cve-2018-20173
Vulnerability from cvelistv5
Published
2018-12-17 08:00
Modified
2024-09-16 16:38
Severity ?
EPSS score ?
Summary
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:51:19.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-17T08:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20173", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/network-monitoring/help/read-me.html", "refsource": "MISC", "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20173", "datePublished": "2018-12-17T08:00:00Z", "dateReserved": "2018-12-17T00:00:00Z", "dateUpdated": "2024-09-16T16:38:57.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-20173\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-12-17T08:29:01.213\",\"lastModified\":\"2024-11-21T04:01:00.650\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API.\"},{\"lang\":\"es\",\"value\":\"Zoho ManageEngine OpManager en versiones 12.3 anteriores a la 123238 permite una inyecci\u00f3n SQL mediante la API getGraphData.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B8C57C8-97BD-4AD9-BC6D-EB76620F965E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*\",\"matchCriteriaId\":\"86EB5F5D-FA8C-4B65-93D3-3B05579C3E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*\",\"matchCriteriaId\":\"686CBBE4-045A-4114-98BA-CE397D103DA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED75046-7450-4AEF-BCF8-0643FE9DD02C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AC5C2AC-B31B-4759-8279-9E2846C09AD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D3150D9-2411-47A3-912E-2A7B81012E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF11B001-835D-4F2A-9CE4-AAD28F830038\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*\",\"matchCriteriaId\":\"563BCC3B-5CC5-437F-91F1-A4AB7063489E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*\",\"matchCriteriaId\":\"6400A3F5-333F-4209-A4C7-C57E2A69B455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FEB2E01-6815-4D38-8120-DEC41C778A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C34E591-6A6F-4363-A2CF-A5C22E97F475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*\",\"matchCriteriaId\":\"48C8197C-0662-427F-80EB-1D43E13A8188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*\",\"matchCriteriaId\":\"9774BC15-7D33-4E73-91A6-FBE6D836AEE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*\",\"matchCriteriaId\":\"65125E3F-65D7-4178-8256-1DFA4F7EE8A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DF37DF-1A58-445F-91FF-5F42DA8144AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FE05E0C-2A98-4F1F-AFB9-08DD10394403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*\",\"matchCriteriaId\":\"88EFA32A-390D-481C-B261-3445F1937018\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5709B4B-2C63-45C5-ABAD-EB320C20A85F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*\",\"matchCriteriaId\":\"068147C0-404F-4573-964C-7BBB1ADA6202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E9630D5-5759-416A-A460-8166134C8C74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1A9B60-D6A3-41C7-9487-5A46043EE012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*\",\"matchCriteriaId\":\"B697D006-8945-4CF7-B571-92A212684CD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*\",\"matchCriteriaId\":\"F028F31A-9273-43D8-8495-9D429394426D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*\",\"matchCriteriaId\":\"117334A2-6518-4703-8C73-5B6A9D08D8FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C006D0-3B9B-4BE6-8A9F-5EAD2E689373\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*\",\"matchCriteriaId\":\"933E68D4-6C02-4582-AC5F-812A578FFD1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*\",\"matchCriteriaId\":\"75DE01FC-38A4-4C86-88C0-573686AD5989\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*\",\"matchCriteriaId\":\"7157CF3A-F41F-4019-A22A-EF11EFE1BEE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*\",\"matchCriteriaId\":\"32BADD0E-8892-4BC2-B00C-8CBE9A71CACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*\",\"matchCriteriaId\":\"737F0FA9-B08D-4CBA-A4A9-F5694DF94A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*\",\"matchCriteriaId\":\"7235E285-FD10-47BD-A813-0E99545A475A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*\",\"matchCriteriaId\":\"2674AF0C-1933-4A67-81B6-33367BA2B47A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3496F4B-11F9-46C0-B3D0-EF72781F82E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*\",\"matchCriteriaId\":\"53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*\",\"matchCriteriaId\":\"884B89C3-F8A0-41BA-A485-2C4B9B26B5F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*\",\"matchCriteriaId\":\"465178DC-8C4A-4E77-9837-D50892CD817F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*\",\"matchCriteriaId\":\"B74591DE-ABC2-49DF-9761-0E3EC88CACF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6391BA4-7D59-489A-8B4E-66E0F77273CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*\",\"matchCriteriaId\":\"742B696E-8E4B-417F-97F6-3A131D0017C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F9623B-3CA5-4128-A626-696FAD2E938D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*\",\"matchCriteriaId\":\"364BAF6B-C6E2-4977-883B-51E2D367CC0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF514A1F-F83E-46A7-A217-18ECD45E1D7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB86D22-755C-49D8-83C6-4DE640C48552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8D3EBBA-C152-4424-837E-4A1D59610063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5463E70-77A0-4420-B346-BDB1B31CFD76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA0AF4B5-3B69-48AB-B6EA-096F2042B914\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*\",\"matchCriteriaId\":\"664A0889-B9F7-4F96-B57E-A72108958EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*\",\"matchCriteriaId\":\"20AAF0D8-9E04-4BF3-8707-760C60C6B816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B523991-88CD-4E23-A18F-E42D1F8EA9F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBCA0076-38A6-447C-A2AE-10AFFECE6D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*\",\"matchCriteriaId\":\"6108E08D-8F7C-4F69-A7DE-B34FF2811B77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C030BDF-CDEA-498E-A755-C3A25D9D5024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*\",\"matchCriteriaId\":\"F492EAA6-DB82-4653-9ABE-DE41B5B4F17F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*\",\"matchCriteriaId\":\"A799504A-CA2F-4F79-B251-F09CC856378D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C0753B-F3EB-4BF3-86C1-FF590552C721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FAD4420-5942-482E-9E90-FD42DAFAE505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA22B2CB-43A4-40C4-A104-8EB7B52F47C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*\",\"matchCriteriaId\":\"0627E0C8-24F8-4BD2-B48B-80C75FF9B308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*\",\"matchCriteriaId\":\"19C2CE00-9302-4700-BAFE-81A42A50CE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3D88293-837A-4112-83E9-34E87E636E5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBA2ED18-B159-4F01-8B91-22B73924C324\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*\",\"matchCriteriaId\":\"56FB1C69-5667-47A3-B286-DD193A14E3A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*\",\"matchCriteriaId\":\"01D0B726-FB28-4DDB-AF14-0EF4D5D0C255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*\",\"matchCriteriaId\":\"01EC4348-26DA-41BE-81B3-A0F82DD3C2E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*\",\"matchCriteriaId\":\"87967B7F-8502-4A07-BF23-760AB427A674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4F53CF6-5783-43A2-BCF7-8E3872ABD922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7530700-4F71-4E70-AF45-9D57CE331FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B75AA05-6FFE-417A-8026-06F37B573569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C3EB60-492F-45F2-9B47-83860FCC87D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*\",\"matchCriteriaId\":\"528D8F67-661C-4583-BB59-79CAC093BBEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*\",\"matchCriteriaId\":\"135E8785-833E-4E32-BAC1-173F770FC690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*\",\"matchCriteriaId\":\"438499EB-654C-4762-978C-BA3FE967C6AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*\",\"matchCriteriaId\":\"12C18281-5741-488D-89D7-125711D1A7BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*\",\"matchCriteriaId\":\"A190DAB6-D0AA-4634-9415-5A4902CDB25B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7B430C-B9A7-4AEC-84AB-90E08895A330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3F7F501-1F21-4825-BD82-23ACA713FFD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*\",\"matchCriteriaId\":\"422417EA-FF20-428A-AC02-18D4F84DA123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*\",\"matchCriteriaId\":\"59BCAF6B-CAC3-4142-B303-7B85B24C573C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*\",\"matchCriteriaId\":\"136E1AE8-723C-4A85-AC7A-A5FA557BE66F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*\",\"matchCriteriaId\":\"19BE3780-3FAB-46C9-9399-62C18EA1A322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32CDFC3-8041-426B-BBE0-245703D4D74E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B95BC46-7679-415E-814B-29DA657A718E\"}]}]}],\"references\":[{\"url\":\"https://www.manageengine.com/network-monitoring/help/read-me.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.manageengine.com/network-monitoring/help/read-me.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.