fkie_cve-2018-20173
Vulnerability from fkie_nvd
Published
2018-12-17 08:29
Modified
2024-11-21 04:01
Severity ?
Summary
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me.html | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "matchCriteriaId": "8B8C57C8-97BD-4AD9-BC6D-EB76620F965E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "matchCriteriaId": "86EB5F5D-FA8C-4B65-93D3-3B05579C3E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "matchCriteriaId": "686CBBE4-045A-4114-98BA-CE397D103DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "matchCriteriaId": "0ED75046-7450-4AEF-BCF8-0643FE9DD02C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "matchCriteriaId": "9AC5C2AC-B31B-4759-8279-9E2846C09AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "matchCriteriaId": "2D3150D9-2411-47A3-912E-2A7B81012E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "matchCriteriaId": "EF11B001-835D-4F2A-9CE4-AAD28F830038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "matchCriteriaId": "563BCC3B-5CC5-437F-91F1-A4AB7063489E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "matchCriteriaId": "6400A3F5-333F-4209-A4C7-C57E2A69B455", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "matchCriteriaId": "9FEB2E01-6815-4D38-8120-DEC41C778A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "matchCriteriaId": "8C34E591-6A6F-4363-A2CF-A5C22E97F475", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "matchCriteriaId": "48C8197C-0662-427F-80EB-1D43E13A8188", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "matchCriteriaId": "9774BC15-7D33-4E73-91A6-FBE6D836AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "matchCriteriaId": "65125E3F-65D7-4178-8256-1DFA4F7EE8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "matchCriteriaId": "47DF37DF-1A58-445F-91FF-5F42DA8144AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "matchCriteriaId": "0FE05E0C-2A98-4F1F-AFB9-08DD10394403", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "matchCriteriaId": "88EFA32A-390D-481C-B261-3445F1937018", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "matchCriteriaId": "C5709B4B-2C63-45C5-ABAD-EB320C20A85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "matchCriteriaId": "068147C0-404F-4573-964C-7BBB1ADA6202", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "matchCriteriaId": "1E9630D5-5759-416A-A460-8166134C8C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "matchCriteriaId": "1A1A9B60-D6A3-41C7-9487-5A46043EE012", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "matchCriteriaId": "B697D006-8945-4CF7-B571-92A212684CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "matchCriteriaId": "F028F31A-9273-43D8-8495-9D429394426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "matchCriteriaId": "117334A2-6518-4703-8C73-5B6A9D08D8FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "matchCriteriaId": "31C006D0-3B9B-4BE6-8A9F-5EAD2E689373", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "matchCriteriaId": "933E68D4-6C02-4582-AC5F-812A578FFD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "matchCriteriaId": "BAC430B6-52E2-4912-B1FD-9C7FB5D78BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "matchCriteriaId": "75DE01FC-38A4-4C86-88C0-573686AD5989", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "matchCriteriaId": "7157CF3A-F41F-4019-A22A-EF11EFE1BEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "matchCriteriaId": "32BADD0E-8892-4BC2-B00C-8CBE9A71CACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "matchCriteriaId": "737F0FA9-B08D-4CBA-A4A9-F5694DF94A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "matchCriteriaId": "7235E285-FD10-47BD-A813-0E99545A475A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "matchCriteriaId": "2674AF0C-1933-4A67-81B6-33367BA2B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "matchCriteriaId": "D3496F4B-11F9-46C0-B3D0-EF72781F82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "matchCriteriaId": "53B6CDCF-6DB1-417D-AF2A-41FB4C9FA038", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "matchCriteriaId": "884B89C3-F8A0-41BA-A485-2C4B9B26B5F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "matchCriteriaId": "465178DC-8C4A-4E77-9837-D50892CD817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "matchCriteriaId": "BF26A72D-C2DA-4FCE-8FE1-6C60CF5B9B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "matchCriteriaId": "B74591DE-ABC2-49DF-9761-0E3EC88CACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "matchCriteriaId": "BCFD5A1C-6B9F-4C9E-9183-D891A4955A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "matchCriteriaId": "F6391BA4-7D59-489A-8B4E-66E0F77273CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "matchCriteriaId": "742B696E-8E4B-417F-97F6-3A131D0017C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "matchCriteriaId": "20F9623B-3CA5-4128-A626-696FAD2E938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "matchCriteriaId": "364BAF6B-C6E2-4977-883B-51E2D367CC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "matchCriteriaId": "FF514A1F-F83E-46A7-A217-18ECD45E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "matchCriteriaId": "9EB86D22-755C-49D8-83C6-4DE640C48552", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "matchCriteriaId": "C8D3EBBA-C152-4424-837E-4A1D59610063", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "matchCriteriaId": "C5463E70-77A0-4420-B346-BDB1B31CFD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "matchCriteriaId": "AA0AF4B5-3B69-48AB-B6EA-096F2042B914", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "matchCriteriaId": "664A0889-B9F7-4F96-B57E-A72108958EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "matchCriteriaId": "20AAF0D8-9E04-4BF3-8707-760C60C6B816", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "matchCriteriaId": "5B523991-88CD-4E23-A18F-E42D1F8EA9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "matchCriteriaId": "EBCA0076-38A6-447C-A2AE-10AFFECE6D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "matchCriteriaId": "6108E08D-8F7C-4F69-A7DE-B34FF2811B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "matchCriteriaId": "2C030BDF-CDEA-498E-A755-C3A25D9D5024", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "matchCriteriaId": "F492EAA6-DB82-4653-9ABE-DE41B5B4F17F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "matchCriteriaId": "DE8C8A77-2C7A-42A5-AAB1-CFA4E431E7D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "matchCriteriaId": "A799504A-CA2F-4F79-B251-F09CC856378D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "matchCriteriaId": "31C0753B-F3EB-4BF3-86C1-FF590552C721", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "matchCriteriaId": "7FAD4420-5942-482E-9E90-FD42DAFAE505", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "matchCriteriaId": "EA22B2CB-43A4-40C4-A104-8EB7B52F47C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "matchCriteriaId": "0627E0C8-24F8-4BD2-B48B-80C75FF9B308", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "matchCriteriaId": "19C2CE00-9302-4700-BAFE-81A42A50CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "matchCriteriaId": "A3D88293-837A-4112-83E9-34E87E636E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "matchCriteriaId": "BBA2ED18-B159-4F01-8B91-22B73924C324", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "matchCriteriaId": "56FB1C69-5667-47A3-B286-DD193A14E3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "matchCriteriaId": "01D0B726-FB28-4DDB-AF14-0EF4D5D0C255", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "matchCriteriaId": "01EC4348-26DA-41BE-81B3-A0F82DD3C2E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "matchCriteriaId": "87967B7F-8502-4A07-BF23-760AB427A674", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "matchCriteriaId": "6BFBDAF9-81D3-49E7-A6E7-2041E34D0E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "matchCriteriaId": "A4F53CF6-5783-43A2-BCF7-8E3872ABD922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "matchCriteriaId": "F7530700-4F71-4E70-AF45-9D57CE331FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "matchCriteriaId": "3B75AA05-6FFE-417A-8026-06F37B573569", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "matchCriteriaId": "EBC6E300-0ECB-40C3-AEB8-25123B6F0AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "matchCriteriaId": "DE6DAAFC-EE46-4E9F-A218-B9F2178D0BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "matchCriteriaId": "A2C3EB60-492F-45F2-9B47-83860FCC87D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "matchCriteriaId": "528D8F67-661C-4583-BB59-79CAC093BBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "matchCriteriaId": "135E8785-833E-4E32-BAC1-173F770FC690", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "matchCriteriaId": "438499EB-654C-4762-978C-BA3FE967C6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "matchCriteriaId": "12C18281-5741-488D-89D7-125711D1A7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "matchCriteriaId": "A190DAB6-D0AA-4634-9415-5A4902CDB25B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "matchCriteriaId": "7C7B430C-B9A7-4AEC-84AB-90E08895A330", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*", "matchCriteriaId": "F3F7F501-1F21-4825-BD82-23ACA713FFD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*", "matchCriteriaId": "422417EA-FF20-428A-AC02-18D4F84DA123", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*", "matchCriteriaId": "59BCAF6B-CAC3-4142-B303-7B85B24C573C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*", "matchCriteriaId": "136E1AE8-723C-4A85-AC7A-A5FA557BE66F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*", "matchCriteriaId": "19BE3780-3FAB-46C9-9399-62C18EA1A322", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*", "matchCriteriaId": "D32CDFC3-8041-426B-BBE0-245703D4D74E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*", "matchCriteriaId": "6B95BC46-7679-415E-814B-29DA657A718E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API." }, { "lang": "es", "value": "Zoho ManageEngine OpManager en versiones 12.3 anteriores a la 123238 permite una inyecci\u00f3n SQL mediante la API getGraphData." } ], "id": "CVE-2018-20173", "lastModified": "2024-11-21T04:01:00.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-17T08:29:01.213", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.