:*:*", "matchCriteriaId": "2B3A3EC3-DF7C-41A6-884C-C7C13D41B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127104:*:*:*:*:*:*", "matchCriteriaId": "89EE3E31-8F55-4E44-8522-A32D6887AE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127109:*:*:*:*:*:*", "matchCriteriaId": "979ED7B4-FAE3-4E98-A303-290E498FFD81", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127116:*:*:*:*:*:*", "matchCriteriaId": "EDC62E2F-AB97-4008-A52B-9CDC341A06BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127117:*:*:*:*:*:*", "matchCriteriaId": "93DF7023-22AE-4A84-8734-06239013C10C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127118:*:*:*:*:*:*", "matchCriteriaId": "2A128BED-75FA-42F1-9171-CBAEAA2366A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127119:*:*:*:*:*:*", "matchCriteriaId": "5298BB50-8E22-490A-87C7-7F40B7F8F7C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127120:*:*:*:*:*:*", "matchCriteriaId": "39C34F02-E413-4067-B958-86ADF89FA3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127122:*:*:*:*:*:*", "matchCriteriaId": "A0673E69-A2DB-424C-BBF0-79D729230F1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127123:*:*:*:*:*:*", "matchCriteriaId": "4F062A20-6FFE-479B-9E64-E4771490B041", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127131:*:*:*:*:*:*", "matchCriteriaId": "C598244E-7483-4762-AC27-BD8036FEFE5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127133:*:*:*:*:*:*", "matchCriteriaId": "B188A792-EF1A-4292-BD91-47635706C430", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127134:*:*:*:*:*:*", "matchCriteriaId": "BEFACD7A-D81B-4EDC-9E38-FD93FA0DE456", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127136:*:*:*:*:*:*", "matchCriteriaId": "DF818138-079A-43BE-A8B5-5DA47FA443AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127138:*:*:*:*:*:*", "matchCriteriaId": "27066A8F-75C4-42BF-A54B-543114B92995", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127140:*:*:*:*:*:*", "matchCriteriaId": "A239C6F8-3FC0-4510-B33F-14B25908E68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127141:*:*:*:*:*:*", "matchCriteriaId": "E8399E84-1344-4472-91F3-F63255911876", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127185:*:*:*:*:*:*", "matchCriteriaId": "8888C77E-04A7-4C34-B497-504F6217E07B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127186:*:*:*:*:*:*", "matchCriteriaId": "7502D92A-3B51-4A76-88D6-E2D76A584075", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127187:*:*:*:*:*:*", "matchCriteriaId": "7E465A5F-C8B0-4AD0-8D6D-4823C5F8153D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127188:*:*:*:*:*:*", "matchCriteriaId": "DBA622D6-CD85-4F0F-8CC3-39FE29754039", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127189:*:*:*:*:*:*", "matchCriteriaId": "A0D2828B-B897-4F1D-B657-436DB3CAC2FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127191:*:*:*:*:*:*", "matchCriteriaId": "98279B6E-8361-45CA-8912-F06972F4BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127240:*:*:*:*:*:*", "matchCriteriaId": "A7D879C8-E89F-45C1-9609-80B737080AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127241:*:*:*:*:*:*", "matchCriteriaId": "3D8FD2DE-18D9-4F50-9256-672435059876", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127242:*:*:*:*:*:*", "matchCriteriaId": "F01FEA58-BE5B-4CEC-831D-3BF05A20688D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:*:*:*:*:*:*:*:*", "matchCriteriaId": "039C6DE6-DEA2-42E9-AE55-322E8E6B048C", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "55EA00B6-DE5D-4DE4-85AC-38A1216B4923", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "BC4DF055-45CD-4B83-A7BA-59D6E46BD4D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125119:*:*:*:*:*:*", "matchCriteriaId": "F9B51EF5-800F-446B-9F2D-47D45445E73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "C4C2087D-1B7B-4DA4-8288-D5366BC9735F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "B8FE0307-3CA7-445E-BA42-27D65C298E3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125129:*:*:*:*:*:*", "matchCriteriaId": "F6F9CB58-3B55-4E6F-AE24-D16552EE3614", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125138:*:*:*:*:*:*", "matchCriteriaId": "006DB16B-34C4-4359-96A1-381F7C66BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125149:*:*:*:*:*:*", "matchCriteriaId": "7EFE37CC-58F5-4B08-95C2-D9DAFC8D9C31", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125162:*:*:*:*:*:*", "matchCriteriaId": "4F102286-1D21-48AB-A1B4-ADB5A4D3EEA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "7DDD3297-57ED-40D4-AC54-4484A3E9C633", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "8F467A89-13F7-47E9-8285-041DB3F33603", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "E8C93717-4E5A-4686-A83F-A7D4AC732144", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "5A15AF17-8500-4102-AF1C-897360BB985C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "D9B364E3-45C1-4C71-BB6D-9D831449CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "4CCB49B2-4AA1-4223-98F0-1E0872566BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125357:*:*:*:*:*:*", "matchCriteriaId": "5D0A19E8-F0B3-446D-B991-C63657BC2A61", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "1C7CD9C4-861D-42C0-9209-0843613F94B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125363:*:*:*:*:*:*", "matchCriteriaId": "AD44F42F-709B-4FBE-B9C7-9944A874D489", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "23C53DA5-F50F-4FA5-AF8B-4EA174BB4E57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125395:*:*:*:*:*:*", "matchCriteriaId": "199EE3C2-2D58-4777-8592-D000D135E2A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "0CE514D6-6C6A-4DAD-8DB2-FA1F12FFAFBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125412:*:*:*:*:*:*", "matchCriteriaId": "461FD5FC-2D14-44FC-88F0-783EDDD63483", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125429:*:*:*:*:*:*", "matchCriteriaId": "65FD6158-1B99-4C17-A167-41D6B1CD62F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125449:*:*:*:*:*:*", "matchCriteriaId": "188123C8-7E72-4690-A322-888BED90FB7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "2BF85206-863D-493C-88F4-15B0BA5276A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "3C9DE996-1DEC-4AF0-89FD-1E3DA3967BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "75FF4D85-97C8-4DF4-ADE6-EDE8EC2DD5BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "9CAC6467-19F7-4CB2-A5FC-B57A14F4636C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "60EB56E2-7367-4488-A00D-41464E86B06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "3E315636-0897-4421-882D-E8196F7ACAD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125459:*:*:*:*:*:*", "matchCriteriaId": "EE609902-17AF-491B-8749-C8AF4E0A8241", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "6EFF6295-3F73-448D-8109-453E0DFD2002", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125471:*:*:*:*:*:*", "matchCriteriaId": "35A535BC-644B-4B10-8F66-779FAF503683", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125475:*:*:*:*:*:*", "matchCriteriaId": "DDD4AA74-4B07-44A1-A32F-88B0B1E90ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "52203983-0CC9-49DB-B100-49CD9F5CE688", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "095362BF-69CD-458F-8A44-E3D6AFC8C41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125490:*:*:*:*:*:*", "matchCriteriaId": "65F6F508-F0BF-4821-8B50-24A9B652522E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125564:*:*:*:*:*:*", "matchCriteriaId": "4044EE7F-268B-4CC7-9982-80766BE5790E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "6F87A77C-E40F-4DDE-9260-FCF12B237FA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125581:*:*:*:*:*:*", "matchCriteriaId": "51CF193E-D5A6-423A-A5E2-B0ACF4B002E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125596:*:*:*:*:*:*", "matchCriteriaId": "7C10F5A0-6FFE-4907-8A61-61CF11FC7A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125606:*:*:*:*:*:*", "matchCriteriaId": "6B3F637D-3724-4314-BCC7-A6A06040DF00", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125617:*:*:*:*:*:*", "matchCriteriaId": "18598449-D0EE-445F-BA6A-2CD658DAF4D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125657:*:*:*:*:*:*", "matchCriteriaId": "6DC52F3E-EC5F-404B-ABD7-615B8AB522A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125664:*:*:*:*:*:*", "matchCriteriaId": "E3552F71-C708-41A4-9168-5673C086F507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A1DA3A9-36FB-4BCA-AEEC-231A2C3127D0", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127101:*:*:*:*:*:*", "matchCriteriaId": "0BA30C26-D3D8-447C-BD7A-9BC166C8BF3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127117:*:*:*:*:*:*", "matchCriteriaId": "162E0203-17E1-427E-A351-33F75E8FE5A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127134:*:*:*:*:*:*", "matchCriteriaId": "61FB54BF-7A8F-4EE5-AF42-15E2B69E9DE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127241:*:*:*:*:*:*", "matchCriteriaId": "764139C9-FF6A-4BE0-BAF3-52F403C41393", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127242:*:*:*:*:*:*", "matchCriteriaId": "3D9805F6-1A56-4FBF-8F47-DAA80E4DE9FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9FF3515-61C7-4A7A-9781-6D4A0340B2EC", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "77AA96FD-5AF0-4F80-8402-BAB460FF8B75", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125003:*:*:*:*:*:*", "matchCriteriaId": "3095B4D1-170A-48B0-8C4A-7A7A54E42149", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8CE4267C-DAAE-4CEC-A6E3-D2213AA5EE57", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125109:*:*:*:*:*:*", "matchCriteriaId": "92EB7DC6-F227-40B3-A093-4D9495BBE272", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125115:*:*:*:*:*:*", "matchCriteriaId": "40C478D3-7C1C-4FCE-99FA-976EE2754680", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "DE6C88E4-D382-4729-AF5D-5697DCE26A67", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125122:*:*:*:*:*:*", "matchCriteriaId": "6447F4D8-0943-4C8C-BBA7-42BECC181D80", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "422B8CB6-3A14-4452-9192-F4CD5BF5D030", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125141:*:*:*:*:*:*", "matchCriteriaId": "41AB6C1A-CBEC-4DC1-94A4-9D14E82BA542", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125142:*:*:*:*:*:*", "matchCriteriaId": "6A2C060F-770B-4245-8490-5D2EB970FCA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125149:*:*:*:*:*:*", "matchCriteriaId": "16E635CC-1591-4535-89EA-B8470BD885F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125150:*:*:*:*:*:*", "matchCriteriaId": "D5F9E623-A42D-446D-ADDD-5F3C8F7BD9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125160:*:*:*:*:*:*", "matchCriteriaId": "1E235AF0-4453-4439-A25D-FF78A89BB117", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125179:*:*:*:*:*:*", "matchCriteriaId": "620E40E9-9D83-4E14-8898-10C0718B1A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "1D72F651-BD8C-4564-AC1A-84A91F21EADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "19DD9FF2-583B-4079-9375-E1643FF9A54B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125200:*:*:*:*:*:*", "matchCriteriaId": "69EDC39C-68EE-488D-B740-9E45229BDF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "EC374820-208A-40EF-965C-50C19467BD82", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "397B1FAC-EB6E-4F17-B5D7-CBD47D581DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125217:*:*:*:*:*:*", "matchCriteriaId": "E771BCA5-9E65-4C8B-BF36-E90F641D2015", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125221:*:*:*:*:*:*", "matchCriteriaId": "A658460A-FAE0-4487-8CD6-FB3384664F9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "6F104D17-7D08-42A5-BAF3-DEA475308FC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "9F875BFA-18C2-42BF-8BC4-D02E15B395E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "3BBD9D22-7E92-4648-972E-E17D9472E08D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125357:*:*:*:*:*:*", "matchCriteriaId": "7219F9A0-CD1D-4BB4-A5E1-FA0495B49114", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125361:*:*:*:*:*:*", "matchCriteriaId": "0CBB0F67-9C81-44BC-9836-DE5FE40DDBBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "6D7C0250-52DA-423D-B061-0CDF39D15068", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "6FC34D3F-FED3-4266-AB29-98FFC2002507", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "DD1460AC-A719-4B75-B28B-748B6C262A87", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "B9024FE1-536C-4180-8115-6D97E7C324D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125410:*:*:*:*:*:*", "matchCriteriaId": "8CD6EB21-3DC6-47A7-939A-AA3C8EFE278F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125429:*:*:*:*:*:*", "matchCriteriaId": "3A5911F7-7A45-499D-B345-D9C082932BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125447:*:*:*:*:*:*", "matchCriteriaId": "CBBD7A90-4F97-4DFD-B8E6-F24A9B72A1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125459:*:*:*:*:*:*", "matchCriteriaId": "87C6DCE0-5F40-4F50-8538-29CFF2DCC9EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125464:*:*:*:*:*:*", "matchCriteriaId": "BECA9FA7-887B-4ECC-AA23-F75F96E42CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "CFD6D448-337E-4A63-8BE2-4DFC50AE7413", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125475:*:*:*:*:*:*", "matchCriteriaId": "33F2625D-0750-4ED1-8BA7-8141D8B7FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "A7D6DD58-62F3-4727-9AC1-E6B5EA71BB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "33991587-174F-48D9-821D-BF44CF24924D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125484:*:*:*:*:*:*", "matchCriteriaId": "18B8D15F-0286-4D64-96F8-D213E241813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "EB8483C1-6586-4936-8BF8-ECE3F0F4D5F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "A9318551-C41F-46E9-A196-5C01EAE276F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125490:*:*:*:*:*:*", "matchCriteriaId": "5030E129-0401-457B-B4FB-974AD5A0A948", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125557:*:*:*:*:*:*", "matchCriteriaId": "74DAFF5A-7090-427F-A69E-2E90456485C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "8EB26A23-108E-4F39-84E3-2F1C197C8CE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125582:*:*:*:*:*:*", "matchCriteriaId": "DF57D557-B1B9-4B2E-81A5-B23C1A8521E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125605:*:*:*:*:*:*", "matchCriteriaId": "E37E20B2-B678-45C1-9EF9-7D65172B485F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125606:*:*:*:*:*:*", "matchCriteriaId": "722042FB-CFE5-4DE8-A196-65D2E035378F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "17CC4F0C-E69E-4FA5-8119-D71AD9C13E63", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125621:*:*:*:*:*:*", "matchCriteriaId": "B8DA03F6-8EF8-48E1-B4CF-A2B0CB6F1DEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*", "matchCriteriaId": "50FB7952-0CED-4A64-A435-D588CA661630", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127000:*:*:*:*:*:*", "matchCriteriaId": "8343B084-2009-44F2-B36C-C66719BBB1FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127101:*:*:*:*:*:*", "matchCriteriaId": "2574DD71-36A4-47AE-ABC3-D05D36FF8F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127130:*:*:*:*:*:*", "matchCriteriaId": "B9D787C9-F37B-4193-A34F-080F7410BFA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127131:*:*:*:*:*:*", "matchCriteriaId": "55FB4705-D709-42F0-A562-6C5A05E00EAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127187:*:*:*:*:*:*", "matchCriteriaId": "4503E624-DC7F-4C5E-B715-0EC4676CA1ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*", "matchCriteriaId": "340D8561-6110-49D8-BCDC-78A762FCD3E6", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "C61E9B3D-A39D-428E-A82F-5C4C225906C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "423D3372-F910-4006-9FE8-49A6B730AEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125109:*:*:*:*:*:*", "matchCriteriaId": "02B0ED3C-4729-4C70-8F06-6B507ED75BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125115:*:*:*:*:*:*", "matchCriteriaId": "3CE0B4B2-CC4C-4F0F-B97E-A90C84377989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "DC2E4C62-9867-4D14-85B3-95F359BD0551", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125122:*:*:*:*:*:*", "matchCriteriaId": "5042AD90-4DF1-4A5A-9317-017102515284", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "356A4F91-FA5B-4A09-841E-A380F580BA88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125129:*:*:*:*:*:*", "matchCriteriaId": "CBBDC611-498B-4175-9A88-5914ED6D3A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125141:*:*:*:*:*:*", "matchCriteriaId": "10F3C9AD-9C1B-4FBD-8325-B56FCF96FFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125149:*:*:*:*:*:*", "matchCriteriaId": "F4EE5C24-C4AE-4F9D-B808-8930102A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125160:*:*:*:*:*:*", "matchCriteriaId": "E0F45A48-5006-4748-B683-6C7CB469286A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125179:*:*:*:*:*:*", "matchCriteriaId": "9796C62A-8FCA-4E1E-855E-7D67F77C9AD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "1A1AC2FD-91BA-4B78-BB14-B9F2CEB09071", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125200:*:*:*:*:*:*", "matchCriteriaId": "A4B99FDC-EC68-4006-B359-E845AEF72FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "240A8575-F963-4DB4-B9C6-BE584A2F8271", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "B97F1BEE-F3C0-4DDD-B767-23C4BE9054AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125217:*:*:*:*:*:*", "matchCriteriaId": "3B3482FA-9483-4EC7-9B09-E1BB63F02790", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "2600FBC5-8358-4126-88F2-00F3BEE9B537", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "FDD47CB0-3680-4ED9-821C-B673EACB953D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "D27B76C3-B8C8-48A6-AEF3-E9145B57EDA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125357:*:*:*:*:*:*", "matchCriteriaId": "6D77C576-035E-403B-A2B3-992496FAD202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "70608921-F02A-4121-BE90-919DD68DD0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "93C50660-6ECF-4353-A15A-4F7B0F06D33A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "06D8864A-E6CC-4742-A2CF-B060E8DFA740", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125393:*:*:*:*:*:*", "matchCriteriaId": "D2572B3B-3BC4-4A83-92D5-8D7579821F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "0DD78F90-5231-4848-8971-9AB5ABBD2C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125412:*:*:*:*:*:*", "matchCriteriaId": "7C94C142-168F-421C-B00B-3F42AA1CC9D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125429:*:*:*:*:*:*", "matchCriteriaId": "77CE4835-6540-4CF6-A31C-255DA52BB073", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125447:*:*:*:*:*:*", "matchCriteriaId": "E0544AE8-92B3-43A7-8F42-299AED1A40CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "BEC805D2-CFDC-40DE-AA70-42A91461BEE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "4767BF5A-B867-44BB-B152-E2AFA63B06D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "5855C471-07AB-4A96-9631-26C6C8B01F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "5075910F-3676-439A-879A-5CBE2C734347", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "20808F91-7F08-4BA9-9075-C54337EC68E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125456:*:*:*:*:*:*", "matchCriteriaId": "C700CE3B-31B5-4B4D-A378-70EC26D6F88B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125459:*:*:*:*:*:*", "matchCriteriaId": "A05AFF4D-4EF9-4939-81CC-0AB55DA596F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125464:*:*:*:*:*:*", "matchCriteriaId": "86C3E31F-87E2-459F-8D1B-C6D1A237960D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "A3E7FC26-0000-4D4B-B489-DF0E2CD2B13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "13E6E0F9-9D03-4665-9C89-6BE62ADCB39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125471:*:*:*:*:*:*", "matchCriteriaId": "0DE52003-E959-420F-89A1-C86D8FB12DBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125476:*:*:*:*:*:*", "matchCriteriaId": "6E9C9051-7FDE-4DEE-85DC-0798524DC17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "5BE3598F-CEB4-4553-BB50-AA778BBF8BDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "4C71852D-D529-469A-9111-6D4DB8381BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125484:*:*:*:*:*:*", "matchCriteriaId": "EC3F7DA9-3FBF-4D67-8BA5-2643E706F64F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "53E2DF01-9A39-4E50-BEDE-D49988CE5CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "0015664D-11BC-4DEE-BC5B-DB3D1FE8DF82", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125490:*:*:*:*:*:*", "matchCriteriaId": "8B49F887-4574-4B3C-A8A7-57F75B27447F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125557:*:*:*:*:*:*", "matchCriteriaId": "C1E93E4D-0E54-41DF-843A-E8AE94EAD0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125566:*:*:*:*:*:*", "matchCriteriaId": "1617ADAD-2E13-4910-B600-3EC7E59B087C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "4E7B4955-F688-47DE-B1FF-D417EBDFF9C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125582:*:*:*:*:*:*", "matchCriteriaId": "5F982932-5513-411A-9CBF-3082C7ECEF0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125584:*:*:*:*:*:*", "matchCriteriaId": "0B5378E9-D011-4B12-8DEE-442F22789C08", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125585:*:*:*:*:*:*", "matchCriteriaId": "8232CBA1-55DA-4F3C-A9E5-A204A25231C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125606:*:*:*:*:*:*", "matchCriteriaId": "253569A5-4A2E-4163-88DC-C0FE6B79E06E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "A30281F3-4DE2-4ED3-91A7-AE7A091C31E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*", "matchCriteriaId": "9222E54C-0A7C-4828-9917-7CFD7EE8BC59", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127000:*:*:*:*:*:*", "matchCriteriaId": "85778DB3-87D9-4C6A-9149-C58C45913268", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127003:*:*:*:*:*:*", "matchCriteriaId": "3973EC75-A70A-475A-82BB-409992F09392", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127101:*:*:*:*:*:*", "matchCriteriaId": "14537D55-3ABE-423C-B320-6811292620AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127130:*:*:*:*:*:*", "matchCriteriaId": "FCB0BDE0-5BD3-4315-A74B-D7065ABC91BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127131:*:*:*:*:*:*", "matchCriteriaId": "3E850CF4-9078-4E43-A87C-8323536E8CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127187:*:*:*:*:*:*", "matchCriteriaId": "EC407852-45B1-47F4-A886-AF8B473A86D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCB0C7A9-5511-4AC9-B5E4-74AAE6973E34", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "BDA5DDA4-A67C-4370-B41D-02755FCF1F6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "3D99CD97-1D6B-4C67-A909-E1CE28A78E10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "70FEC14F-A53C-437C-981A-214B867142E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125115:*:*:*:*:*:*", "matchCriteriaId": "895E57EA-A8F6-425B-9D08-654E03B92B30", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "9EE0C771-B2F6-4766-82FD-203967CE37D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "0DCD6102-19F7-42D2-A81B-C85824CA351D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "3C2C0A08-66BF-4FDC-A209-769234438844", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "8DDC3649-12A9-41F3-A27D-646B5DF05E93", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125129:*:*:*:*:*:*", "matchCriteriaId": "4F037A2A-4B9A-4EBC-94E2-87502960FF20", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "B15E99A3-989F-4EFD-BA26-DEC6992BD1CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125142:*:*:*:*:*:*", "matchCriteriaId": "B85BF117-503B-435F-8667-481D9AC7A788", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125149:*:*:*:*:*:*", "matchCriteriaId": "3AC2A038-F59B-4137-B02F-4C26E2EB9152", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "F605C78F-8BE4-4E02-A7FB-CA9D24AFE7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "15557A07-E0E9-40DB-B013-0F4AD9556BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125199:*:*:*:*:*:*", "matchCriteriaId": "79082C84-9F25-4A63-86AF-18CC4ADF71CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "A88678CE-DB64-4D66-8F2A-3C60058DC5CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "88009BAC-1ECF-4BA3-855F-96C8789E476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "E64F7B54-6B09-4B7E-B2AB-5EA73FD8E0AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "2B94DFD2-374C-47A9-9D54-3FDB63197FFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "9B0330D9-1276-4228-BA7E-B9E3B828E5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "89736956-D05D-437B-BC7A-850AA459C123", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125234:*:*:*:*:*:*", "matchCriteriaId": "63B26424-7292-4F37-B86F-2A4E0AD32B85", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "2D2629FB-0A83-43CC-8C83-444036D05F7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125325:*:*:*:*:*:*", "matchCriteriaId": "4CFD99D1-CB43-437B-8E7D-6712DA5C9835", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125327:*:*:*:*:*:*", "matchCriteriaId": "6FEBA58F-E5B4-4B91-B78F-620C6EB9D3BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "F9F9D406-FE99-45C0-B1C0-4DEB5E843FE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "F4B86974-C598-4E1A-9FF0-5AF9638C1AD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125345:*:*:*:*:*:*", "matchCriteriaId": "C2838623-6F3F-417A-A644-FA226CCD8BB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125358:*:*:*:*:*:*", "matchCriteriaId": "454EDD2A-E79A-4D46-B841-BE5EC12C63D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "1557A740-D19D-4220-9B3E-395EFCB86F9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125363:*:*:*:*:*:*", "matchCriteriaId": "9C7DB404-A5C7-4EDB-BCB2-079A41E31428", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125378:*:*:*:*:*:*", "matchCriteriaId": "B738952C-DE7B-4C3D-85B9-ADBEDF007AFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125392:*:*:*:*:*:*", "matchCriteriaId": "897D140C-20FF-454D-8928-B11FFC84C016", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "18F93D7C-E8FC-4D4C-AEA0-C1187FB6D9D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125417:*:*:*:*:*:*", "matchCriteriaId": "2E799367-7DC7-478D-948A-17D717507DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125445:*:*:*:*:*:*", "matchCriteriaId": "74A5591E-75A4-4ACA-9C34-4907D645AA88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125459:*:*:*:*:*:*", "matchCriteriaId": "0C67D5FC-5965-4AC1-80A5-931BE60B5E86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125465:*:*:*:*:*:*", "matchCriteriaId": "139E25D9-A4C8-4041-ADF7-4618DFEEE8C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "6A65F3F7-45D3-49EB-9784-1F13FA2CBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125471:*:*:*:*:*:*", "matchCriteriaId": "3795D2DE-622F-4C82-B133-0993A01AC1FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125475:*:*:*:*:*:*", "matchCriteriaId": "C0DB9896-BC25-46E3-AA6F-496A442BE525", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "CE56A949-74AC-4138-8AD3-31F5763860EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "4A3DB867-FD46-46EB-AEF0-2B6E79371AF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "7881FBB4-AC09-4EB9-B02F-3EA19237E095", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "F391E432-98B8-4D97-8AD4-FB1A84FAF774", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125490:*:*:*:*:*:*", "matchCriteriaId": "61D908B2-446E-48EC-9F6B-91E8BF0F6A38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125565:*:*:*:*:*:*", "matchCriteriaId": "FD5F28B0-580E-4CD4-917A-496D35AD271A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125568:*:*:*:*:*:*", "matchCriteriaId": "F0FC96AA-F2F4-4C35-8BF7-6318A2F624A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125583:*:*:*:*:*:*", "matchCriteriaId": "6EA008F1-4E47-4753-8506-769B29AB5BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125584:*:*:*:*:*:*", "matchCriteriaId": "7ED68CDE-1096-4490-8E6B-78F4AC2BB729", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125598:*:*:*:*:*:*", "matchCriteriaId": "34F8D9B7-3BD7-44C0-A292-162928729F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125606:*:*:*:*:*:*", "matchCriteriaId": "ADFB3155-72F3-4DFA-BAE1-5725A40E6C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125612:*:*:*:*:*:*", "matchCriteriaId": "7446678C-E2DB-4EA2-BC9B-430C8EC7804B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125615:*:*:*:*:*:*", "matchCriteriaId": "33C57314-5503-48BD-9ED2-D76517C9C0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125617:*:*:*:*:*:*", "matchCriteriaId": "AC201C68-2C1D-4E75-9443-C5F853A37AB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6628EB7-96F6-48E3-8018-8F569972B811", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127000:*:*:*:*:*:*", "matchCriteriaId": "B64ADEEB-502D-4588-BD80-156124437AEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127102:*:*:*:*:*:*", "matchCriteriaId": "2306C5F3-5413-4240-BAB6-E55849063A72", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127105:*:*:*:*:*:*", "matchCriteriaId": "87F97A9E-2AB3-4121-B5A7-0AA25780D336", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127132:*:*:*:*:*:*", "matchCriteriaId": "AD049643-9546-4D39-BD26-79661205C110", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8AEEB49-1C45-4B88-81C1-A1425B7E99A2", "versionEndExcluding": "14.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14300:*:*:*:*:*:*", "matchCriteriaId": "E73FEA45-5AA3-4C49-91D3-E07A53E34515", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14301:*:*:*:*:*:*", "matchCriteriaId": "8CA65161-0C0B-45E7-BBEA-FA214DBF964B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14302:*:*:*:*:*:*", "matchCriteriaId": "9097C0CA-001B-4604-BCDB-ED28AB292CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14303:*:*:*:*:*:*", "matchCriteriaId": "C7F15A64-F15C-43E4-890A-7FEB0614C6DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:*:*:*:*:*:*:*:*", "matchCriteriaId": "378A2C19-6176-4E95-AB9C-B60A1F1A1E87", "versionEndExcluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7000:*:*:*:*:*:*", "matchCriteriaId": "1E01D48C-A95F-421E-A6FA-D299D6BE02B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7001:*:*:*:*:*:*", "matchCriteriaId": "727BD3A4-F0E1-4656-A640-B32406324707", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7002:*:*:*:*:*:*", "matchCriteriaId": "AC812003-B383-4E52-B9D3-90F4B0633C90", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7003:*:*:*:*:*:*", "matchCriteriaId": "E6BE678E-EC68-478F-A4E0-73E032C88167", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7004:*:*:*:*:*:*", "matchCriteriaId": "A5E373E7-9BB3-480F-A685-BAA7A9CD1BC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE99DDEC-EA8D-4E15-A227-30B242611078", "versionEndExcluding": "14.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14300:*:*:*:*:*:*", "matchCriteriaId": "52843587-34AD-4992-8E68-25CD02E247A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14301:*:*:*:*:*:*", "matchCriteriaId": "BC2FC98F-84FF-4C90-BD7C-20A4910BED44", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14302:*:*:*:*:*:*", "matchCriteriaId": "9794CB33-4932-4AA6-AC8C-B9FB6AE233FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14303:*:*:*:*:*:*", "matchCriteriaId": "3CC0A1C9-2F24-422A-8478-95BDCE1EBE77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14304:*:*:*:*:*:*", "matchCriteriaId": "4E541BD1-3BB8-4807-BDF8-45B0916416D4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FDF15FF-2561-4139-AC5E-4812584B1B03", "versionEndExcluding": "4.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*", "matchCriteriaId": "D5DEC045-6A7E-4041-88F8-5ABC4AB51C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*", "matchCriteriaId": "52DDE5D9-28DE-446F-A402-7BE3C33A4B35", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4302:*:*:*:*:*:*", "matchCriteriaId": "F6E1E4D8-B7F0-4BDB-B5A2-55436BEC85F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4303:*:*:*:*:*:*", "matchCriteriaId": "59675CC4-8A5C-4668-908C-0886B4B310DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4304:*:*:*:*:*:*", "matchCriteriaId": "45084336-F1DC-4E5B-A45E-506A779985D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4305:*:*:*:*:*:*", "matchCriteriaId": "1B2CC071-5BB3-4A25-88F2-DBC56B94D895", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4306:*:*:*:*:*:*", "matchCriteriaId": "E6FDF373-4711-4B72-A14E-CEB19301C40F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4307:*:*:*:*:*:*", "matchCriteriaId": "0E0F346C-0445-4D38-8583-3379962B540F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4308:*:*:*:*:*:*", "matchCriteriaId": "18B78BDC-0EAA-4781-8D62-01E47AA3BF40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4309:*:*:*:*:*:*", "matchCriteriaId": "A9EE7E99-B428-41EF-A693-7A316F695160", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "4707D700-23C4-4BBD-9683-4E6D59989127", "versionEndExcluding": "14.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14300:*:*:*:*:*:*", "matchCriteriaId": "39E8C9FE-3C1C-4E32-8BD4-14A88C49F587", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14301:*:*:*:*:*:*", "matchCriteriaId": "13A9F940-083E-451E-A330-877D67F617BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14302:*:*:*:*:*:*", "matchCriteriaId": "9FE925DF-55E6-4E7F-B5CD-F5ED097BBBC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14303:*:*:*:*:*:*", "matchCriteriaId": "0031CF5C-78FE-4CB0-97CE-087C10A77EB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:*:*:*:*:*:*:*:*", "matchCriteriaId": "1478BFC3-A0B2-415B-BA1C-AA09D9451C93", "versionEndExcluding": "5.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "41B34AA8-294A-48A9-8579-44EB7EE192F3", "versionEndExcluding": "12.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database." }, { "lang": "es", "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en varios productos ManageEngine que puede provocar la exposici\u00f3n de claves de cifrado. Un usuario de sistema operativo con pocos privilegios y acceso al host donde est\u00e1 instalado un producto ManageEngine afectado puede ver y utilizar la clave expuesta para descifrar las contrase\u00f1as de la base de datos del producto. Esto permite al usuario acceder a la base de datos del producto ManageEngine." } ], "id": "CVE-2023-6105", "lastModified": "2025-02-13T18:16:03.270", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "vulnreport@tenable.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-15T21:15:08.490", "references": [ { "source": "vulnreport@tenable.com", "url": "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html" }, { "source": "vulnreport@tenable.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2023-35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2023-35" } ], "sourceIdentifier": "vulnreport@tenable.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "vulnreport@tenable.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-09 20:15
Modified
2024-11-21 06:31
Severity ?
Summary
OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "6C0EB89D-E090-49D6-B851-B369B6B94EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", "matchCriteriaId": "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", "matchCriteriaId": "9A4C70B1-A902-4835-BFFC-692CA91C1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", "matchCriteriaId": "06FE113C-94B6-419B-8AA0-767EA74D11ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", "matchCriteriaId": "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", "matchCriteriaId": "57DA6C66-3235-4923-89D0-EF093FF4126F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", "matchCriteriaId": "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*", "matchCriteriaId": "A5289D80-1C75-4819-B615-8259B25B1E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*", "matchCriteriaId": "25CC8F8B-9072-41E3-8045-25D12EE22427", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*", "matchCriteriaId": "6000E214-BF19-469C-A7CA-CC91465B2CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*", "matchCriteriaId": "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*", "matchCriteriaId": "50E697EA-0A78-477D-B726-AC54EE868244", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*", "matchCriteriaId": "E64AAB62-43C4-4284-B2AA-1DC55B972803", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*", "matchCriteriaId": "E3A43E19-D06D-4856-AA55-02B8148EAB49", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*", "matchCriteriaId": "310C491E-92CE-4EE8-9CDE-70640DE9CAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*", "matchCriteriaId": "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*", "matchCriteriaId": "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*", "matchCriteriaId": "033944E6-8A01-4566-81C4-2B76F10C2839", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*", "matchCriteriaId": "3D969C61-1F9A-4B97-B6DA-04F84E3E2936", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*", "matchCriteriaId": "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*", "matchCriteriaId": "718427DB-57A7-4AB0-AA4C-7716E5A5F084", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*", "matchCriteriaId": "CD43B869-6A7F-461D-A870-448C91FB7A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*", "matchCriteriaId": "98DD8376-4B21-4024-878D-DB74D1FF7A2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*", "matchCriteriaId": "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*", "matchCriteriaId": "4742B198-8630-4A45-AE87-6731BF56081A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*", "matchCriteriaId": "3782ABA4-5247-4349-8CD8-BCE85B98D44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*", "matchCriteriaId": "C39E5DB9-1B75-4204-9B24-70F6294F1F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*", "matchCriteriaId": "F9459981-3E65-489C-9A70-B582EC9C8BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*", "matchCriteriaId": "BF90B539-9180-4A96-9E2F-F35DCA6DD720", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*", "matchCriteriaId": "2A6D1150-602E-4006-9F6B-10C6649AC05B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*", "matchCriteriaId": "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*", "matchCriteriaId": "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*", "matchCriteriaId": "FCFEA624-968F-4A0F-969D-2190B1269EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*", "matchCriteriaId": "64F9D21C-AC05-4629-864F-85AFA3789739", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*", "matchCriteriaId": "07E47F97-63EC-4BF1-AE54-3B510B66202D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*", "matchCriteriaId": "160765FF-9A56-4072-9580-C6DCB573B061", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*", "matchCriteriaId": "F1EE56C3-5F42-4D2C-AEC0-035078DAE445", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*", "matchCriteriaId": "16593100-F288-4013-BF48-48CA482FC62D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*", "matchCriteriaId": "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*", "matchCriteriaId": "D8052948-7F5B-4E63-B1B7-B244D6A0AC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*", "matchCriteriaId": "B6359934-CA70-4A8A-99E5-806555900EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*", "matchCriteriaId": "83BAAE61-540D-4E36-8B63-2438EC3B1479", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*", "matchCriteriaId": "008A2BF2-E18B-492F-9DFF-19618F998664", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*", "matchCriteriaId": "5023E77A-908C-41AE-ADC7-580F44ADC376", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*", "matchCriteriaId": "797D16E7-484D-4793-9040-74B815DC52B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*", "matchCriteriaId": "7D923373-B575-44C8-9B4D-DB824EC59B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*", "matchCriteriaId": "B88917EC-3ABB-475E-B374-272CE5272D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*", "matchCriteriaId": "BD457A1B-023A-42CF-ADED-648A061AAAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*", "matchCriteriaId": "9B9E22A4-676A-4D75-850F-15E5EC9A2911", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*", "matchCriteriaId": "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*", "matchCriteriaId": "95715B71-FA63-40A2-9EA6-56250318FC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*", "matchCriteriaId": "2591F23D-DB1F-44B0-B67A-13483408DE4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*", "matchCriteriaId": "E4F035FB-54A9-47C0-8896-174A742E23B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*", "matchCriteriaId": "34B52052-FBFC-4803-B999-448A9385B613", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*", "matchCriteriaId": "A1F97594-BF89-4B5D-B1CE-706708891450", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", "matchCriteriaId": "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", "matchCriteriaId": "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", "matchCriteriaId": "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", "matchCriteriaId": "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*", "matchCriteriaId": "B652092E-570C-4D4E-A133-627426C50F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*", "matchCriteriaId": "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*", "matchCriteriaId": "CD266A0D-E726-4BC7-B3B9-6E3176415188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*", "matchCriteriaId": "046B7B6F-85DE-4BDB-8860-ECA208C4D697", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*", "matchCriteriaId": "C60E51D9-A842-49FF-8793-84C074DBE5EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*", "matchCriteriaId": "753B2FC9-342B-4456-85D9-27734BE7C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*", "matchCriteriaId": "45B93007-AD6A-4978-9752-41DF72D34A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*", "matchCriteriaId": "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*", "matchCriteriaId": "AB28B644-BFD0-4588-B544-A139B26DDDE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*", "matchCriteriaId": "944F7C2F-53D4-4933-BD63-DF15C5A5CD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*", "matchCriteriaId": "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*", "matchCriteriaId": "870A721F-2991-4041-AB1D-DE3D953B8669", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*", "matchCriteriaId": "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories." }, { "lang": "es", "value": "OpUtils en Zoho ManageEngine OpManager 12.5 antes de 125490 maneja mal la autenticaci\u00f3n para algunos directorios de auditor\u00eda" } ], "id": "CVE-2021-44514", "lastModified": "2024-11-21T06:31:08.323", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-09T20:15:08.173", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-08 15:15
Modified
2024-11-21 08:29
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Summary
A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851 | Exploit, Third Party Advisory | |
talos-cna@cisco.com | https://www.manageengine.com/itom/advisory/cve-2023-47211.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/itom/advisory/cve-2023-47211.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*", "matchCriteriaId": "50FB7952-0CED-4A64-A435-D588CA661630", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127000:*:*:*:*:*:*", "matchCriteriaId": "8343B084-2009-44F2-B36C-C66719BBB1FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127101:*:*:*:*:*:*", "matchCriteriaId": "2574DD71-36A4-47AE-ABC3-D05D36FF8F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127130:*:*:*:*:*:*", "matchCriteriaId": "B9D787C9-F37B-4193-A34F-080F7410BFA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127131:*:*:*:*:*:*", "matchCriteriaId": "55FB4705-D709-42F0-A562-6C5A05E00EAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127187:*:*:*:*:*:*", "matchCriteriaId": "4503E624-DC7F-4C5E-B715-0EC4676CA1ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127244:*:*:*:*:*:*", "matchCriteriaId": "BAD9E275-CCBA-4A25-A91D-2CC9D1547B74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127257:*:*:*:*:*:*", "matchCriteriaId": "F50149D0-8105-49EE-9F0D-CFD67B0F64C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127259:*:*:*:*:*:*", "matchCriteriaId": "E0DECCD8-2E8C-4288-8CB5-10C117D83112", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*", "matchCriteriaId": "9222E54C-0A7C-4828-9917-7CFD7EE8BC59", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127000:*:*:*:*:*:*", "matchCriteriaId": "85778DB3-87D9-4C6A-9149-C58C45913268", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127003:*:*:*:*:*:*", "matchCriteriaId": "3973EC75-A70A-475A-82BB-409992F09392", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127101:*:*:*:*:*:*", "matchCriteriaId": "14537D55-3ABE-423C-B320-6811292620AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127130:*:*:*:*:*:*", "matchCriteriaId": "FCB0BDE0-5BD3-4315-A74B-D7065ABC91BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127131:*:*:*:*:*:*", "matchCriteriaId": "3E850CF4-9078-4E43-A87C-8323536E8CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127187:*:*:*:*:*:*", "matchCriteriaId": "EC407852-45B1-47F4-A886-AF8B473A86D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127244:*:*:*:*:*:*", "matchCriteriaId": "F528288A-7CC9-436C-9899-E4F343F83BCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127255:*:*:*:*:*:*", "matchCriteriaId": "2C6E7D8F-8EF4-4FEF-BE87-82CFDD22DE2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127257:*:*:*:*:*:*", "matchCriteriaId": "0BC6EA7D-E39F-4FE6-960D-BA6B85F81A9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127259:*:*:*:*:*:*", "matchCriteriaId": "BE0BFAB9-E3F3-493E-B2D3-FA9BE69C0A1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6628EB7-96F6-48E3-8018-8F569972B811", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127000:*:*:*:*:*:*", "matchCriteriaId": "B64ADEEB-502D-4588-BD80-156124437AEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127102:*:*:*:*:*:*", "matchCriteriaId": "2306C5F3-5413-4240-BAB6-E55849063A72", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127105:*:*:*:*:*:*", "matchCriteriaId": "87F97A9E-2AB3-4121-B5A7-0AA25780D336", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127132:*:*:*:*:*:*", "matchCriteriaId": "AD049643-9546-4D39-BD26-79661205C110", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127243:*:*:*:*:*:*", "matchCriteriaId": "EC810ED9-125E-41CA-B0BD-16BBF1726C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127257:*:*:*:*:*:*", "matchCriteriaId": "97B71808-B280-4BDC-819F-B80156A77CA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127259:*:*:*:*:*:*", "matchCriteriaId": "F5458B6F-1D90-4563-A783-93480FB628DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "93A02A7E-02A8-4B74-AA9F-3DA0492748EF", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127000:*:*:*:*:*:*", "matchCriteriaId": "24B04D73-0C55-49A8-B599-27C8C04948C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127001:*:*:*:*:*:*", "matchCriteriaId": "97E74846-1666-4773-910D-77E0E19A7FCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127002:*:*:*:*:*:*", "matchCriteriaId": "BB90B809-9D97-469F-B8F6-41B4AEAA2D3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127003:*:*:*:*:*:*", "matchCriteriaId": "423C8618-9F3B-4B83-902C-FF01027EC54A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127004:*:*:*:*:*:*", "matchCriteriaId": "7E974B56-7A00-4582-AF8B-0D09B94477BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127100:*:*:*:*:*:*", "matchCriteriaId": "7B6F8404-F624-41AA-BE8D-170D843EC290", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127101:*:*:*:*:*:*", "matchCriteriaId": "D0FF81E5-2134-4F45-9B39-2E3D5208BB80", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127102:*:*:*:*:*:*", "matchCriteriaId": "0D5DA95F-7C0F-4D05-BD35-DED356D01692", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127103:*:*:*:*:*:*", "matchCriteriaId": "2B3A3EC3-DF7C-41A6-884C-C7C13D41B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127104:*:*:*:*:*:*", "matchCriteriaId": "89EE3E31-8F55-4E44-8522-A32D6887AE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127109:*:*:*:*:*:*", "matchCriteriaId": "979ED7B4-FAE3-4E98-A303-290E498FFD81", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127116:*:*:*:*:*:*", "matchCriteriaId": "EDC62E2F-AB97-4008-A52B-9CDC341A06BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127117:*:*:*:*:*:*", "matchCriteriaId": "93DF7023-22AE-4A84-8734-06239013C10C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127118:*:*:*:*:*:*", "matchCriteriaId": "2A128BED-75FA-42F1-9171-CBAEAA2366A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127119:*:*:*:*:*:*", "matchCriteriaId": "5298BB50-8E22-490A-87C7-7F40B7F8F7C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127120:*:*:*:*:*:*", "matchCriteriaId": "39C34F02-E413-4067-B958-86ADF89FA3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127122:*:*:*:*:*:*", "matchCriteriaId": "A0673E69-A2DB-424C-BBF0-79D729230F1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127123:*:*:*:*:*:*", "matchCriteriaId": "4F062A20-6FFE-479B-9E64-E4771490B041", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127131:*:*:*:*:*:*", "matchCriteriaId": "C598244E-7483-4762-AC27-BD8036FEFE5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127133:*:*:*:*:*:*", "matchCriteriaId": "B188A792-EF1A-4292-BD91-47635706C430", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127134:*:*:*:*:*:*", "matchCriteriaId": "BEFACD7A-D81B-4EDC-9E38-FD93FA0DE456", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127136:*:*:*:*:*:*", "matchCriteriaId": "DF818138-079A-43BE-A8B5-5DA47FA443AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127138:*:*:*:*:*:*", "matchCriteriaId": "27066A8F-75C4-42BF-A54B-543114B92995", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127140:*:*:*:*:*:*", "matchCriteriaId": "A239C6F8-3FC0-4510-B33F-14B25908E68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127141:*:*:*:*:*:*", "matchCriteriaId": "E8399E84-1344-4472-91F3-F63255911876", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127185:*:*:*:*:*:*", "matchCriteriaId": "8888C77E-04A7-4C34-B497-504F6217E07B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127186:*:*:*:*:*:*", "matchCriteriaId": "7502D92A-3B51-4A76-88D6-E2D76A584075", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127187:*:*:*:*:*:*", "matchCriteriaId": "7E465A5F-C8B0-4AD0-8D6D-4823C5F8153D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127188:*:*:*:*:*:*", "matchCriteriaId": "DBA622D6-CD85-4F0F-8CC3-39FE29754039", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127189:*:*:*:*:*:*", "matchCriteriaId": "A0D2828B-B897-4F1D-B657-436DB3CAC2FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127191:*:*:*:*:*:*", "matchCriteriaId": "98279B6E-8361-45CA-8912-F06972F4BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127240:*:*:*:*:*:*", "matchCriteriaId": "A7D879C8-E89F-45C1-9609-80B737080AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127241:*:*:*:*:*:*", "matchCriteriaId": "3D8FD2DE-18D9-4F50-9256-672435059876", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127242:*:*:*:*:*:*", "matchCriteriaId": "F01FEA58-BE5B-4CEC-831D-3BF05A20688D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127243:*:*:*:*:*:*", "matchCriteriaId": "FFD06A39-E943-41B5-B00B-168A6D919C80", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127255:*:*:*:*:*:*", "matchCriteriaId": "49469309-8B9B-4BF1-B80A-226F975FC47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127256:*:*:*:*:*:*", "matchCriteriaId": "C429A23E-3DC0-453F-AAF7-F3237C9C6B6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127257:*:*:*:*:*:*", "matchCriteriaId": "1E3B72F3-2128-4AF1-A9A3-969D9738A24B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127258:*:*:*:*:*:*", "matchCriteriaId": "62C3AE7F-3F84-4C59-BBF8-2E82FAFF7E15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127259:*:*:*:*:*:*", "matchCriteriaId": "A559F75B-FB71-4926-89FC-AC2718F0273C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4FB8882-46AE-485B-82B5-67BF22DDC12C", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127109:*:*:*:*:*:*", "matchCriteriaId": "265DB862-1B39-4B16-9AD9-D8D8190D08D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127122:*:*:*:*:*:*", "matchCriteriaId": "5F476D22-0FA8-4128-833F-2F1E3D15615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127123:*:*:*:*:*:*", "matchCriteriaId": "A627EFBE-A429-42B8-A461-A7E1CDBBF796", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127138:*:*:*:*:*:*", "matchCriteriaId": "622CDD01-6655-4786-AFB0-C1C2F5D5E0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127139:*:*:*:*:*:*", "matchCriteriaId": "BDCDF5A9-ACA3-40CE-B163-F8AA7C028A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127140:*:*:*:*:*:*", "matchCriteriaId": "5AA4A73B-B9E4-4B69-973E-A2F713037E4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127141:*:*:*:*:*:*", "matchCriteriaId": "DA91290A-E4E0-412D-B5B7-C220B0F3087B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127142:*:*:*:*:*:*", "matchCriteriaId": "0DCF4289-B176-4AEA-8860-9C81F15BFFB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.7:build127259:*:*:*:*:*:*", "matchCriteriaId": "1CA0315F-27AE-4A5A-A05A-33A876B9C314", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7201B73-EB6C-4233-A8BF-CA5EE2DF6C73", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127109:*:*:*:*:*:*", "matchCriteriaId": "5AF53EDA-45A9-424F-937A-44C7FF7299F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127122:*:*:*:*:*:*", "matchCriteriaId": "C70F7D66-975A-4341-97E7-E6ED80A9F314", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127123:*:*:*:*:*:*", "matchCriteriaId": "43D72341-8C61-4D07-BBFE-D611B41A511C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127138:*:*:*:*:*:*", "matchCriteriaId": "9BC8DCA0-FFC1-4487-8452-E6ED8A9C5A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127139:*:*:*:*:*:*", "matchCriteriaId": "5FEDB823-5D06-4C65-9042-D99982395892", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127140:*:*:*:*:*:*", "matchCriteriaId": "18EF9B8C-F8DD-455E-BE93-80EB83374084", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127141:*:*:*:*:*:*", "matchCriteriaId": "89575D64-5969-4C11-8AC1-B48CA97A0558", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127142:*:*:*:*:*:*", "matchCriteriaId": "E115A1C7-23CF-4E61-BC85-8B0884CE5BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.7:build127259:*:*:*:*:*:*", "matchCriteriaId": "258C790F-F7FE-4071-BAC2-45AB3D2212FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A1DA3A9-36FB-4BCA-AEEC-231A2C3127D0", "versionEndExcluding": "12.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127101:*:*:*:*:*:*", "matchCriteriaId": "0BA30C26-D3D8-447C-BD7A-9BC166C8BF3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127117:*:*:*:*:*:*", "matchCriteriaId": "162E0203-17E1-427E-A351-33F75E8FE5A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127134:*:*:*:*:*:*", "matchCriteriaId": "61FB54BF-7A8F-4EE5-AF42-15E2B69E9DE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127241:*:*:*:*:*:*", "matchCriteriaId": "764139C9-FF6A-4BE0-BAF3-52F403C41393", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127242:*:*:*:*:*:*", "matchCriteriaId": "3D9805F6-1A56-4FBF-8F47-DAA80E4DE9FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127258:*:*:*:*:*:*", "matchCriteriaId": "0458F47B-0456-4005-9AB8-8183C3D1EBAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127259:*:*:*:*:*:*", "matchCriteriaId": "266773C9-96A6-4588-A781-AE1C34B247D4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability." }, { "lang": "es", "value": "Existe una vulnerabilidad de directory traversal en la funcionalidad uploadMib de ManageEngine OpManager 12.7.258. Una solicitud HTTP especialmente manipulada puede dar lugar a la creaci\u00f3n de archivos arbitrarios. Un atacante puede enviar un archivo MiB malicioso para desencadenar esta vulnerabilidad." } ], "id": "CVE-2023-47211", "lastModified": "2024-11-21T08:29:57.783", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 5.3, "source": "talos-cna@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-08T15:15:25.287", "references": [ { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851" }, { "source": "talos-cna@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "talos-cna@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2022-36923
Vulnerability from cvelistv5
Published
2022-08-10 14:17
Modified
2024-08-03 10:14
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user's API key, and then access external APIs.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/itom/advisory/cve-2022-36923.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:14:29.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user\u0027s API key, and then access external APIs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-10T14:17:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-36923", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user\u0027s API key, and then access external APIs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html", "refsource": "MISC", "url": "https://www.manageengine.com/itom/advisory/cve-2022-36923.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-36923", "datePublished": "2022-08-10T14:17:09", "dateReserved": "2022-07-27T00:00:00", "dateUpdated": "2024-08-03T10:14:29.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-6035
Vulnerability from cvelistv5
Published
2014-12-04 17:00
Modified
2024-08-06 12:03
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in the FileCollector servlet in ZOHO ManageEngine OpManager 11.4, 11.3, and earlier allows remote attackers to write and execute arbitrary files via a .. (dot dot) in the FILENAME parameter.
References
▼ | URL | Tags |
---|---|---|
https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix | x_refsource_CONFIRM | |
https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2014/Sep/110 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:03:02.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the FileCollector servlet in ZOHO ManageEngine OpManager 11.4, 11.3, and earlier allows remote attackers to write and execute arbitrary files via a .. (dot dot) in the FILENAME parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-12-04T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "tags": [ "x_refsource_MISC" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the FileCollector servlet in ZOHO ManageEngine OpManager 11.4, 11.3, and earlier allows remote attackers to write and execute arbitrary files via a .. (dot dot) in the FILENAME parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix", "refsource": "CONFIRM", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt", "refsource": "MISC", "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Sep/110" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-6035", "datePublished": "2014-12-04T17:00:00", "dateReserved": "2014-09-01T00:00:00", "dateUpdated": "2024-08-06T12:03:02.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-13818
Vulnerability from cvelistv5
Published
2020-06-04 12:51
Modified
2024-08-04 12:25
Severity ?
EPSS score ?
Summary
In Zoho ManageEngine OpManager before 125144, when <cachestart> is used, directory traversal validation can be bypassed.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me-complete.html | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-691/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:25:16.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Zoho ManageEngine OpManager before 125144, when \u003ccachestart\u003e is used, directory traversal validation can be bypassed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-09T15:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13818", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Zoho ManageEngine OpManager before 125144, when \u003ccachestart\u003e is used, directory traversal validation can be bypassed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-691/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13818", "datePublished": "2020-06-04T12:51:17", "dateReserved": "2020-06-04T00:00:00", "dateUpdated": "2024-08-04T12:25:16.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11527
Vulnerability from cvelistv5
Published
2020-04-04 16:26
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:12.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-04T16:26:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11527", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#124181" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11527", "datePublished": "2020-04-04T16:26:25", "dateReserved": "2020-04-04T00:00:00", "dateUpdated": "2024-08-04T11:35:12.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-6036
Vulnerability from cvelistv5
Published
2014-12-04 17:00
Modified
2024-08-06 12:03
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in the multipartRequest servlet in ZOHO ManageEngine OpManager 11.3 and earlier, Social IT Plus 11.0, and IT360 10.3, 10.4, and earlier allows remote attackers or remote authenticated users to delete arbitrary files via a .. (dot dot) in the fileName parameter.
References
▼ | URL | Tags |
---|---|---|
https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix | x_refsource_CONFIRM | |
https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2014/Sep/110 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:03:02.352Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the multipartRequest servlet in ZOHO ManageEngine OpManager 11.3 and earlier, Social IT Plus 11.0, and IT360 10.3, 10.4, and earlier allows remote attackers or remote authenticated users to delete arbitrary files via a .. (dot dot) in the fileName parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-12-04T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "tags": [ "x_refsource_MISC" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6036", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the multipartRequest servlet in ZOHO ManageEngine OpManager 11.3 and earlier, Social IT Plus 11.0, and IT360 10.3, 10.4, and earlier allows remote attackers or remote authenticated users to delete arbitrary files via a .. (dot dot) in the fileName parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix", "refsource": "CONFIRM", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt", "refsource": "MISC", "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Sep/110" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-6036", "datePublished": "2014-12-04T17:00:00", "dateReserved": "2014-09-01T00:00:00", "dateUpdated": "2024-08-06T12:03:02.352Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7863
Vulnerability from cvelistv5
Published
2020-02-08 16:57
Modified
2024-08-06 13:03
Severity ?
EPSS score ?
Summary
The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:03:27.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/114" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-08T16:57:37", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/114" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7863", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html" }, { "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt", "refsource": "MISC", "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt" }, { "name": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded" }, { "name": "http://seclists.org/fulldisclosure/2015/Jan/114", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2015/Jan/114" }, { "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet", "refsource": "MISC", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100554" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7863", "datePublished": "2020-02-08T16:57:37", "dateReserved": "2014-10-05T00:00:00", "dateUpdated": "2024-08-06T13:03:27.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29535
Vulnerability from cvelistv5
Published
2022-05-05 22:17
Modified
2024-08-03 06:26
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OPManager through 125588 allows SQL Injection via a few default reports.
References
▼ | URL | Tags |
---|---|---|
https://manageengine.com | x_refsource_MISC | |
https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:26:06.231Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://manageengine.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OPManager through 125588 allows SQL Injection via a few default reports." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T22:17:40", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://manageengine.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-29535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OPManager through 125588 allows SQL Injection via a few default reports." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://manageengine.com", "refsource": "MISC", "url": "https://manageengine.com" }, { "name": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29535", "datePublished": "2022-05-05T22:17:40", "dateReserved": "2022-04-20T00:00:00", "dateUpdated": "2024-08-03T06:26:06.231Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18475
Vulnerability from cvelistv5
Published
2018-10-23 21:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2018/Oct/42 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html" }, { "name": "20181019 Zoho ManageEngine OpManager 12.3 allows Unrestricted Arbitrary File Upload", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Oct/42" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-10-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-23T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html" }, { "name": "20181019 Zoho ManageEngine OpManager 12.3 allows Unrestricted Arbitrary File Upload", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Oct/42" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-18475", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html" }, { "name": "20181019 Zoho ManageEngine OpManager 12.3 allows Unrestricted Arbitrary File Upload", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Oct/42" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-18475", "datePublished": "2018-10-23T21:00:00", "dateReserved": "2018-10-18T00:00:00", "dateUpdated": "2024-08-05T11:08:21.821Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-6034
Vulnerability from cvelistv5
Published
2014-12-04 17:00
Modified
2024-08-06 12:03
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter.
References
▼ | URL | Tags |
---|---|---|
https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix | x_refsource_CONFIRM | |
https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2014/Sep/110 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:03:02.341Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-12-04T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "tags": [ "x_refsource_MISC" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Sep/110" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix", "refsource": "CONFIRM", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix" }, { "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt", "refsource": "MISC", "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20140927 [The ManageOwnage Series, part V]: RCE / file upload / arbitrary file deletion in OpManager, Social IT and IT360", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Sep/110" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-6034", "datePublished": "2014-12-04T17:00:00", "dateReserved": "2014-09-01T00:00:00", "dateUpdated": "2024-08-06T12:03:02.341Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-35404
Vulnerability from cvelistv5
Published
2022-07-18 12:25
Modified
2024-08-03 09:36
Severity ?
EPSS score ?
Summary
ManageEngine Password Manager Pro 12100 and prior and OPManager 126100 and prior are vulnerable to unauthorized file and directory creation on a server machine.
References
▼ | URL | Tags |
---|---|---|
https://manageengine.com | x_refsource_MISC | |
https://www.manageengine.com/itom/advisory/cve-2022-35404.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:36:44.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://manageengine.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "ManageEngine Password Manager Pro 12100 and prior and OPManager 126100 and prior are vulnerable to unauthorized file and directory creation on a server machine." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-18T12:25:32", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://manageengine.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-35404", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ManageEngine Password Manager Pro 12100 and prior and OPManager 126100 and prior are vulnerable to unauthorized file and directory creation on a server machine." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://manageengine.com", "refsource": "MISC", "url": "https://manageengine.com" }, { "name": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html", "refsource": "MISC", "url": "https://www.manageengine.com/itom/advisory/cve-2022-35404.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-35404", "datePublished": "2022-07-18T12:25:32", "dateReserved": "2022-07-08T00:00:00", "dateUpdated": "2024-08-03T09:36:44.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41075
Vulnerability from cvelistv5
Published
2021-10-13 22:12
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T22:12:29", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41075", "datePublished": "2021-10-13T22:12:29", "dateReserved": "2021-09-14T00:00:00", "dateUpdated": "2024-08-04T02:59:31.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11946
Vulnerability from cvelistv5
Published
2020-04-20 20:18
Modified
2024-08-04 11:42
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager before 125120 allows an unauthenticated user to retrieve an API key via a servlet call.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me-complete.html | x_refsource_MISC | |
https://cwe.mitre.org/data/definitions/306.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:42:00.822Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwe.mitre.org/data/definitions/306.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 125120 allows an unauthenticated user to retrieve an API key via a servlet call." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-10T20:15:54", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cwe.mitre.org/data/definitions/306.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11946", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager before 125120 allows an unauthenticated user to retrieve an API key via a servlet call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "name": "https://cwe.mitre.org/data/definitions/306.html", "refsource": "MISC", "url": "https://cwe.mitre.org/data/definitions/306.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11946", "datePublished": "2020-04-20T20:18:32", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-04T11:42:00.822Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27908
Vulnerability from cvelistv5
Published
2022-04-18 12:17
Modified
2024-08-03 05:41
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager before 125588 (and before 125603) is vulnerable to authenticated SQL Injection in the Inventory Reports module.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:41:10.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 125588 (and before 125603) is vulnerable to authenticated SQL Injection in the Inventory Reports module." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T12:17:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-27908", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager before 125588 (and before 125603) is vulnerable to authenticated SQL Injection in the Inventory Reports module." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2022-27908.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-27908", "datePublished": "2022-04-18T12:17:13", "dateReserved": "2022-03-25T00:00:00", "dateUpdated": "2024-08-03T05:41:10.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-20339
Vulnerability from cvelistv5
Published
2018-12-21 09:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/106302 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:18.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "106302", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106302" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-26T10:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "106302", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106302" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20339", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "106302", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106302" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20339", "datePublished": "2018-12-21T09:00:00", "dateReserved": "2018-12-21T00:00:00", "dateUpdated": "2024-08-05T11:58:18.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11560
Vulnerability from cvelistv5
Published
2019-05-23 17:07
Modified
2024-08-05 18:12
Severity ?
EPSS score ?
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application.
References
▼ | URL | Tags |
---|---|---|
http://manageengine.com | x_refsource_MISC | |
http://opmanager.com | x_refsource_MISC | |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:12:40.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://manageengine.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://opmanager.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T17:07:27", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://manageengine.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://opmanager.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11560", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. By adding a Google Map to the application, an authenticated user can upload an HTML file. This HTML file is then rendered in various locations of the application. JavaScript inside the uploaded HTML is also interpreted by the application. Thus, an attacker can inject a malicious JavaScript payload inside the HTML file and upload it to the application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://manageengine.com", "refsource": "MISC", "url": "http://manageengine.com" }, { "name": "http://opmanager.com", "refsource": "MISC", "url": "http://opmanager.com" }, { "name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736", "refsource": "MISC", "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11560", "datePublished": "2019-05-23T17:07:27", "dateReserved": "2017-07-22T00:00:00", "dateUpdated": "2024-08-05T18:12:40.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31099
Vulnerability from cvelistv5
Published
2023-05-04 00:00
Modified
2025-01-29 19:17
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:45:25.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://manageengine.com" }, { "tags": [ "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-31099", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-29T19:16:34.882386Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-29T19:17:32.323Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-04T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://manageengine.com" }, { "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-31099", "datePublished": "2023-05-04T00:00:00.000Z", "dateReserved": "2023-04-24T00:00:00.000Z", "dateUpdated": "2025-01-29T19:17:32.323Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12116
Vulnerability from cvelistv5
Published
2020-05-07 19:13
Modified
2024-08-04 11:48
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me-complete.html | x_refsource_MISC | |
https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:58.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-07T19:13:53", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-12116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" }, { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125125" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-12116", "datePublished": "2020-05-07T19:13:32", "dateReserved": "2020-04-23T00:00:00", "dateUpdated": "2024-08-04T11:48:58.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38772
Vulnerability from cvelistv5
Published
2022-08-29 20:21
Modified
2024-08-03 11:02
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature.
References
▼ | URL | Tags |
---|---|---|
https://manageengine.com | x_refsource_MISC | |
https://www.manageengine.com/itom/advisory/cve-2022-38772.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:02:14.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://manageengine.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-29T20:21:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://manageengine.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-38772", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://manageengine.com", "refsource": "MISC", "url": "https://manageengine.com" }, { "name": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html", "refsource": "MISC", "url": "https://www.manageengine.com/itom/advisory/cve-2022-38772.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-38772", "datePublished": "2022-08-29T20:21:57", "dateReserved": "2022-08-25T00:00:00", "dateUpdated": "2024-08-03T11:02:14.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18980
Vulnerability from cvelistv5
Published
2018-11-06 04:00
Modified
2024-09-16 17:54
Severity ?
EPSS score ?
Summary
An XML External Entity injection (XXE) vulnerability exists in Zoho ManageEngine Network Configuration Manager and OpManager before 12.3.214 via the RequestXML parameter in a /devices/ProcessRequest.do GET request. For example, the attacker can trigger the transmission of local files to an arbitrary remote FTP server.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me.html | x_refsource_MISC | |
https://github.com/x-f1v3/ForCve/issues/5 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:23:08.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/x-f1v3/ForCve/issues/5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An XML External Entity injection (XXE) vulnerability exists in Zoho ManageEngine Network Configuration Manager and OpManager before 12.3.214 via the RequestXML parameter in a /devices/ProcessRequest.do GET request. For example, the attacker can trigger the transmission of local files to an arbitrary remote FTP server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-06T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/x-f1v3/ForCve/issues/5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-18980", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XML External Entity injection (XXE) vulnerability exists in Zoho ManageEngine Network Configuration Manager and OpManager before 12.3.214 via the RequestXML parameter in a /devices/ProcessRequest.do GET request. For example, the attacker can trigger the transmission of local files to an arbitrary remote FTP server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "https://github.com/x-f1v3/ForCve/issues/5", "refsource": "MISC", "url": "https://github.com/x-f1v3/ForCve/issues/5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-18980", "datePublished": "2018-11-06T04:00:00Z", "dateReserved": "2018-11-05T00:00:00Z", "dateUpdated": "2024-09-16T17:54:36.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-9107
Vulnerability from cvelistv5
Published
2017-08-04 00:00
Modified
2024-08-06 08:36
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn't use a per-system key or even a salt; therefore, it's possible to create a universal decryptor.
References
▼ | URL | Tags |
---|---|---|
https://github.com/theguly/DecryptOpManager | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:36:31.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/theguly/DecryptOpManager" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn\u0027t use a per-system key or even a salt; therefore, it\u0027s possible to create a universal decryptor." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-04T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/theguly/DecryptOpManager" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-9107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn\u0027t use a per-system key or even a salt; therefore, it\u0027s possible to create a universal decryptor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/theguly/DecryptOpManager", "refsource": "MISC", "url": "https://github.com/theguly/DecryptOpManager" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-9107", "datePublished": "2017-08-04T00:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-06T08:36:31.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40493
Vulnerability from cvelistv5
Published
2021-10-13 22:07
Modified
2024-08-04 02:44
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:44:10.865Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T22:07:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-40493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-40493", "datePublished": "2021-10-13T22:07:34", "dateReserved": "2021-09-03T00:00:00", "dateUpdated": "2024-08-04T02:44:10.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18949
Vulnerability from cvelistv5
Published
2018-11-05 09:00
Modified
2024-09-16 17:09
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:23:08.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-05T09:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-18949", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-18949", "datePublished": "2018-11-05T09:00:00Z", "dateReserved": "2018-11-05T00:00:00Z", "dateUpdated": "2024-09-16T17:09:10.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12998
Vulnerability from cvelistv5
Published
2018-06-29 12:00
Modified
2024-08-05 08:52
Severity ?
EPSS score ?
Summary
A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html | x_refsource_MISC | |
https://github.com/unh3x/just4cve/issues/10 | x_refsource_MISC | |
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2018/Jul/75 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:52:49.220Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/unh3x/just4cve/issues/10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036" }, { "name": "20180720 [CVE-2018-12998]Zoho manageengine Reflected XSS in multiple Products", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Jul/75" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-06-29T00:00:00", "descriptions": [ { "lang": "en", "value": "A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter \u0027operation\u0027 to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-24T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/unh3x/just4cve/issues/10" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036" }, { "name": "20180720 [CVE-2018-12998]Zoho manageengine Reflected XSS in multiple Products", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Jul/75" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-12998", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter \u0027operation\u0027 to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html" }, { "name": "https://github.com/unh3x/just4cve/issues/10", "refsource": "MISC", "url": "https://github.com/unh3x/just4cve/issues/10" }, { "name": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036", "refsource": "MISC", "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-036" }, { "name": "20180720 [CVE-2018-12998]Zoho manageengine Reflected XSS in multiple Products", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Jul/75" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-12998", "datePublished": "2018-06-29T12:00:00", "dateReserved": "2018-06-29T00:00:00", "dateUpdated": "2024-08-05T08:52:49.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47211
Vulnerability from cvelistv5
Published
2024-01-08 14:45
Modified
2024-08-02 21:01
Severity ?
EPSS score ?
Summary
A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ManageEngine | OpManager |
Version: 12.7.258 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:01:22.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851", "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851" }, { "name": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html", "tags": [ "x_transferred" ], "url": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpManager", "vendor": "ManageEngine", "versions": [ { "status": "affected", "version": "12.7.258" } ] } ], "credits": [ { "lang": "en", "value": "Discovered by Marcin \u0026#39;Icewall\u0026#39; Noga of Cisco Talos." } ], "descriptions": [ { "lang": "en", "value": "A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-08T18:00:25.765Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851" }, { "name": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html", "url": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2023-47211", "datePublished": "2024-01-08T14:45:37.183Z", "dateReserved": "2023-11-07T15:35:52.521Z", "dateUpdated": "2024-08-02T21:01:22.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18262
Vulnerability from cvelistv5
Published
2018-10-17 14:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 12.3 before build 123214 has XSS.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2018/Oct/34 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20181016 Vulnerability Disclose", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Oct/34" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-10-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before build 123214 has XSS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20181016 Vulnerability Disclose", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Oct/34" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-18262", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 12.3 before build 123214 has XSS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20181016 Vulnerability Disclose", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Oct/34" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-18262", "datePublished": "2018-10-17T14:00:00", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-08-05T11:08:21.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7868
Vulnerability from cvelistv5
Published
2014-12-04 17:00
Modified
2024-08-06 13:03
Severity ?
EPSS score ?
Summary
Multiple SQL injection vulnerabilities in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the (1) OPM_BVNAME parameter in a Delete operation to the APMBVHandler servlet or (2) query parameter in a compare operation to the DataComparisonServlet servlet.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/71002 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2014/Nov/21 | mailing-list, x_refsource_FULLDISC | |
https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/533946/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:03:27.444Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "71002", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71002" }, { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/21" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the (1) OPM_BVNAME parameter in a Delete operation to the APMBVHandler servlet or (2) query parameter in a compare operation to the DataComparisonServlet servlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "71002", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71002" }, { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/21" }, { "tags": [ "x_refsource_MISC" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7868", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the (1) OPM_BVNAME parameter in a Delete operation to the APMBVHandler servlet or (2) query parameter in a compare operation to the DataComparisonServlet servlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "71002", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71002" }, { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Nov/21" }, { "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt", "refsource": "MISC", "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded" }, { "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix", "refsource": "CONFIRM", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix" }, { "name": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7868", "datePublished": "2014-12-04T17:00:00", "dateReserved": "2014-10-05T00:00:00", "dateUpdated": "2024-08-06T13:03:27.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17421
Vulnerability from cvelistv5
Published
2019-11-21 14:36
Modified
2024-08-05 01:40
Severity ?
EPSS score ?
Summary
Incorrect file permissions on the packaged Nipper executable file in Zoho ManageEngine OpManager 12.4.072 and Firewall Analyzer 12.4.072 allow local users to elevate privileges to root by overwriting this file with a malicious payload.
References
▼ | URL | Tags |
---|---|---|
https://twitter.com/va_start | x_refsource_MISC | |
https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html | x_refsource_MISC | |
https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:40:15.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/va_start" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect file permissions on the packaged Nipper executable file in Zoho ManageEngine OpManager 12.4.072 and Firewall Analyzer 12.4.072 allow local users to elevate privileges to root by overwriting this file with a malicious payload." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-29T18:40:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/va_start" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-17421", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect file permissions on the packaged Nipper executable file in Zoho ManageEngine OpManager 12.4.072 and Firewall Analyzer 12.4.072 allow local users to elevate privileges to root by overwriting this file with a malicious payload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://twitter.com/va_start", "refsource": "MISC", "url": "https://twitter.com/va_start" }, { "name": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html", "refsource": "MISC", "url": "https://blog.vastart.dev/2019/11/cve-2019-17421-privilege-escalation.html" }, { "name": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html", "refsource": "CONFIRM", "url": "https://www.manageengine.com/products/firewall/security-updates/cve-2019-17421.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-17421", "datePublished": "2019-11-21T14:36:02", "dateReserved": "2019-10-09T00:00:00", "dateUpdated": "2024-08-05T01:40:15.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18715
Vulnerability from cvelistv5
Published
2018-11-20 19:00
Modified
2024-08-05 11:16
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS.
References
▼ | URL | Tags |
---|---|---|
https://seclists.org/bugtraq/2018/Oct/60 | mailing-list, x_refsource_BUGTRAQ | |
http://seclists.org/fulldisclosure/2018/Nov/3 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:16:00.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Stored XSS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2018/Oct/60" }, { "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Stored XSS", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Nov/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-20T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Stored XSS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2018/Oct/60" }, { "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Stored XSS", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Nov/3" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-18715", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Stored XSS", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2018/Oct/60" }, { "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Stored XSS", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Nov/3" }, { "name": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-18715", "datePublished": "2018-11-20T19:00:00", "dateReserved": "2018-10-27T00:00:00", "dateUpdated": "2024-08-05T11:16:00.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15106
Vulnerability from cvelistv5
Published
2019-08-16 02:44
Modified
2024-08-05 00:34
Severity ?
EPSS score ?
Summary
An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/47229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The \"username+\u0027@opm\u0027 string is used for the password. For example, if the username is admin, the password is admin@opm." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-27T21:06:58", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.exploit-db.com/exploits/47229" }, { "tags": [ "x_refsource_MISC" ], "url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15106", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The \"username+\u0027@opm\u0027 string is used for the password. For example, if the username is admin, the password is admin@opm." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.exploit-db.com/exploits/47229", "refsource": "MISC", "url": "https://www.exploit-db.com/exploits/47229" }, { "name": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html", "refsource": "MISC", "url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html" }, { "name": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html", "refsource": "CONFIRM", "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html" }, { "name": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html", "refsource": "CONFIRM", "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15106", "datePublished": "2019-08-16T02:44:19", "dateReserved": "2019-08-15T00:00:00", "dateUpdated": "2024-08-05T00:34:53.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-19921
Vulnerability from cvelistv5
Published
2018-12-06 22:00
Modified
2024-09-16 21:09
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:51:17.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-06T22:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19921", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-19921", "datePublished": "2018-12-06T22:00:00Z", "dateReserved": "2018-12-06T00:00:00Z", "dateUpdated": "2024-09-16T21:09:00.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7765
Vulnerability from cvelistv5
Published
2015-10-09 14:00
Modified
2024-09-17 02:46
Severity ?
EPSS score ?
Summary
ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of "plugin" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password.
References
▼ | URL | Tags |
---|---|---|
https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability | x_refsource_CONFIRM | |
http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Sep/66 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html | x_refsource_MISC | |
https://www.exploit-db.com/exploits/38221/ | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:59:00.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" }, { "name": "20150915 ManageEngine OpManager multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/66" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" }, { "name": "38221", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/38221/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of \"plugin\" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-10-09T14:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" }, { "name": "20150915 ManageEngine OpManager multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/66" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" }, { "name": "38221", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/38221/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7765", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of \"plugin\" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability", "refsource": "CONFIRM", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability" }, { "name": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" }, { "name": "20150915 ManageEngine OpManager multiple vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/66" }, { "name": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" }, { "name": "38221", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/38221/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7765", "datePublished": "2015-10-09T14:00:00Z", "dateReserved": "2015-10-09T00:00:00Z", "dateUpdated": "2024-09-17T02:46:53.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7864
Vulnerability from cvelistv5
Published
2015-02-04 16:00
Modified
2024-08-06 13:03
Severity ?
EPSS score ?
Summary
Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/100555 | vdb-entry, x_refsource_XF | |
http://seclists.org/fulldisclosure/2015/Jan/114 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html | x_refsource_MISC | |
https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/534575/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:03:27.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "manageengine-cve20147864-sql-injection(100555)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555" }, { "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/114" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet" }, { "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "manageengine-cve20147864-sql-injection(100555)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555" }, { "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/114" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet" }, { "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7864", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "manageengine-cve20147864-sql-injection(100555)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555" }, { "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jan/114" }, { "name": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html" }, { "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet", "refsource": "CONFIRM", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet" }, { "name": "20150128 [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded" }, { "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt", "refsource": "MISC", "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7864", "datePublished": "2015-02-04T16:00:00", "dateReserved": "2014-10-05T00:00:00", "dateUpdated": "2024-08-06T13:03:27.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7766
Vulnerability from cvelistv5
Published
2015-10-09 14:00
Modified
2024-09-17 01:10
Severity ?
EPSS score ?
Summary
PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."
References
▼ | URL | Tags |
---|---|---|
https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability | x_refsource_CONFIRM | |
http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Sep/66 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html | x_refsource_MISC | |
https://www.exploit-db.com/exploits/38221/ | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:59:00.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" }, { "name": "20150915 ManageEngine OpManager multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/66" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" }, { "name": "38221", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/38221/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by \"INSERT/**/INTO.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-10-09T14:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" }, { "name": "20150915 ManageEngine OpManager multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/66" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" }, { "name": "38221", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/38221/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7766", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by \"INSERT/**/INTO.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability", "refsource": "CONFIRM", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability" }, { "name": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce" }, { "name": "20150915 ManageEngine OpManager multiple vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/66" }, { "name": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html" }, { "name": "38221", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/38221/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7766", "datePublished": "2015-10-09T14:00:00Z", "dateReserved": "2015-10-09T00:00:00Z", "dateUpdated": "2024-09-17T01:10:42.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-19288
Vulnerability from cvelistv5
Published
2018-11-15 06:00
Modified
2024-08-05 11:30
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/105960 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:30:04.043Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "105960", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105960" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-20T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "105960", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105960" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19288", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "105960", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105960" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-19288", "datePublished": "2018-11-15T06:00:00", "dateReserved": "2018-11-15T00:00:00", "dateUpdated": "2024-08-05T11:30:04.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10541
Vulnerability from cvelistv5
Published
2020-03-13 05:34
Modified
2024-08-04 11:06
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:06:09.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-13T05:34:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10541", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125108" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10541", "datePublished": "2020-03-13T05:34:26", "dateReserved": "2020-03-13T00:00:00", "dateUpdated": "2024-08-04T11:06:09.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6105
Vulnerability from cvelistv5
Published
2023-11-15 20:57
Modified
2025-02-13 17:26
Severity ?
EPSS score ?
Summary
An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ManageEngine | Service Desk Plus |
Version: 0 < 14304 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:21:17.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2023-35" }, { "tags": [ "x_transferred" ], "url": "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Service Desk Plus", "vendor": "ManageEngine", "versions": [ { "lessThan": "14304", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Asset Explorer", "vendor": "ManageEngine", "versions": [ { "lessThan": "7004", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Access Manager Plus", "vendor": "ManageEngine", "versions": [ { "lessThan": "14304", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.\u003cbr\u003e" } ], "value": "An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database." } ], "impacts": [ { "capecId": "CAPEC-176", "descriptions": [ { "lang": "en", "value": "CAPEC-176 Configuration/Environment Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-26T19:58:04.015Z", "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "shortName": "tenable" }, "references": [ { "url": "https://www.tenable.com/security/research/tra-2023-35" }, { "url": "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "ManageEngine Information Disclosure in Multiple Products", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "assignerShortName": "tenable", "cveId": "CVE-2023-6105", "datePublished": "2023-11-15T20:57:47.981Z", "dateReserved": "2023-11-13T15:10:28.339Z", "dateUpdated": "2025-02-13T17:26:03.759Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11561
Vulnerability from cvelistv5
Published
2019-05-23 15:32
Modified
2024-08-05 18:12
Severity ?
EPSS score ?
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the "Group Chat" or "Alarm" section. This functionality can be abused by a malicious user by uploading a web shell.
References
▼ | URL | Tags |
---|---|---|
http://manageengine.com | x_refsource_MISC | |
http://opmanager.com | x_refsource_MISC | |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:12:40.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://manageengine.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://opmanager.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the \"Group Chat\" or \"Alarm\" section. This functionality can be abused by a malicious user by uploading a web shell." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T15:32:59", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://manageengine.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://opmanager.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11561", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. An authenticated user can upload any file they want to share in the \"Group Chat\" or \"Alarm\" section. This functionality can be abused by a malicious user by uploading a web shell." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://manageengine.com", "refsource": "MISC", "url": "http://manageengine.com" }, { "name": "http://opmanager.com", "refsource": "MISC", "url": "http://opmanager.com" }, { "name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736", "refsource": "MISC", "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11561", "datePublished": "2019-05-23T15:32:59", "dateReserved": "2017-07-22T00:00:00", "dateUpdated": "2024-08-05T18:12:40.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7867
Vulnerability from cvelistv5
Published
2014-12-04 17:00
Modified
2024-08-06 13:03
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in the com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus servlet in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the probeName parameter.
References
▼ | URL | Tags |
---|---|---|
https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:03:27.310Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus servlet in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the probeName parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-12-04T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in the com.manageengine.opmanager.servlet.UpdateProbeUpgradeStatus servlet in ZOHO ManageEngine OpManager 11.3 and 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the probeName parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix", "refsource": "CONFIRM", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7867", "datePublished": "2014-12-04T17:00:00", "dateReserved": "2014-10-05T00:00:00", "dateUpdated": "2024-08-06T13:03:27.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44514
Vulnerability from cvelistv5
Published
2021-12-09 19:15
Modified
2024-08-04 04:25
Severity ?
EPSS score ?
Summary
OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:25:16.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-12T03:49:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-44514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125490" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44514", "datePublished": "2021-12-09T19:15:27", "dateReserved": "2021-12-01T00:00:00", "dateUpdated": "2024-08-04T04:25:16.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28653
Vulnerability from cvelistv5
Published
2021-02-03 16:00
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.809Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-21T23:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-28653", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233", "refsource": "CONFIRM", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233" }, { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203", "refsource": "CONFIRM", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203" }, { "name": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-28653", "datePublished": "2021-02-03T16:00:18", "dateReserved": "2020-11-16T00:00:00", "dateUpdated": "2024-08-04T16:40:59.809Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-17243
Vulnerability from cvelistv5
Published
2018-09-20 07:00
Modified
2024-09-17 02:11
Severity ?
EPSS score ?
Summary
Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:47:04.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-20T07:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17243", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me.html", "refsource": "CONFIRM", "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-17243", "datePublished": "2018-09-20T07:00:00Z", "dateReserved": "2018-09-20T00:00:00Z", "dateUpdated": "2024-09-17T02:11:22.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20078
Vulnerability from cvelistv5
Published
2021-04-01 18:03
Modified
2024-08-03 17:30
Severity ?
EPSS score ?
Summary
Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS.
References
▼ | URL | Tags |
---|---|---|
https://www.tenable.com/security/research/tra-2021-10 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Manage Engine OpManager |
Version: All versions prior to version build 125346 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:30:07.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2021-10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Manage Engine OpManager", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions prior to version build 125346" } ] } ], "descriptions": [ { "lang": "en", "value": "Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-01T18:03:48", "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "shortName": "tenable" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2021-10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vulnreport@tenable.com", "ID": "CVE-2021-20078", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Manage Engine OpManager", "version": { "version_data": [ { "version_value": "All versions prior to version build 125346" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tenable.com/security/research/tra-2021-10", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2021-10" } ] } } } }, "cveMetadata": { "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "assignerShortName": "tenable", "cveId": "CVE-2021-20078", "datePublished": "2021-04-01T18:03:48", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:30:07.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7866
Vulnerability from cvelistv5
Published
2014-12-10 18:00
Modified
2024-08-06 13:03
Severity ?
EPSS score ?
Summary
Multiple directory traversal vulnerabilities in ZOHO ManageEngine OpManager 8 (build 88xx) through 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to write and execute arbitrary files via a .. (dot dot) in the (1) fileName parameter to the MigrateLEEData servlet or (2) zipFileName parameter in a downloadFileFromProbe operation to the MigrateCentralData servlet.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2014/Nov/21 | mailing-list, x_refsource_FULLDISC | |
https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/533946/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:03:27.344Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/21" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in ZOHO ManageEngine OpManager 8 (build 88xx) through 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to write and execute arbitrary files via a .. (dot dot) in the (1) fileName parameter to the MigrateLEEData servlet or (2) zipFileName parameter in a downloadFileFromProbe operation to the MigrateCentralData servlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/21" }, { "tags": [ "x_refsource_MISC" ], "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7866", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple directory traversal vulnerabilities in ZOHO ManageEngine OpManager 8 (build 88xx) through 11.4, IT360 10.3 and 10.4, and Social IT Plus 11.0 allow remote attackers or remote authenticated users to write and execute arbitrary files via a .. (dot dot) in the (1) fileName parameter to the MigrateLEEData servlet or (2) zipFileName parameter in a downloadFileFromProbe operation to the MigrateCentralData servlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Nov/21" }, { "name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt", "refsource": "MISC", "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt" }, { "name": "20141109 [The ManageOwnage series, part VIII]: Remote code execution and blind SQLi in OpManager, Social IT and IT360", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded" }, { "name": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability", "refsource": "CONFIRM", "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability" }, { "name": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7866", "datePublished": "2014-12-10T18:00:00", "dateReserved": "2014-10-05T00:00:00", "dateUpdated": "2024-08-06T13:03:27.344Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5466
Vulnerability from cvelistv5
Published
2024-08-23 13:23
Modified
2024-08-23 15:37
Severity ?
EPSS score ?
Summary
Zohocorp ManageEngine OpManager and Remote Monitoring and Management versions 128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ManageEngine | OpManager, Remote Monitoring and Management |
Version: 0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zohocorp:manageengine_opmanager_rmm:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "manageengine_opmanager_rmm", "vendor": "zohocorp", "versions": [ { "lessThanOrEqual": "128329", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zohocorp:manageengine_opmanager_plus:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "manageengine_opmanager_plus", "vendor": "zohocorp", "versions": [ { "lessThanOrEqual": "128329", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zohocorp:manageengine_opmanager_msp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "manageengine_opmanager_msp", "vendor": "zohocorp", "versions": [ { "lessThanOrEqual": "128329", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "manageengine_opmanager", "vendor": "zohocorp", "versions": [ { "lessThanOrEqual": "128329", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5466", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-23T15:23:03.122113Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-23T15:37:32.493Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://www.manageengine.com/network-monitoring/", "defaultStatus": "unaffected", "product": "OpManager, Remote Monitoring and Management", "vendor": "ManageEngine", "versions": [ { "lessThanOrEqual": "128329", "status": "affected", "version": "0", "versionType": "128329" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zohocorp ManageEngine OpManager and\u0026nbsp;Remote Monitoring and Management versions\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option.\u003c/span\u003e\u003cbr\u003e" } ], "value": "Zohocorp ManageEngine OpManager and\u00a0Remote Monitoring and Management versions\u00a0128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-23T13:23:22.144Z", "orgId": "0fc0942c-577d-436f-ae8e-945763c79b02", "shortName": "ManageEngine" }, "references": [ { "url": "https://www.manageengine.com/itom/advisory/cve-2024-5466.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Remote Code Execution", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "0fc0942c-577d-436f-ae8e-945763c79b02", "assignerShortName": "ManageEngine", "cveId": "CVE-2024-5466", "datePublished": "2024-08-23T13:23:22.144Z", "dateReserved": "2024-05-29T09:42:19.974Z", "dateUpdated": "2024-08-23T15:37:32.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18716
Vulnerability from cvelistv5
Published
2018-11-20 19:00
Modified
2024-08-05 11:16
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://seclists.org/bugtraq/2018/Oct/61 | mailing-list, x_refsource_BUGTRAQ | |
http://seclists.org/fulldisclosure/2018/Nov/6 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:16:00.422Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2018/Oct/61" }, { "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Nov/6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-20T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2018/Oct/61" }, { "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Nov/6" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-18716", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20181031 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2018/Oct/61" }, { "name": "20181102 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Nov/6" }, { "name": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-18716", "datePublished": "2018-11-20T19:00:00", "dateReserved": "2018-10-27T00:00:00", "dateUpdated": "2024-08-05T11:16:00.422Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-20338
Vulnerability from cvelistv5
Published
2018-12-21 09:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/106302 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:19.151Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "106302", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106302" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-26T10:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "106302", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106302" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20338", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "106302", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106302" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20338", "datePublished": "2018-12-21T09:00:00", "dateReserved": "2018-12-21T00:00:00", "dateUpdated": "2024-08-05T11:58:19.151Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37024
Vulnerability from cvelistv5
Published
2022-08-09 15:15
Modified
2024-08-03 10:21
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/itom/advisory/cve-2022-37024.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.557Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T15:15:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-37024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html", "refsource": "MISC", "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-37024", "datePublished": "2022-08-09T15:15:36", "dateReserved": "2022-07-29T00:00:00", "dateUpdated": "2024-08-03T10:21:32.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-20173
Vulnerability from cvelistv5
Published
2018-12-17 08:00
Modified
2024-09-16 16:38
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:51:19.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-17T08:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20173", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20173", "datePublished": "2018-12-17T08:00:00Z", "dateReserved": "2018-12-17T00:00:00Z", "dateUpdated": "2024-09-16T16:38:57.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-17283
Vulnerability from cvelistv5
Published
2018-09-21 03:00
Modified
2024-08-05 10:47
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me.html | x_refsource_MISC | |
https://github.com/x-f1v3/ForCve/issues/4 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:47:04.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/x-f1v3/ForCve/issues/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-21T03:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/x-f1v3/ForCve/issues/4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17283", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "name": "https://github.com/x-f1v3/ForCve/issues/4", "refsource": "MISC", "url": "https://github.com/x-f1v3/ForCve/issues/4" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-17283", "datePublished": "2018-09-21T03:00:00", "dateReserved": "2018-09-20T00:00:00", "dateUpdated": "2024-08-05T10:47:04.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43473
Vulnerability from cvelistv5
Published
2023-03-30 16:28
Modified
2025-02-11 19:14
Severity ?
EPSS score ?
Summary
A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve
a malicious XML payload to trigger this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ManageEngine | OpManager |
Version: 12.6.168 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1685" }, { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685", "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685" }, { "name": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html", "tags": [ "x_transferred" ], "url": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43473", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-11T19:13:55.362515Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-11T19:14:03.416Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "OpManager", "vendor": "ManageEngine", "versions": [ { "status": "affected", "version": " 12.6.168" } ] } ], "descriptions": [ { "lang": "en", "value": "A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve \r\na malicious XML payload to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-30T16:28:35.983Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685" }, { "name": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html", "url": "https://www.manageengine.com/itom/advisory/cve-2022-43473.html" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2022-43473", "datePublished": "2023-03-30T16:28:35.983Z", "dateReserved": "2022-12-05T20:53:36.058Z", "dateUpdated": "2025-02-11T19:14:03.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12133
Vulnerability from cvelistv5
Published
2019-06-18 21:27
Modified
2024-08-04 23:10
Severity ?
EPSS score ?
Summary
Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html | x_refsource_CONFIRM | |
https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:30.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-18T18:00:42", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12133", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html", "refsource": "CONFIRM", "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html" }, { "name": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md", "refsource": "MISC", "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12133", "datePublished": "2019-06-18T21:27:25", "dateReserved": "2019-05-15T00:00:00", "dateUpdated": "2024-08-04T23:10:30.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41288
Vulnerability from cvelistv5
Published
2021-09-30 18:11
Modified
2024-08-04 03:08
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:08:31.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-30T18:11:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41288", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41288", "datePublished": "2021-09-30T18:11:14", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T03:08:31.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12997
Vulnerability from cvelistv5
Published
2018-06-29 12:00
Modified
2024-08-05 08:52
Severity ?
EPSS score ?
Summary
Incorrect Access Control in FailOverHelperServlet in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows attackers to read certain files on the web server without login by sending a specially crafted request to the server with the operation=copyfile&fileName= substring.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html | x_refsource_MISC | |
https://github.com/unh3x/just4cve/issues/8 | x_refsource_MISC | |
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2018/Jul/73 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:52:49.423Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/unh3x/just4cve/issues/8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037" }, { "name": "20180720 [CVE-2018-12997]Zoho manageengine Arbitrary File Read in multiple Products", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Jul/73" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-06-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect Access Control in FailOverHelperServlet in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows attackers to read certain files on the web server without login by sending a specially crafted request to the server with the operation=copyfile\u0026fileName= substring." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-24T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/unh3x/just4cve/issues/8" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037" }, { "name": "20180720 [CVE-2018-12997]Zoho manageengine Arbitrary File Read in multiple Products", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Jul/73" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-12997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect Access Control in FailOverHelperServlet in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows attackers to read certain files on the web server without login by sending a specially crafted request to the server with the operation=copyfile\u0026fileName= substring." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html" }, { "name": "https://github.com/unh3x/just4cve/issues/8", "refsource": "MISC", "url": "https://github.com/unh3x/just4cve/issues/8" }, { "name": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037", "refsource": "MISC", "url": "http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201807-037" }, { "name": "20180720 [CVE-2018-12997]Zoho manageengine Arbitrary File Read in multiple Products", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Jul/73" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-12997", "datePublished": "2018-06-29T12:00:00", "dateReserved": "2018-06-29T00:00:00", "dateUpdated": "2024-08-05T08:52:49.423Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17602
Vulnerability from cvelistv5
Published
2019-10-15 21:00
Modified
2024-08-05 01:47
Severity ?
EPSS score ?
Summary
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/network-monitoring/help/read-me-complete.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:13.363Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-15T21:00:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-17602", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-17602", "datePublished": "2019-10-15T21:00:15", "dateReserved": "2019-10-15T00:00:00", "dateUpdated": "2024-08-05T01:47:13.363Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3287
Vulnerability from cvelistv5
Published
2021-04-22 12:58
Modified
2024-08-03 16:53
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:53:16.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-21T23:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-3287", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329" }, { "name": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-3287", "datePublished": "2021-04-22T12:58:00", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-03T16:53:16.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11559
Vulnerability from cvelistv5
Published
2019-05-23 17:09
Modified
2024-08-05 18:12
Severity ?
EPSS score ?
Summary
An issue was discovered in ZOHO ManageEngine OpManager 12.2. The 'apiKey' parameter of "/api/json/admin/getmailserversettings" and "/api/json/dashboard/gotoverviewlist" is vulnerable to a Blind SQL Injection attack.
References
▼ | URL | Tags |
---|---|---|
http://manageengine.com | x_refsource_MISC | |
http://opmanager.com | x_refsource_MISC | |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:12:40.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://manageengine.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://opmanager.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. The \u0027apiKey\u0027 parameter of \"/api/json/admin/getmailserversettings\" and \"/api/json/dashboard/gotoverviewlist\" is vulnerable to a Blind SQL Injection attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T17:09:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://manageengine.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://opmanager.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11559", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in ZOHO ManageEngine OpManager 12.2. The \u0027apiKey\u0027 parameter of \"/api/json/admin/getmailserversettings\" and \"/api/json/dashboard/gotoverviewlist\" is vulnerable to a Blind SQL Injection attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://manageengine.com", "refsource": "MISC", "url": "http://manageengine.com" }, { "name": "http://opmanager.com", "refsource": "MISC", "url": "http://opmanager.com" }, { "name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736", "refsource": "MISC", "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11559", "datePublished": "2019-05-23T17:09:19", "dateReserved": "2017-07-22T00:00:00", "dateUpdated": "2024-08-05T18:12:40.323Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }