Vulnerabilites related to zohocorp - manageengine_password_manager_pro
cve-2020-9347
Vulnerability from cvelistv5
Published
2020-03-16 21:44
Modified
2024-08-04 10:26
Severity ?
EPSS score ?
Summary
Zoho ManageEngine Password Manager Pro through 10.x has a CSV Excel Macro Injection vulnerability via a crafted name that is mishandled by the Export Passwords feature. NOTE: the vendor disputes the significance of this report because they expect CSV risk mitigation to be provided by an external application, and do not plan to add CSV constraints to their own products
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:26:16.058Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.x_CSV_Excel_Macro_Injection.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro through 10.x has a CSV Excel Macro Injection vulnerability via a crafted name that is mishandled by the Export Passwords feature. NOTE: the vendor disputes the significance of this report because they expect CSV risk mitigation to be provided by an external application, and do not plan to add CSV constraints to their own products", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-03-20T03:57:31", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.x_CSV_Excel_Macro_Injection.txt", }, ], tags: [ "disputed", ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-9347", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "** DISPUTED ** Zoho ManageEngine Password Manager Pro through 10.x has a CSV Excel Macro Injection vulnerability via a crafted name that is mishandled by the Export Passwords feature. NOTE: the vendor disputes the significance of this report because they expect CSV risk mitigation to be provided by an external application, and do not plan to add CSV constraints to their own products.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.x_CSV_Excel_Macro_Injection.txt", refsource: "MISC", url: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.x_CSV_Excel_Macro_Injection.txt", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-9347", datePublished: "2020-03-16T21:44:31", dateReserved: "2020-02-23T00:00:00", dateUpdated: "2024-08-04T10:26:16.058Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-47966
Vulnerability from cvelistv5
Published
2023-01-18 00:00
Modified
2024-09-13 17:58
Severity ?
EPSS score ?
Summary
Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections. This affects Access Manager Plus before 4308, Active Directory 360 before 4310, ADAudit Plus before 7081, ADManager Plus before 7162, ADSelfService Plus before 6211, Analytics Plus before 5150, Application Control Plus before 10.1.2220.18, Asset Explorer before 6983, Browser Security Plus before 11.1.2238.6, Device Control Plus before 10.1.2220.18, Endpoint Central before 10.1.2228.11, Endpoint Central MSP before 10.1.2228.11, Endpoint DLP before 10.1.2137.6, Key Manager Plus before 6401, OS Deployer before 1.1.2243.1, PAM 360 before 5713, Password Manager Pro before 12124, Patch Manager Plus before 10.1.2220.18, Remote Access Plus before 10.1.2228.11, Remote Monitoring and Management (RMM) before 10.1.41. ServiceDesk Plus before 14004, ServiceDesk Plus MSP before 13001, SupportCenter Plus before 11026, and Vulnerability Manager Plus before 10.1.2220.18. Exploitation is only possible if SAML SSO has ever been configured for a product (for some products, exploitation requires that SAML SSO is currently active).
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:02:36.652Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/apache/santuario-xml-security-java/tags?after=1.4.6", }, { tags: [ "x_transferred", ], url: "https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html", }, { tags: [ "x_transferred", ], url: "https://blog.viettelcybersecurity.com/saml-show-stopper/", }, { tags: [ "x_transferred", ], url: "https://github.com/horizon3ai/CVE-2022-47966", }, { tags: [ "x_transferred", ], url: "https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a", }, { tags: [ "x_transferred", ], url: "https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2022-47966", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2023-12-22T05:00:59.744032Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2023-01-23", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-47966", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-13T17:58:23.660Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections. This affects Access Manager Plus before 4308, Active Directory 360 before 4310, ADAudit Plus before 7081, ADManager Plus before 7162, ADSelfService Plus before 6211, Analytics Plus before 5150, Application Control Plus before 10.1.2220.18, Asset Explorer before 6983, Browser Security Plus before 11.1.2238.6, Device Control Plus before 10.1.2220.18, Endpoint Central before 10.1.2228.11, Endpoint Central MSP before 10.1.2228.11, Endpoint DLP before 10.1.2137.6, Key Manager Plus before 6401, OS Deployer before 1.1.2243.1, PAM 360 before 5713, Password Manager Pro before 12124, Patch Manager Plus before 10.1.2220.18, Remote Access Plus before 10.1.2228.11, Remote Monitoring and Management (RMM) before 10.1.41. ServiceDesk Plus before 14004, ServiceDesk Plus MSP before 13001, SupportCenter Plus before 11026, and Vulnerability Manager Plus before 10.1.2220.18. Exploitation is only possible if SAML SSO has ever been configured for a product (for some products, exploitation requires that SAML SSO is currently active).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-11T19:33:35.401552", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://github.com/apache/santuario-xml-security-java/tags?after=1.4.6", }, { url: "https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html", }, { url: "http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html", }, { url: "http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html", }, { url: "http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html", }, { url: "https://blog.viettelcybersecurity.com/saml-show-stopper/", }, { url: "https://github.com/horizon3ai/CVE-2022-47966", }, { url: "https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/", }, { url: "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a", }, { url: "https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-47966", datePublished: "2023-01-18T00:00:00", dateReserved: "2022-12-26T00:00:00", dateUpdated: "2024-09-13T17:58:23.660Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-47523
Vulnerability from cvelistv5
Published
2023-01-05 00:00
Modified
2024-08-03 14:55
Severity ?
EPSS score ?
Summary
Zoho ManageEngine Access Manager Plus before 4309, Password Manager Pro before 12210, and PAM360 before 5801 are vulnerable to SQL Injection.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T14:55:08.384Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.manageengine.com/privileged-session-management/advisory/cve-2022-47523.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Access Manager Plus before 4309, Password Manager Pro before 12210, and PAM360 before 5801 are vulnerable to SQL Injection.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-01-05T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.manageengine.com/privileged-session-management/advisory/cve-2022-47523.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-47523", datePublished: "2023-01-05T00:00:00", dateReserved: "2022-12-19T00:00:00", dateUpdated: "2024-08-03T14:55:08.384Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-40300
Vulnerability from cvelistv5
Published
2022-09-16 22:47
Modified
2024-08-03 12:14
Severity ?
EPSS score ?
Summary
Zoho ManageEngine Password Manager Pro through 12120 before 12121, PAM360 through 5550 before 5600, and Access Manager Plus through 4304 before 4305 have multiple SQL injection vulnerabilities.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-40300.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T12:14:39.986Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-40300.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro through 12120 before 12121, PAM360 through 5550 before 5600, and Access Manager Plus through 4304 before 4305 have multiple SQL injection vulnerabilities.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-16T22:47:55", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-40300.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2022-40300", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Zoho ManageEngine Password Manager Pro through 12120 before 12121, PAM360 through 5550 before 5600, and Access Manager Plus through 4304 before 4305 have multiple SQL injection vulnerabilities.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-40300.html", refsource: "MISC", url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-40300.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-40300", datePublished: "2022-09-16T22:47:55", dateReserved: "2022-09-09T00:00:00", dateUpdated: "2024-08-03T12:14:39.986Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3997
Vulnerability from cvelistv5
Published
2014-12-05 15:00
Modified
2024-08-06 11:04
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in the MetadataServlet servlet in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition 5 through 7 build 7003, IT360 and IT360 Managed Service Providers (MSP) edition before 10.3.3 build 10330, and possibly other ManageEngine products, allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the sv parameter to MetadataServlet.dat.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2014/Aug/55 | mailing-list, x_refsource_FULLDISC | |
https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt | x_refsource_MISC | |
https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2014/Aug/85 | mailing-list, x_refsource_FULLDISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T11:04:27.709Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20140819 [The ManageOwnage Series, part I]: blind SQL injection in two servlets (metasploit module included)", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Aug/55", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb", }, { name: "20140830 Re: [The ManageOwnage Series, part I]: blind SQL injection in two servlets (metasploit module included)", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Aug/85", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-19T00:00:00", descriptions: [ { lang: "en", value: "SQL injection vulnerability in the MetadataServlet servlet in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition 5 through 7 build 7003, IT360 and IT360 Managed Service Providers (MSP) edition before 10.3.3 build 10330, and possibly other ManageEngine products, allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the sv parameter to MetadataServlet.dat.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2015-05-12T14:57:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20140819 [The ManageOwnage Series, part I]: blind SQL injection in two servlets (metasploit module included)", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Aug/55", }, { tags: [ "x_refsource_MISC", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb", }, { name: "20140830 Re: [The ManageOwnage Series, part I]: blind SQL injection in two servlets (metasploit module included)", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Aug/85", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-3997", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "SQL injection vulnerability in the MetadataServlet servlet in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition 5 through 7 build 7003, IT360 and IT360 Managed Service Providers (MSP) edition before 10.3.3 build 10330, and possibly other ManageEngine products, allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the sv parameter to MetadataServlet.dat.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20140819 [The ManageOwnage Series, part I]: blind SQL injection in two servlets (metasploit module included)", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Aug/55", }, { name: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt", refsource: "MISC", url: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt", }, { name: "https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb", refsource: "MISC", url: "https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb", }, { name: "20140830 Re: [The ManageOwnage Series, part I]: blind SQL injection in two servlets (metasploit module included)", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Aug/85", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-3997", datePublished: "2014-12-05T15:00:00", dateReserved: "2014-06-06T00:00:00", dateUpdated: "2024-08-06T11:04:27.709Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-33617
Vulnerability from cvelistv5
Published
2021-07-31 16:55
Modified
2024-08-03 23:58
Severity ?
EPSS score ?
Summary
Zoho ManageEngine Password Manager Pro before 11.2 11200 allows login/AjaxResponse.jsp?RequestType=GetUserDomainName&userName= username enumeration, because the response (to a failed login request) is null only when the username is invalid.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com | x_refsource_MISC | |
https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11200 | x_refsource_MISC | |
https://herolab.usd.de/security-advisories/usd-2021-0015/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T23:58:21.426Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.manageengine.com", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11200", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://herolab.usd.de/security-advisories/usd-2021-0015/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro before 11.2 11200 allows login/AjaxResponse.jsp?RequestType=GetUserDomainName&userName= username enumeration, because the response (to a failed login request) is null only when the username is invalid.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-07-31T16:55:50", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.manageengine.com", }, { tags: [ "x_refsource_MISC", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11200", }, { tags: [ "x_refsource_MISC", ], url: "https://herolab.usd.de/security-advisories/usd-2021-0015/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-33617", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Zoho ManageEngine Password Manager Pro before 11.2 11200 allows login/AjaxResponse.jsp?RequestType=GetUserDomainName&userName= username enumeration, because the response (to a failed login request) is null only when the username is invalid.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.manageengine.com", refsource: "MISC", url: "https://www.manageengine.com", }, { name: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11200", refsource: "MISC", url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11200", }, { name: "https://herolab.usd.de/security-advisories/usd-2021-0015/", refsource: "MISC", url: "https://herolab.usd.de/security-advisories/usd-2021-0015/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-33617", datePublished: "2021-07-31T16:55:50", dateReserved: "2021-05-28T00:00:00", dateUpdated: "2024-08-03T23:58:21.426Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-5459
Vulnerability from cvelistv5
Published
2015-07-08 15:00
Modified
2024-08-06 06:50
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in the AdvanceSearch.class in AdventNetPassTrix.jar in ManageEngine Password Manager Pro (PMP) before 8.1 Build 8101 allows remote authenticated users to execute arbitrary SQL commands via the ANDOR parameter, as demonstrated by a request to STATE_ID/1425543888647/SQLAdvancedALSearchResult.cc.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/products/passwordmanagerpro/release-notes.html | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/132511/ManageEngine-Password-Manager-Pro-8.1-SQL-Injection.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Jun/104 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/bid/75692 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2015/Jul/19 | mailing-list, x_refsource_FULLDISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T06:50:02.932Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/132511/ManageEngine-Password-Manager-Pro-8.1-SQL-Injection.html", }, { name: "20150630 ManageEngine Password Manager Pro 8.1 SQL Injection vulnerability", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2015/Jun/104", }, { name: "75692", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/75692", }, { name: "20150703 Re: [##2255763##] ManageEngine Password Manager Pro 8.1 SQL Injection vulnerability", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2015/Jul/19", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-06-30T00:00:00", descriptions: [ { lang: "en", value: "SQL injection vulnerability in the AdvanceSearch.class in AdventNetPassTrix.jar in ManageEngine Password Manager Pro (PMP) before 8.1 Build 8101 allows remote authenticated users to execute arbitrary SQL commands via the ANDOR parameter, as demonstrated by a request to STATE_ID/1425543888647/SQLAdvancedALSearchResult.cc.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/132511/ManageEngine-Password-Manager-Pro-8.1-SQL-Injection.html", }, { name: "20150630 ManageEngine Password Manager Pro 8.1 SQL Injection vulnerability", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2015/Jun/104", }, { name: "75692", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/75692", }, { name: "20150703 Re: [##2255763##] ManageEngine Password Manager Pro 8.1 SQL Injection vulnerability", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2015/Jul/19", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-5459", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "SQL injection vulnerability in the AdvanceSearch.class in AdventNetPassTrix.jar in ManageEngine Password Manager Pro (PMP) before 8.1 Build 8101 allows remote authenticated users to execute arbitrary SQL commands via the ANDOR parameter, as demonstrated by a request to STATE_ID/1425543888647/SQLAdvancedALSearchResult.cc.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", refsource: "CONFIRM", url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, { name: "http://packetstormsecurity.com/files/132511/ManageEngine-Password-Manager-Pro-8.1-SQL-Injection.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/132511/ManageEngine-Password-Manager-Pro-8.1-SQL-Injection.html", }, { name: "20150630 ManageEngine Password Manager Pro 8.1 SQL Injection vulnerability", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2015/Jun/104", }, { name: "75692", refsource: "BID", url: "http://www.securityfocus.com/bid/75692", }, { name: "20150703 Re: [##2255763##] ManageEngine Password Manager Pro 8.1 SQL Injection vulnerability", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2015/Jul/19", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-5459", datePublished: "2015-07-08T15:00:00", dateReserved: "2015-07-08T00:00:00", dateUpdated: "2024-08-06T06:50:02.932Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-9346
Vulnerability from cvelistv5
Published
2020-03-16 21:42
Modified
2024-08-04 10:26
Severity ?
EPSS score ?
Summary
Zoho ManageEngine Password Manager Pro 10.4 and prior has no protection against Cross-site Request Forgery (CSRF) attacks, as demonstrated by changing a user's role.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:26:16.069Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.4_CSRF.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro 10.4 and prior has no protection against Cross-site Request Forgery (CSRF) attacks, as demonstrated by changing a user's role.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-03-20T03:59:07", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.4_CSRF.txt", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-9346", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Zoho ManageEngine Password Manager Pro 10.4 and prior has no protection against Cross-site Request Forgery (CSRF) attacks, as demonstrated by changing a user's role.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", refsource: "MISC", url: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", }, { name: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.4_CSRF.txt", refsource: "MISC", url: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.4_CSRF.txt", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-9346", datePublished: "2020-03-16T21:42:06", dateReserved: "2020-02-23T00:00:00", dateUpdated: "2024-08-04T10:26:16.069Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-17698
Vulnerability from cvelistv5
Published
2017-12-15 19:00
Modified
2024-09-16 16:22
Severity ?
EPSS score ?
Summary
Zoho ManageEngine Password Manager Pro 9 before 9.4 (9400) has reflected XSS in SearchResult.ec and BulkAccessControlView.ec.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/products/passwordmanagerpro/release-notes.html | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:59:17.523Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro 9 before 9.4 (9400) has reflected XSS in SearchResult.ec and BulkAccessControlView.ec.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-12-15T19:00:00Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-17698", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Zoho ManageEngine Password Manager Pro 9 before 9.4 (9400) has reflected XSS in SearchResult.ec and BulkAccessControlView.ec.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", refsource: "CONFIRM", url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-17698", datePublished: "2017-12-15T19:00:00Z", dateReserved: "2017-12-15T00:00:00Z", dateUpdated: "2024-09-16T16:22:29.752Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12133
Vulnerability from cvelistv5
Published
2019-06-18 21:27
Modified
2024-08-04 23:10
Severity ?
EPSS score ?
Summary
Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html | x_refsource_CONFIRM | |
https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:10:30.563Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-04-30T00:00:00", descriptions: [ { lang: "en", value: "Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-03-18T18:00:42", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-12133", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html", refsource: "CONFIRM", url: "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html", }, { name: "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md", refsource: "MISC", url: "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-12133", datePublished: "2019-06-18T21:27:25", dateReserved: "2019-05-15T00:00:00", dateUpdated: "2024-08-04T23:10:30.563Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-43672
Vulnerability from cvelistv5
Published
2022-11-12 00:00
Modified
2024-08-03 13:40
Severity ?
EPSS score ?
Summary
Zoho ManageEngine Password Manager Pro before 12122, PAM360 before 5711, and Access Manager Plus before 4306 allow SQL Injection (in a different software component relative to CVE-2022-43671.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T13:40:06.140Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-43672.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro before 12122, PAM360 before 5711, and Access Manager Plus before 4306 allow SQL Injection (in a different software component relative to CVE-2022-43671.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-12T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-43672.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-43672", datePublished: "2022-11-12T00:00:00", dateReserved: "2022-10-24T00:00:00", dateUpdated: "2024-08-03T13:40:06.140Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-35405
Vulnerability from cvelistv5
Published
2022-07-19 14:51
Modified
2025-01-28 21:48
Severity ?
EPSS score ?
Summary
Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T09:36:44.093Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2022-35405", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T21:46:55.411915Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-09-22", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-35405", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-502", description: "CWE-502 Deserialization of Untrusted Data", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-28T21:48:56.539Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-03T17:06:34.000Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2022-35405", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html", refsource: "MISC", url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html", }, { name: "http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-35405", datePublished: "2022-07-19T14:51:47.000Z", dateReserved: "2022-07-08T00:00:00.000Z", dateUpdated: "2025-01-28T21:48:56.539Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-27449
Vulnerability from cvelistv5
Published
2023-08-11 00:00
Modified
2024-10-09 19:16
Severity ?
EPSS score ?
Summary
Cross Site Scripting (XSS) vulnerability in Query Report feature in Zoho ManageEngine Password Manager Pro version 11001, allows remote attackers to execute arbitrary code and steal cookies via crafted JavaScript payload.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T16:18:43.478Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://bugbounty.zoho.com/bb/#/bug/101000003619211", }, { tags: [ "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11002", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-27449", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-09T19:16:03.114274Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-09T19:16:09.954Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Cross Site Scripting (XSS) vulnerability in Query Report feature in Zoho ManageEngine Password Manager Pro version 11001, allows remote attackers to execute arbitrary code and steal cookies via crafted JavaScript payload.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-08-11T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://bugbounty.zoho.com/bb/#/bug/101000003619211", }, { url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11002", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-27449", datePublished: "2023-08-11T00:00:00", dateReserved: "2020-10-21T00:00:00", dateUpdated: "2024-10-09T19:16:09.954Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1159
Vulnerability from cvelistv5
Published
2020-03-09 16:29
Modified
2024-08-05 22:48
Severity ?
EPSS score ?
Summary
In ZOHO Password Manager Pro (PMP) 8.3.0 (Build 8303) and 8.4.0 (Build 8400,8401,8402), underprivileged users can obtain sensitive information (entry password history) via a vulnerable hidden service.
References
▼ | URL | Tags |
---|---|---|
https://excellium-services.com/cert-xlm-advisory/cve-2016-1159/ | x_refsource_MISC | |
https://www.manageengine.com/products/passwordmanagerpro/release-notes.html | x_refsource_MISC | |
http://jvn.jp/vu/JVNVU90405898/index.html | x_refsource_MISC | |
https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ZOHO | Password Manager Pro (PMP) |
Version: 8.3.0 (Build 8303 Version: 8.4.0 (Build 8400 Version: 8401 Version: 8402). |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:48:13.005Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://excellium-services.com/cert-xlm-advisory/cve-2016-1159/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://jvn.jp/vu/JVNVU90405898/index.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Password Manager Pro (PMP)", vendor: "ZOHO", versions: [ { status: "affected", version: "8.3.0 (Build 8303", }, { status: "affected", version: "8.4.0 (Build 8400", }, { status: "affected", version: "8401", }, { status: "affected", version: "8402).", }, ], }, ], descriptions: [ { lang: "en", value: "In ZOHO Password Manager Pro (PMP) 8.3.0 (Build 8303) and 8.4.0 (Build 8400,8401,8402), underprivileged users can obtain sensitive information (entry password history) via a vulnerable hidden service.", }, ], problemTypes: [ { descriptions: [ { description: "obtain sensitive information", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-03-09T16:29:51", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://excellium-services.com/cert-xlm-advisory/cve-2016-1159/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, { tags: [ "x_refsource_MISC", ], url: "http://jvn.jp/vu/JVNVU90405898/index.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "vultures@jpcert.or.jp", ID: "CVE-2016-1159", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Password Manager Pro (PMP)", version: { version_data: [ { version_value: "8.3.0 (Build 8303", }, { version_value: "8.4.0 (Build 8400", }, { version_value: "8401", }, { version_value: "8402).", }, ], }, }, ], }, vendor_name: "ZOHO", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In ZOHO Password Manager Pro (PMP) 8.3.0 (Build 8303) and 8.4.0 (Build 8400,8401,8402), underprivileged users can obtain sensitive information (entry password history) via a vulnerable hidden service.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "obtain sensitive information", }, ], }, ], }, references: { reference_data: [ { name: "https://excellium-services.com/cert-xlm-advisory/cve-2016-1159/", refsource: "MISC", url: "https://excellium-services.com/cert-xlm-advisory/cve-2016-1159/", }, { name: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", refsource: "MISC", url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, { name: "http://jvn.jp/vu/JVNVU90405898/index.html", refsource: "MISC", url: "http://jvn.jp/vu/JVNVU90405898/index.html", }, { name: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", refsource: "CONFIRM", url: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2016-1159", datePublished: "2020-03-09T16:29:51", dateReserved: "2015-12-26T00:00:00", dateUpdated: "2024-08-05T22:48:13.005Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-8498
Vulnerability from cvelistv5
Published
2014-11-17 16:00
Modified
2024-08-06 13:18
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in BulkEditSearchResult.cc in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition before 7.1 build 7105 allows remote authenticated users to execute arbitrary SQL commands via the SEARCH_ALL parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/71016 | vdb-entry, x_refsource_BID | |
http://osvdb.org/show/osvdb/114483 | vdb-entry, x_refsource_OSVDB | |
http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2014/Nov/18 | mailing-list, x_refsource_FULLDISC | |
https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98596 | vdb-entry, x_refsource_XF | |
http://www.exploit-db.com/exploits/35210 | exploit, x_refsource_EXPLOIT-DB |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:18:48.324Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "71016", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71016", }, { name: "114483", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/show/osvdb/114483", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html", }, { name: "20141109 [The ManageOwnage Series, part VII]: Super admin privesc + password DB dump in Password Manager Pro", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Nov/18", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt", }, { name: "passwordmanager-cve20148498-sql-injection(98596)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/98596", }, { name: "35210", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "http://www.exploit-db.com/exploits/35210", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-11-08T00:00:00", descriptions: [ { lang: "en", value: "SQL injection vulnerability in BulkEditSearchResult.cc in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition before 7.1 build 7105 allows remote authenticated users to execute arbitrary SQL commands via the SEARCH_ALL parameter.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-07T15:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "71016", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71016", }, { name: "114483", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/show/osvdb/114483", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html", }, { name: "20141109 [The ManageOwnage Series, part VII]: Super admin privesc + password DB dump in Password Manager Pro", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Nov/18", }, { tags: [ "x_refsource_MISC", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt", }, { name: "passwordmanager-cve20148498-sql-injection(98596)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/98596", }, { name: "35210", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "http://www.exploit-db.com/exploits/35210", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-8498", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "SQL injection vulnerability in BulkEditSearchResult.cc in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition before 7.1 build 7105 allows remote authenticated users to execute arbitrary SQL commands via the SEARCH_ALL parameter.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "71016", refsource: "BID", url: "http://www.securityfocus.com/bid/71016", }, { name: "114483", refsource: "OSVDB", url: "http://osvdb.org/show/osvdb/114483", }, { name: "http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html", }, { name: "20141109 [The ManageOwnage Series, part VII]: Super admin privesc + password DB dump in Password Manager Pro", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Nov/18", }, { name: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt", refsource: "MISC", url: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt", }, { name: "passwordmanager-cve20148498-sql-injection(98596)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/98596", }, { name: "35210", refsource: "EXPLOIT-DB", url: "http://www.exploit-db.com/exploits/35210", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-8498", datePublished: "2014-11-17T16:00:00", dateReserved: "2014-10-28T00:00:00", dateUpdated: "2024-08-06T13:18:48.324Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-6105
Vulnerability from cvelistv5
Published
2023-11-15 20:57
Modified
2025-02-13 17:26
Severity ?
EPSS score ?
Summary
An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ManageEngine | Service Desk Plus |
Version: 0 < 14304 |
|||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:21:17.671Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/research/tra-2023-35", }, { tags: [ "x_transferred", ], url: "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Service Desk Plus", vendor: "ManageEngine", versions: [ { lessThan: "14304", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Asset Explorer", vendor: "ManageEngine", versions: [ { lessThan: "7004", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Access Manager Plus", vendor: "ManageEngine", versions: [ { lessThan: "14304", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.<br>", }, ], value: "An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.", }, ], impacts: [ { capecId: "CAPEC-176", descriptions: [ { lang: "en", value: "CAPEC-176 Configuration/Environment Manipulation", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-26T19:58:04.015Z", orgId: "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", shortName: "tenable", }, references: [ { url: "https://www.tenable.com/security/research/tra-2023-35", }, { url: "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html", }, ], source: { discovery: "UNKNOWN", }, title: "ManageEngine Information Disclosure in Multiple Products", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", assignerShortName: "tenable", cveId: "CVE-2023-6105", datePublished: "2023-11-15T20:57:47.981Z", dateReserved: "2023-11-13T15:10:28.339Z", dateUpdated: "2025-02-13T17:26:03.759Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-31857
Vulnerability from cvelistv5
Published
2021-06-16 12:45
Modified
2024-08-03 23:10
Severity ?
EPSS score ?
Summary
In Zoho ManageEngine Password Manager Pro before 11.1 build 11104, attackers are able to retrieve credentials via a browser extension for non-website resource types.
References
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com | x_refsource_MISC | |
https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11104 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T23:10:30.234Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.manageengine.com", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11104", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "In Zoho ManageEngine Password Manager Pro before 11.1 build 11104, attackers are able to retrieve credentials via a browser extension for non-website resource types.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-16T12:45:47", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.manageengine.com", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11104", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-31857", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Zoho ManageEngine Password Manager Pro before 11.1 build 11104, attackers are able to retrieve credentials via a browser extension for non-website resource types.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.manageengine.com", refsource: "MISC", url: "https://www.manageengine.com", }, { name: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11104", refsource: "CONFIRM", url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11104", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-31857", datePublished: "2021-06-16T12:45:47", dateReserved: "2021-04-28T00:00:00", dateUpdated: "2024-08-03T23:10:30.234Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-29081
Vulnerability from cvelistv5
Published
2022-04-28 19:16
Modified
2024-08-03 06:10
Severity ?
EPSS score ?
Summary
Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass on a few Rest API URLs (for SSOutAction. SSLAction. LicenseMgr. GetProductDetails. GetDashboard. FetchEvents. and Synchronize) via the ../RestAPI substring.
References
▼ | URL | Tags |
---|---|---|
https://www.tenable.com/security/research/tra-2022-14 | x_refsource_MISC | |
https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:10:59.435Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.tenable.com/security/research/tra-2022-14", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass on a few Rest API URLs (for SSOutAction. SSLAction. LicenseMgr. GetProductDetails. GetDashboard. FetchEvents. and Synchronize) via the ../RestAPI substring.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-04-28T19:16:57", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.tenable.com/security/research/tra-2022-14", }, { tags: [ "x_refsource_MISC", ], url: "https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2022-29081", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass on a few Rest API URLs (for SSOutAction. SSLAction. LicenseMgr. GetProductDetails. GetDashboard. FetchEvents. and Synchronize) via the ../RestAPI substring.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.tenable.com/security/research/tra-2022-14", refsource: "MISC", url: "https://www.tenable.com/security/research/tra-2022-14", }, { name: "https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html", refsource: "MISC", url: "https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-29081", datePublished: "2022-04-28T19:16:57", dateReserved: "2022-04-12T00:00:00", dateUpdated: "2024-08-03T06:10:59.435Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-5546
Vulnerability from cvelistv5
Published
2024-08-28 08:44
Modified
2024-08-28 13:27
Severity ?
EPSS score ?
Summary
Zohocorp ManageEngine Password Manager Pro versions before 12431 and ManageEngine PAM360 versions before 7001 are affected by authenticated SQL Injection vulnerability via a global search option.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | ManageEngine | Password Manager Pro |
Version: 0 |
||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:manageengine:pam360:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "pam360", vendor: "manageengine", versions: [ { lessThan: "7001", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:manageengine:password_manager_pro:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "password_manager_pro", vendor: "manageengine", versions: [ { lessThan: "12431", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-5546", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-08-28T13:22:46.351173Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-28T13:27:52.940Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { collectionURL: "https://www.manageengine.com/products/passwordmanagerpro/", defaultStatus: "unaffected", product: "Password Manager Pro", vendor: "ManageEngine", versions: [ { lessThan: "12431", status: "affected", version: "0", versionType: "12431", }, ], }, { collectionURL: "https://www.manageengine.com/privileged-access-management/", defaultStatus: "unaffected", product: "PAM360", vendor: "ManageEngine", versions: [ { lessThan: "7001", status: "affected", version: "0", versionType: "7001", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Zohocorp <span style=\"background-color: rgb(255, 255, 255);\">ManageEngine Password Manager Pro versions </span><span style=\"background-color: rgb(255, 255, 255);\">before 12431 and</span><span style=\"background-color: rgb(255, 255, 255);\"> ManageEngine PAM360 versions</span><span style=\"background-color: rgb(255, 255, 255);\"> before 7001 are affected by <span style=\"background-color: rgb(255, 255, 255);\">authenticated SQL Injection vulnerability via a global search option.</span></span></span>", }, ], value: "Zohocorp ManageEngine Password Manager Pro versions before 12431 and ManageEngine PAM360 versions before 7001 are affected by authenticated SQL Injection vulnerability via a global search option.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 8.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-28T08:44:09.433Z", orgId: "0fc0942c-577d-436f-ae8e-945763c79b02", shortName: "ManageEngine", }, references: [ { url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2024-5546.html", }, ], source: { discovery: "UNKNOWN", }, title: "SQL Injection", x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "0fc0942c-577d-436f-ae8e-945763c79b02", assignerShortName: "ManageEngine", cveId: "CVE-2024-5546", datePublished: "2024-08-28T08:44:09.433Z", dateReserved: "2024-05-30T19:06:01.692Z", dateUpdated: "2024-08-28T13:27:52.940Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-2291
Vulnerability from cvelistv5
Published
2023-04-26 00:00
Modified
2025-02-03 17:31
Severity ?
EPSS score ?
Summary
Static credentials exist in the PostgreSQL data used in ManageEngine Access Manager Plus (AMP) build 4309, ManageEngine Password Manager Pro, and ManageEngine PAM360. These credentials could allow a malicious actor to modify configuration data that would escalate their permissions from that of a low-privileged user to an Administrative user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Zoho ManageEngine Multiple Products |
Version: All |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T06:19:14.837Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://tenable.com/security/research/tra-2023-16", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-2291", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-03T17:31:27.567723Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-798", description: "CWE-798 Use of Hard-coded Credentials", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-03T17:31:55.129Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Zoho ManageEngine Multiple Products", vendor: "n/a", versions: [ { status: "affected", version: "All", }, ], }, ], descriptions: [ { lang: "en", value: "Static credentials exist in the PostgreSQL data used in ManageEngine Access Manager Plus (AMP) build 4309, ManageEngine Password Manager Pro, and ManageEngine PAM360. These credentials could allow a malicious actor to modify configuration data that would escalate their permissions from that of a low-privileged user to an Administrative user.", }, ], problemTypes: [ { descriptions: [ { description: "Hardcoded Credentials", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-26T00:00:00.000Z", orgId: "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", shortName: "tenable", }, references: [ { url: "https://tenable.com/security/research/tra-2023-16", }, ], }, }, cveMetadata: { assignerOrgId: "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", assignerShortName: "tenable", cveId: "CVE-2023-2291", datePublished: "2023-04-26T00:00:00.000Z", dateReserved: "2023-04-25T00:00:00.000Z", dateUpdated: "2025-02-03T17:31:55.129Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-43671
Vulnerability from cvelistv5
Published
2022-11-12 00:00
Modified
2024-08-03 13:40
Severity ?
EPSS score ?
Summary
Zoho ManageEngine Password Manager Pro before 12122, PAM360 before 5711, and Access Manager Plus before 4306 allow SQL Injection.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T13:40:05.639Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-43671.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro before 12122, PAM360 before 5711, and Access Manager Plus before 4306 allow SQL Injection.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-12T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-43671.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-43671", datePublished: "2022-11-12T00:00:00", dateReserved: "2022-10-24T00:00:00", dateUpdated: "2024-08-03T13:40:05.639Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2014-11-17 16:59
Modified
2024-11-21 02:19
Severity ?
Summary
SQL injection vulnerability in BulkEditSearchResult.cc in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition before 7.1 build 7105 allows remote authenticated users to execute arbitrary SQL commands via the SEARCH_ALL parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_password_manager_pro | * | |
zohocorp | manageengine_password_manager_pro | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:-:*:*:*", matchCriteriaId: "FB70CF57-B58E-4A8E-A299-A871AFDFFBFC", versionEndIncluding: "7.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "736971C6-ECA4-4A64-832B-2B09F895394D", versionEndIncluding: "7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection vulnerability in BulkEditSearchResult.cc in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition before 7.1 build 7105 allows remote authenticated users to execute arbitrary SQL commands via the SEARCH_ALL parameter.", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL en BulkEditSearchResult.cc en ManageEngine Password Manager PRO (PMP) y Password Manager Pro Managed Service Providers (MSP) edition anterior a 7.1 build 7105 permite a usuarios autenticados ejecutar comandos SQL arbitrarios a través del parámetro SEARCH_ALL.", }, ], id: "CVE-2014-8498", lastModified: "2024-11-21T02:19:11.320", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-11-17T16:59:02.823", references: [ { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://osvdb.org/show/osvdb/114483", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2014/Nov/18", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://www.exploit-db.com/exploits/35210", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/71016", }, { source: "cve@mitre.org", tags: [ "VDB Entry", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/98596", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://osvdb.org/show/osvdb/114483", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2014/Nov/18", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://www.exploit-db.com/exploits/35210", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/71016", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "VDB Entry", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/98596", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-03-09 17:15
Modified
2024-11-21 02:45
Severity ?
Summary
In ZOHO Password Manager Pro (PMP) 8.3.0 (Build 8303) and 8.4.0 (Build 8400,8401,8402), underprivileged users can obtain sensitive information (entry password history) via a vulnerable hidden service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_password_manager_pro | 8.3 | |
zohocorp | manageengine_password_manager_pro | 8.4 | |
zohocorp | manageengine_password_manager_pro | 8.4 | |
zohocorp | manageengine_password_manager_pro | 8.4 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8303:*:*:*:*:*:*", matchCriteriaId: "91FBD7A1-CD3B-43A6-86B7-30BAF3C8FCC3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8400:*:*:*:*:*:*", matchCriteriaId: "C9534C06-0E60-4301-9CF1-0401C3BDDAC4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8401:*:*:*:*:*:*", matchCriteriaId: "EFE89C56-C830-46A1-95B4-7935A83BED11", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8402:*:*:*:*:*:*", matchCriteriaId: "30D88E0A-6FA5-4AFE-8113-8159D1B6F6C0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In ZOHO Password Manager Pro (PMP) 8.3.0 (Build 8303) and 8.4.0 (Build 8400,8401,8402), underprivileged users can obtain sensitive information (entry password history) via a vulnerable hidden service.", }, { lang: "es", value: "En ZOHO Password Manager Pro (PMP) versiones 8.3.0 (Build 8303) y 8.4.0 (Build 8400,8401,8402), unos usuarios no privilegiados pueden obtener información confidencial (historial de contraseñas de entrada) por medio de un servicio oculto vulnerable.", }, ], id: "CVE-2016-1159", lastModified: "2024-11-21T02:45:52.497", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-03-09T17:15:11.870", references: [ { source: "vultures@jpcert.or.jp", tags: [ "Third Party Advisory", ], url: "http://jvn.jp/vu/JVNVU90405898/index.html", }, { source: "vultures@jpcert.or.jp", tags: [ "Third Party Advisory", ], url: "https://excellium-services.com/cert-xlm-advisory/cve-2016-1159/", }, { source: "vultures@jpcert.or.jp", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", }, { source: "vultures@jpcert.or.jp", tags: [ "Release Notes", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://jvn.jp/vu/JVNVU90405898/index.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://excellium-services.com/cert-xlm-advisory/cve-2016-1159/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, ], sourceIdentifier: "vultures@jpcert.or.jp", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-07-19 15:15
Modified
2025-03-27 13:59
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html | Patch, Vendor Advisory |
Impacted products
{ cisaActionDue: "2022-10-13", cisaExploitAdd: "2022-09-22", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "5FDF15FF-2561-4139-AC5E-4812584B1B03", versionEndExcluding: "4.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*", matchCriteriaId: "D5DEC045-6A7E-4041-88F8-5ABC4AB51C29", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*", matchCriteriaId: "52DDE5D9-28DE-446F-A402-7BE3C33A4B35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4302:*:*:*:*:*:*", matchCriteriaId: "F6E1E4D8-B7F0-4BDB-B5A2-55436BEC85F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:*:*:*:*:*:*:*:*", matchCriteriaId: "490F58D2-CD6D-4658-965D-F980AA120D1E", versionEndExcluding: "5.5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.5:build5500:*:*:*:*:*:*", matchCriteriaId: "0D1A2884-93DD-45FD-8024-81E007AEE787", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "76C7DC97-8BF1-421F-9272-FD301D2D7A3F", versionEndExcluding: "12.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12100:*:*:*:*:*:*", matchCriteriaId: "9BE65B96-74ED-48F1-B86D-CB3387D989CB", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)", }, { lang: "es", value: "Zoho ManageEngine Password Manager Pro versiones anteriores a 12101 y PAM360 versiones anteriores a 5510, son vulnerables a una ejecución de código remota sin autenticación. (Esto también afecta a ManageEngine Access Manager Plus versiones anteriores a 4303 con autenticación).\n", }, ], id: "CVE-2022-35405", lastModified: "2025-03-27T13:59:59.140", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2022-07-19T15:15:08.680", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-502", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-502", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2023-01-18 18:15
Modified
2025-03-07 21:04
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections. This affects Access Manager Plus before 4308, Active Directory 360 before 4310, ADAudit Plus before 7081, ADManager Plus before 7162, ADSelfService Plus before 6211, Analytics Plus before 5150, Application Control Plus before 10.1.2220.18, Asset Explorer before 6983, Browser Security Plus before 11.1.2238.6, Device Control Plus before 10.1.2220.18, Endpoint Central before 10.1.2228.11, Endpoint Central MSP before 10.1.2228.11, Endpoint DLP before 10.1.2137.6, Key Manager Plus before 6401, OS Deployer before 1.1.2243.1, PAM 360 before 5713, Password Manager Pro before 12124, Patch Manager Plus before 10.1.2220.18, Remote Access Plus before 10.1.2228.11, Remote Monitoring and Management (RMM) before 10.1.41. ServiceDesk Plus before 14004, ServiceDesk Plus MSP before 13001, SupportCenter Plus before 11026, and Vulnerability Manager Plus before 10.1.2220.18. Exploitation is only possible if SAML SSO has ever been configured for a product (for some products, exploitation requires that SAML SSO is currently active).
References
Impacted products
{ cisaActionDue: "2023-02-13", cisaExploitAdd: "2023-01-23", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "5FDF15FF-2561-4139-AC5E-4812584B1B03", versionEndExcluding: "4.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*", matchCriteriaId: "D5DEC045-6A7E-4041-88F8-5ABC4AB51C29", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*", matchCriteriaId: "52DDE5D9-28DE-446F-A402-7BE3C33A4B35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4302:*:*:*:*:*:*", matchCriteriaId: "F6E1E4D8-B7F0-4BDB-B5A2-55436BEC85F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4303:*:*:*:*:*:*", matchCriteriaId: "59675CC4-8A5C-4668-908C-0886B4B310DC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4304:*:*:*:*:*:*", matchCriteriaId: "45084336-F1DC-4E5B-A45E-506A779985D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4305:*:*:*:*:*:*", matchCriteriaId: "1B2CC071-5BB3-4A25-88F2-DBC56B94D895", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4306:*:*:*:*:*:*", matchCriteriaId: "E6FDF373-4711-4B72-A14E-CEB19301C40F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4307:*:*:*:*:*:*", matchCriteriaId: "0E0F346C-0445-4D38-8583-3379962B540F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_ad360:*:*:*:*:*:*:*:*", matchCriteriaId: "D2B1FA6A-43DB-4CCC-AC05-77810ED7B80D", versionEndExcluding: "4.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_ad360:4.3:4300:*:*:*:*:*:*", matchCriteriaId: "1179FC2E-0FCC-4744-85A7-1D68AE742FEE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_ad360:4.3:4302:*:*:*:*:*:*", matchCriteriaId: "F05F8E9D-1880-4B94-922E-BA61FA112945", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_ad360:4.3:4303:*:*:*:*:*:*", matchCriteriaId: "F336B0C2-1F99-4BC7-828B-02E432CB0723", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_ad360:4.3:4304:*:*:*:*:*:*", matchCriteriaId: "CBBA787F-7F38-4AD3-90BE-D307D75F1BCA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_ad360:4.3:4305:*:*:*:*:*:*", matchCriteriaId: "46A96B82-49E1-4392-BDCF-CC9753D67A4E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_ad360:4.3:4306:*:*:*:*:*:*", matchCriteriaId: "837BF464-6D18-4267-8913-D7937C91789B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_ad360:4.3:4308:*:*:*:*:*:*", matchCriteriaId: "0243CA85-B856-4ED9-BCD0-5EAB182862CD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_ad360:4.3:4309:*:*:*:*:*:*", matchCriteriaId: "FB216CD0-B3BD-434D-8FC6-BB60408C128A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "FFA4EA7A-B1C1-4750-A11D-89054B77B320", versionEndExcluding: "7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7000:*:*:*:*:*:*", matchCriteriaId: "16BADE82-3652-4074-BDFF-828B7213CAF6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7002:*:*:*:*:*:*", matchCriteriaId: "01E9CAE9-4B45-4E7A-BE78-6E7E9A3A04E8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7003:*:*:*:*:*:*", matchCriteriaId: "CFA4FC59-CC4F-4F21-9AE9-3F526C91411C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7004:*:*:*:*:*:*", matchCriteriaId: "26A6F6D1-540C-43C5-96A7-0E36F3E0A4D7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7005:*:*:*:*:*:*", matchCriteriaId: "97EA9324-9377-46E1-A0EA-637128E65DED", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7006:*:*:*:*:*:*", matchCriteriaId: "EA5BE36E-A73A-4D1C-8185-9692373F1444", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7007:*:*:*:*:*:*", matchCriteriaId: "10F48951-44A1-42C1-AE2A-B2CDFFCAFDBF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7008:*:*:*:*:*:*", matchCriteriaId: "F505C783-09DE-4045-9DB4-DD850B449A48", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7050:*:*:*:*:*:*", matchCriteriaId: "212BF664-02DE-457F-91A6-6F824ECC963B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7051:*:*:*:*:*:*", matchCriteriaId: "D102B74F-6762-4EFE-BAF7-A7D416867D9D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7052:*:*:*:*:*:*", matchCriteriaId: "FEDF5C01-41D8-45C0-8F0D-3A7FCB6DADEE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7053:*:*:*:*:*:*", matchCriteriaId: "5D6ACBF5-25C6-403A-BCFA-66A90A8B4E14", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7054:*:*:*:*:*:*", matchCriteriaId: "CF50DCAC-33E1-4FE2-BF3C-C6A17CC8E48A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7055:*:*:*:*:*:*", matchCriteriaId: "5B2F6EE4-F3DC-43CE-B7FD-C9522A35406A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7060:*:*:*:*:*:*", matchCriteriaId: "623151CB-4C6B-4068-B173-FE8E73D652F5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7062:*:*:*:*:*:*", matchCriteriaId: "1D84377E-CB44-4C6A-A665-763A1CD1AF34", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7063:*:*:*:*:*:*", matchCriteriaId: "603D1875-BD5E-4C6C-9D2C-3CAA9D7B3AE0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7065:*:*:*:*:*:*", matchCriteriaId: "4C568190-1C1B-44FA-B50A-C142A0B8224D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7080:*:*:*:*:*:*", matchCriteriaId: "F876B2E2-C2FF-47BE-9F53-5F86606A08CA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "B9D72627-17F9-427E-907B-56EA0A498131", versionEndExcluding: "7.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7100:*:*:*:*:*:*", matchCriteriaId: "736740CB-A328-4163-BAC4-6C881A24C8B1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7101:*:*:*:*:*:*", matchCriteriaId: "9B806083-7309-4215-AF81-DCC4D90B7876", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7102:*:*:*:*:*:*", matchCriteriaId: "A741CDA8-D1A8-4F83-AE54-7D3D3C433825", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7110:*:*:*:*:*:*", matchCriteriaId: "09563D6F-690B-4C7A-BA25-52D009724A74", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7111:*:*:*:*:*:*", matchCriteriaId: "30FAC23B-831E-4904-AB3B-85A3C068CEB8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7112:*:*:*:*:*:*", matchCriteriaId: "9347D3CF-B5D1-4ACE-83E1-73748EF15120", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7113:*:*:*:*:*:*", matchCriteriaId: "322E0562-4586-4DF4-A935-C2447883495B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7114:*:*:*:*:*:*", matchCriteriaId: "EB9151D6-BD21-4268-9371-FF702C1AD84B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7115:*:*:*:*:*:*", matchCriteriaId: "B371E93E-7C85-42DD-AA7F-9B43D8D02963", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7116:*:*:*:*:*:*", matchCriteriaId: "094EEFA4-BD16-4F79-8133-62F9E2C8C675", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7117:*:*:*:*:*:*", matchCriteriaId: "DC5A6297-98E3-45C8-95FB-7F4E65D133BF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7118:*:*:*:*:*:*", matchCriteriaId: "93C96678-34B7-4FCE-9DBD-1A7B3E0943BB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7120:*:*:*:*:*:*", matchCriteriaId: "9E9B9E88-919F-4CF7-99DC-72E50BDF65A9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7121:*:*:*:*:*:*", matchCriteriaId: "7848B31C-AB51-486B-8655-7D7A060BAFFC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7122:*:*:*:*:*:*", matchCriteriaId: "1CFB5C4A-B717-4CC2-AE03-336C63D17B96", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7123:*:*:*:*:*:*", matchCriteriaId: "456D49D7-F04D-4003-B429-8D5504959D04", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7124:*:*:*:*:*:*", matchCriteriaId: "BB788440-904B-430E-BF5B-12ADA816477E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7125:*:*:*:*:*:*", matchCriteriaId: "876CC4D6-9546-4D39-965A-EF5A4AF4AD93", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7126:*:*:*:*:*:*", matchCriteriaId: "85432FE8-946F-448D-A92A-FF549EDC52F8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7130:*:*:*:*:*:*", matchCriteriaId: "813E1389-A949-427C-92C6-3974702FEA5D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7131:*:*:*:*:*:*", matchCriteriaId: "34A48841-EA09-4917-A6FF-DF645B581426", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7140:*:*:*:*:*:*", matchCriteriaId: "1C042646-9D36-4712-9E5D-40E55FCF7C24", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7141:*:*:*:*:*:*", matchCriteriaId: "9E6CD67A-7F5A-4F29-B563-7E4D72A1149F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7150:*:*:*:*:*:*", matchCriteriaId: "77A0C792-A8B7-48F8-9AD7-96B0CBAD4EBF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7151:*:*:*:*:*:*", matchCriteriaId: "7E53B3CB-4351-4E24-B80C-D62CC483D4D7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7160:*:*:*:*:*:*", matchCriteriaId: "0068E901-62D2-4C4D-96F8-7823B0DF7DA8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7161:*:*:*:*:*:*", matchCriteriaId: "CF70BA56-3478-4DA5-B013-4D9B820D2219", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "7BC9667B-3ECE-4DF8-9C45-95E53736CD68", versionEndExcluding: "6.2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6200:*:*:*:*:*:*", matchCriteriaId: "BAFCD8BD-07E4-4AD3-B802-9A6D2254777A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6201:*:*:*:*:*:*", matchCriteriaId: "B1E4E7ED-317B-471D-B387-24BFE504FD48", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6202:*:*:*:*:*:*", matchCriteriaId: "1518C214-71A7-4C97-BA40-95D98E0C78BB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6203:*:*:*:*:*:*", matchCriteriaId: "247ED04D-E067-4A18-8514-9CD635DF4F09", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6204:*:*:*:*:*:*", matchCriteriaId: "8AC2C862-7709-44BF-9D0C-1BD63B381001", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6205:*:*:*:*:*:*", matchCriteriaId: "1E936706-E1D6-496A-8395-96706AF32F19", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6206:*:*:*:*:*:*", matchCriteriaId: "CA25E9BB-DDB9-438C-890A-61264C10BFF0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6207:*:*:*:*:*:*", matchCriteriaId: "D71FF123-F797-4E0D-8167-DD4563733879", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6208:*:*:*:*:*:*", matchCriteriaId: "1156F671-D6BD-4FA2-924F-1802F157A025", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6209:*:*:*:*:*:*", matchCriteriaId: "C7ABB8B4-1CBF-4437-A751-B51F2B061C7D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.2:6210:*:*:*:*:*:*", matchCriteriaId: "E870D833-28A7-45E1-9A6B-26A33D66B507", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_analytics_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "2026DE5E-EDDA-4134-A63E-1F01A9ED209F", versionEndExcluding: "5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_analytics_plus:5.1:5100:*:*:*:*:*:*", matchCriteriaId: "DBEE7368-580D-422E-80DE-079462579BD4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_analytics_plus:5.1:5110:*:*:*:*:*:*", matchCriteriaId: "92C88B5F-3689-4314-B23E-D9051808C1D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_analytics_plus:5.1:5120:*:*:*:*:*:*", matchCriteriaId: "839EB997-896A-4CD9-BADF-1C2DC2B498F0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_analytics_plus:5.1:5121:*:*:*:*:*:*", matchCriteriaId: "7A4DF40E-2941-4A38-9297-42502D7EE0C5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_analytics_plus:5.1:5130:*:*:*:*:*:*", matchCriteriaId: "DD056927-1BC0-42A0-8E26-7FC0F4BE58AF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_analytics_plus:5.1:5140:*:*:*:*:*:*", matchCriteriaId: "99F6F9CC-5A94-4A74-8D36-BE198424C955", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:*:*:*:*:*:*:*:*", matchCriteriaId: "A6DEEF51-0977-4061-9919-803DFD144E10", versionEndExcluding: "6.9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6900:*:*:*:*:*:*", matchCriteriaId: "7D0754D0-5B28-4851-89A2-DC5B20CFF3E8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6901:*:*:*:*:*:*", matchCriteriaId: "6E0CAA5B-16A1-4637-B90A-BFAF7381CCD9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6902:*:*:*:*:*:*", matchCriteriaId: "48A960D7-7AB2-43F4-99FC-5B1FE69BFDB6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6903:*:*:*:*:*:*", matchCriteriaId: "B293513C-9ECB-4512-B1B8-A470C6115458", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6904:*:*:*:*:*:*", matchCriteriaId: "5D9B89EB-C51F-4A70-A6DF-1BD326308DA5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6905:*:*:*:*:*:*", matchCriteriaId: "9B708143-01B3-45D0-A769-E1D8E99237B5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6906:*:*:*:*:*:*", matchCriteriaId: "F1837C80-7D1F-4AF5-BF4B-932DF03D6A30", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6907:*:*:*:*:*:*", matchCriteriaId: "4E528B83-1539-4516-9ACF-A05E853014DF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6908:*:*:*:*:*:*", matchCriteriaId: "CBFB65BC-5B94-4075-BBB1-4CD8B5B216C3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6909:*:*:*:*:*:*", matchCriteriaId: "7FAF3DFA-78FB-417C-808A-507F66889913", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6950:*:*:*:*:*:*", matchCriteriaId: "E9506197-CDDA-451B-9FE3-72B3C3BA19EF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6951:*:*:*:*:*:*", matchCriteriaId: "691DF8EC-6A7A-4449-8A4C-79F76726D685", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6952:*:*:*:*:*:*", matchCriteriaId: "0B3E2B0A-EB1E-45C3-BC2C-9E32268A0867", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6953:*:*:*:*:*:*", matchCriteriaId: "E1BD2753-52B8-4EB0-8332-C67935FB8B47", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6954:*:*:*:*:*:*", matchCriteriaId: "E8BD08BF-4E5D-4DE4-A499-B0296C126599", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6955:*:*:*:*:*:*", matchCriteriaId: "F13CB227-496C-4777-BE76-27AFF5ED15C2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6956:*:*:*:*:*:*", matchCriteriaId: "2AB1DF8F-3385-40C6-92C5-10724F8A6911", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6957:*:*:*:*:*:*", matchCriteriaId: "C1997DE8-8CFA-4882-9107-741B88339A67", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6970:*:*:*:*:*:*", matchCriteriaId: "148F6458-136D-4612-9619-F51AEEC11AA6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6971:*:*:*:*:*:*", matchCriteriaId: "8B189696-D6BC-475B-90CA-AF122224FEAA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6972:*:*:*:*:*:*", matchCriteriaId: "477C97EC-A497-4C7C-973B-2C057A9242AD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6973:*:*:*:*:*:*", matchCriteriaId: "284F5D9D-F23F-4936-B461-10701CC3AB7C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6974:*:*:*:*:*:*", matchCriteriaId: "74CE0145-F165-4FB4-A819-01B30641196A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6975:*:*:*:*:*:*", matchCriteriaId: "CA291C44-616B-45D9-9709-61CD33E8B135", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6976:*:*:*:*:*:*", matchCriteriaId: "C1C7492E-5D5B-419D-9749-7CC6EE5BC0FE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6977:*:*:*:*:*:*", matchCriteriaId: "DCF1B243-DA58-42CD-9DF4-6D4A010796D8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6978:*:*:*:*:*:*", matchCriteriaId: "2B73FD0F-6B48-406E-AB29-606CC07C81C2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6979:*:*:*:*:*:*", matchCriteriaId: "CED2C49D-DB96-4495-BD6F-460871D94EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6980:*:*:*:*:*:*", matchCriteriaId: "C9AAC638-1379-4F87-9BA3-07CE16CAB98A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6981:*:*:*:*:*:*", matchCriteriaId: "B3470B5B-B8BC-41B9-8CA5-5E7A0EB9934F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.9:6982:*:*:*:*:*:*", matchCriteriaId: "3A2D9355-B1D5-4B14-8900-42E7C8DC5E4E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_key_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "BB1E5798-5079-4292-9C11-2F334F8AC825", versionEndExcluding: "6.4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_key_manager_plus:6.4:6400:*:*:*:*:*:*", matchCriteriaId: "37D11E5C-C569-4D9F-BFF8-315F6D458D68", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:*:*:*:*:*:*:*:*", matchCriteriaId: "1478BFC3-A0B2-415B-BA1C-AA09D9451C93", versionEndExcluding: "5.7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5700:*:*:*:*:*:*", matchCriteriaId: "1E270FB5-C447-4C93-9947-2CE50850A46B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5710:*:*:*:*:*:*", matchCriteriaId: "496AFB26-1E11-4632-8C10-CD80F601FCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5711:*:*:*:*:*:*", matchCriteriaId: "B2CE86DA-B688-4E9E-AF16-1974858D18BF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5712:*:*:*:*:*:*", matchCriteriaId: "4BFA2F57-4506-4B3D-86E8-BE9BEC1134B4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "76C7DC97-8BF1-421F-9272-FD301D2D7A3F", versionEndExcluding: "12.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12100:*:*:*:*:*:*", matchCriteriaId: "9BE65B96-74ED-48F1-B86D-CB3387D989CB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12101:*:*:*:*:*:*", matchCriteriaId: "B4127640-1F60-4687-A24A-22B05A125290", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12110:*:*:*:*:*:*", matchCriteriaId: "E42928FB-E0E7-4951-B9B1-CEF60560A945", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12120:*:*:*:*:*:*", matchCriteriaId: "43C059E6-E1CA-4792-B383-93062CD82D66", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12121:*:*:*:*:*:*", matchCriteriaId: "8D21A9EB-51BC-4EEA-BAA4-8C2096A9DDD5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12122:*:*:*:*:*:*", matchCriteriaId: "6C34175B-0978-4207-BFC0-F38FDFF9B3D5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12123:*:*:*:*:*:*", matchCriteriaId: "6CAB911E-5CE6-47BA-9909-C42BDFEE0F5E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "FB1A6B88-6EE0-41F2-9FB6-243DFB52F92A", versionEndExcluding: "14.0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.0:14000:*:*:*:*:*:*", matchCriteriaId: "23A6549A-A30E-4693-9BAB-2685DB8C40BC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.0:14001:*:*:*:*:*:*", matchCriteriaId: "71CED256-A0EF-4933-AE18-421E37D5DB16", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.0:14002:*:*:*:*:*:*", matchCriteriaId: "2EEAFF47-78C6-4F48-BD89-CD2B02D420DC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.0:14003:*:*:*:*:*:*", matchCriteriaId: "E3E8FEC0-688A-4BA6-9B4A-C59AD7FDAF8F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:*:*:*:*:*:*:*:*", matchCriteriaId: "969E1FCF-76A0-40BC-A38F-56FCB713419F", versionEndExcluding: "13.0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:13.0:13000:*:*:*:*:*:*", matchCriteriaId: "298E6401-A9A9-43B6-901F-327944E0AF94", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11017:*:*:*:*:*:*", matchCriteriaId: "35366F60-D6E2-4B29-B593-D24079CE6831", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11018:*:*:*:*:*:*", matchCriteriaId: "CB60E016-82DD-41EC-85F9-D4F37AF1F8E3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11019:*:*:*:*:*:*", matchCriteriaId: "9B83E37C-B1F6-4CEB-8A8E-39E24BE8B59C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11020:*:*:*:*:*:*", matchCriteriaId: "80B62BA0-2CF1-4828-99A9-7DD13CFCB9BE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11021:*:*:*:*:*:*", matchCriteriaId: "7F529DB6-4D30-49F8-BFE2-C10C1A899917", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11022:*:*:*:*:*:*", matchCriteriaId: "4EA25296-8163-4C98-A8CD-35834240308E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11024:*:*:*:*:*:*", matchCriteriaId: "33D51403-A976-4EA3-AA23-C699E03239E2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11025:*:*:*:*:*:*", matchCriteriaId: "D86A2E8A-1689-4E6E-B50B-E16CBCEB0C23", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_application_control_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "B8F5E8E6-B1AA-4454-86D3-648B67CA915E", versionEndExcluding: "10.1.220.18", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_browser_security_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "98FAA4DE-2C24-4ED4-9F2C-84CEA3200E31", versionEndExcluding: "11.1.2238.6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_device_control_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "8239C2A0-BA6D-4B5C-B02F-617178685D52", versionEndExcluding: "10.1.2220.18", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_endpoint_dlp_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "4CA4E3A8-CAB3-461E-8A99-F7D115B17E71", versionEndExcluding: "10.1.2137.6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_os_deployer:*:*:*:*:*:*:*:*", matchCriteriaId: "53EC71FA-E248-4DA5-BA76-746631AC435E", versionEndExcluding: "1.1.2243.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "5784980D-CEBB-4982-BD1F-FD8F5F2A039C", versionEndExcluding: "10.1.2220.18", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_remote_access_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "06A9F459-2C86-4646-B87C-A55381E0939F", versionEndExcluding: "10.1.2228.11", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_remote_monitoring_and_management_central:*:*:*:*:*:*:*:*", matchCriteriaId: "5D851B9A-EE8F-4634-A26D-BCC44B5CF02A", versionEndExcluding: "10.1.41", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_vulnerability_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "450E672F-FA36-4770-87B6-CC8DA66D2222", versionEndExcluding: "10.1.2220.18", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections. This affects Access Manager Plus before 4308, Active Directory 360 before 4310, ADAudit Plus before 7081, ADManager Plus before 7162, ADSelfService Plus before 6211, Analytics Plus before 5150, Application Control Plus before 10.1.2220.18, Asset Explorer before 6983, Browser Security Plus before 11.1.2238.6, Device Control Plus before 10.1.2220.18, Endpoint Central before 10.1.2228.11, Endpoint Central MSP before 10.1.2228.11, Endpoint DLP before 10.1.2137.6, Key Manager Plus before 6401, OS Deployer before 1.1.2243.1, PAM 360 before 5713, Password Manager Pro before 12124, Patch Manager Plus before 10.1.2220.18, Remote Access Plus before 10.1.2228.11, Remote Monitoring and Management (RMM) before 10.1.41. ServiceDesk Plus before 14004, ServiceDesk Plus MSP before 13001, SupportCenter Plus before 11026, and Vulnerability Manager Plus before 10.1.2220.18. Exploitation is only possible if SAML SSO has ever been configured for a product (for some products, exploitation requires that SAML SSO is currently active).", }, { lang: "es", value: "Múltiples productos locales de Zoho ManageEngine, como ServiceDesk Plus hasta 14003, permiten la ejecución remota de código debido al uso de Apache Santuario xmlsec (también conocido como XML Security para Java) 1.4.1, porque las funciones xmlsec XSLT, por diseño en esa versión, hacen la aplicación responsable de ciertas protecciones de seguridad, y las aplicaciones ManageEngine no proporcionaban esas protecciones. Esto afecta a Access Manager Plus anterior a 4308, Active Directory 360 anterior a 4310, ADAudit Plus anterior a 7081, ADManager Plus anterior a 7162, ADSelfService Plus anterior a 6211, Analytics Plus anterior a 5150, Application Control Plus anterior a 10.1.2220.18, Asset Explorer anterior a 6983, Browser Security Plus antes de 11.1.2238.6, Device Control Plus antes de 10.1.2220.18, Endpoint Central antes de 10.1.2228.11, Endpoint Central MSP antes de 10.1.2228.11, Endpoint DLP antes de 10.1.2137.6, Key Manager Plus antes de 6401, OS Deployer antes de 1.1.2243.1, PAM 360 antes de 5713, Password Manager Pro antes de 12124, Patch Manager Plus antes de 10.1.2220.18, Remote Access Plus antes de 10.1.2228.11, Remote Monitoring and Management (RMM) antes de 10.1.41. ServiceDesk Plus anterior a 14004, ServiceDesk Plus MSP anterior a 13001, SupportCenter Plus anterior a 11026 y Vulnerability Manager Plus anterior a 10.1.2220.18. La explotación solo es posible si alguna vez se ha configurado SAML SSO para un producto (para algunos productos, la explotación requiere que SAML SSO esté actualmente activo).\n", }, ], id: "CVE-2022-47966", lastModified: "2025-03-07T21:04:52.037", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-01-18T18:15:10.570", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://blog.viettelcybersecurity.com/saml-show-stopper/", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://github.com/apache/santuario-xml-security-java/tags?after=1.4.6", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/horizon3ai/CVE-2022-47966", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://blog.viettelcybersecurity.com/saml-show-stopper/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/apache/santuario-xml-security-java/tags?after=1.4.6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/horizon3ai/CVE-2022-47966", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2014-12-05 15:59
Modified
2024-11-21 02:09
Severity ?
Summary
SQL injection vulnerability in the MetadataServlet servlet in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition 5 through 7 build 7003, IT360 and IT360 Managed Service Providers (MSP) edition before 10.3.3 build 10330, and possibly other ManageEngine products, allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the sv parameter to MetadataServlet.dat.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2014/Aug/55 | Exploit, Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2014/Aug/85 | Exploit, Mailing List, Third Party Advisory | |
cve@mitre.org | https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt | Exploit | |
cve@mitre.org | https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2014/Aug/55 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2014/Aug/85 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb | Exploit |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.0:*:*:*:-:*:*:*", matchCriteriaId: "A5E5F536-9AB1-4D3F-A8DC-6242AF30DB19", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.1:*:*:*:-:*:*:*", matchCriteriaId: "4CEE22EB-EB76-4B56-A118-C204EA0F106D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.2:*:*:*:-:*:*:*", matchCriteriaId: "75EDFEEE-694C-488B-A6F8-95B0D1360E69", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.3:*:*:*:-:*:*:*", matchCriteriaId: "E197858B-2FB6-471C-88B9-2C69BA6A2090", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.4:*:*:*:-:*:*:*", matchCriteriaId: "5A0CC732-5D68-4890-BC3B-B02DA372FD54", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.0:*:*:*:-:*:*:*", matchCriteriaId: "FA458408-3EFA-439D-9EFD-84A4C5B477B1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.0:build6002:*:*:-:*:*:*", matchCriteriaId: "BCC8AAA2-B079-43C7-BC3E-920954AF5685", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.1:build6104:*:*:-:*:*:*", matchCriteriaId: "1F91875D-75A0-4823-84DC-C082567CA84E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.2:*:*:*:-:*:*:*", matchCriteriaId: "2DFF99B9-C5D0-44A1-B54B-301CA1704CA6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.2:build6201:*:*:-:*:*:*", matchCriteriaId: "27071ED3-C20D-4B9D-9442-44EC9D6E8DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.3:*:*:*:-:*:*:*", matchCriteriaId: "655D238F-5345-42FB-8031-8EB48664AC30", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:*:*:*:-:*:*:*", matchCriteriaId: "3DD9310B-3D5B-4A16-A0D6-F604F76E1100", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6401:*:*:-:*:*:*", matchCriteriaId: "B5F16F44-2426-43B9-BE33-4E7FEA7036FC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6402:*:*:-:*:*:*", matchCriteriaId: "90E96158-B75D-40C2-A5E7-493974A2AEED", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6403:*:*:-:*:*:*", matchCriteriaId: "50DD364E-2817-487F-A2F3-F29AF3EFB8D7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6404:*:*:-:*:*:*", matchCriteriaId: "70077945-E672-4831-A81B-AB4778256D3C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:*:*:*:-:*:*:*", matchCriteriaId: "73887589-69A9-4FEF-8BC5-89BD7EDBF924", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6503:*:*:-:*:*:*", matchCriteriaId: "B9DFFF51-430B-4FCA-9B14-DD0DC4322E35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6504:*:*:-:*:*:*", matchCriteriaId: "6553FBD9-7E29-4663-9DCC-1F5AC8C215AF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6505:*:*:-:*:*:*", matchCriteriaId: "B865BD30-39E6-4674-8DF4-5971A63B24AB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.6:build6600:*:*:-:*:*:*", matchCriteriaId: "55FD92EC-8065-4CBF-8370-B28B3E81C005", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.7:build6700:*:*:-:*:*:*", matchCriteriaId: "73CA5EFF-EF35-4030-830C-4D492DC440D6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.7:build6701:*:*:-:*:*:*", matchCriteriaId: "F4E376B5-D710-44FB-A3BA-CBF96781D1CB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6800:*:*:-:*:*:*", matchCriteriaId: "AB784C5F-B0E1-4942-8D96-510419D789CF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6801:*:*:-:*:*:*", matchCriteriaId: "E1DA7102-44CE-44EE-8750-05C12061E437", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6802:*:*:-:*:*:*", matchCriteriaId: "B147154E-3960-44D8-8BE8-7A6DF5192ED2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6803:*:*:-:*:*:*", matchCriteriaId: "3135E48F-1CF2-4DC6-A066-BEBED1664205", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:*:*:*:-:*:*:*", matchCriteriaId: "75B96AEC-BB98-44A1-A118-710DA71CDCC1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6900:*:*:-:*:*:*", matchCriteriaId: "47491EFB-44B0-45C2-A50E-55F9BDC6052B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6901:*:*:-:*:*:*", matchCriteriaId: "472440BF-EFA4-4959-B671-2F7D653D324D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6902:*:*:-:*:*:*", matchCriteriaId: "4369642E-9DD7-4181-8F1C-89C340BFBE2E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6903:*:*:-:*:*:*", matchCriteriaId: "B6AB46C0-5570-4C8D-BF45-12475310020E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6904:*:*:-:*:*:*", matchCriteriaId: "7A6F8938-C37C-4B7F-9A12-A82640C69CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:*:*:*:-:*:*:*", matchCriteriaId: "1603D672-C8ED-42A5-84AF-B8B7818BE9E4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7000:*:*:-:*:*:*", matchCriteriaId: "F7041071-8EBB-4B4D-99EA-E7CA6B6021E1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7001:*:*:-:*:*:*", matchCriteriaId: "15A26E93-897D-4E2B-9A59-A4BAEB0F05B8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7002:*:*:-:*:*:*", matchCriteriaId: "3A31DA9A-3F01-40E2-8564-AE515B83D974", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7003:*:*:-:*:*:*", matchCriteriaId: "DEE65B08-E206-4D2A-B274-C8C03910BF15", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:-:*:*:*", matchCriteriaId: "ECF59D56-5CC9-414B-9CE1-DB53E9282ADF", versionEndIncluding: "10.3.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "FA790610-402F-413B-8BF8-8357193E27A4", versionEndIncluding: "10.3.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.0:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "6A2D0F09-5F20-473F-98C3-DA31B5A7AAF5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.1:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "2CBE694B-0B6D-4C4C-87AC-7FE0F88F211E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.2:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "50FB56D1-D150-47F9-B8DB-2EA27A6220B8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.3:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "BB57288B-2688-4FAB-B1C3-AF3C208B4C87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.4:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3075719E-D879-42E5-B604-F1F0A14CA197", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.0:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "1FA339F7-ED6B-4514-91F7-0BB38F29CD0F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.0:build6002:*:*:managed_service_providers:*:*:*", matchCriteriaId: "D6CC265D-2D91-4A19-87F7-904B920106DD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.1:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "B01FB0FC-9705-462B-8A5C-69D5D52C8EBF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.1:build6104:*:*:managed_service_providers:*:*:*", matchCriteriaId: "133BDD75-D6CB-40CD-B1CF-6D5678E1DEFE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.2:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "FDECD276-38D9-4EF6-8BF2-DC79BFB9E8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.2:build6201:*:*:managed_service_providers:*:*:*", matchCriteriaId: "A9CCC8F7-3508-4136-9F94-5B6443D35B5E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.3:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "A1C40444-0385-4F96-976C-5D59CA88E7CD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "019FA9DB-4FDD-42FE-8E1E-8E22A32EC518", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6401:*:*:managed_service_providers:*:*:*", matchCriteriaId: "862C8B61-3B4A-447C-A286-40FCA3E921CF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6402:*:*:managed_service_providers:*:*:*", matchCriteriaId: "8D035C4F-F0BA-4A67-ABE1-C2DF3F3C42A1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6403:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C79C8547-72A8-49EF-93DC-0CA932B3720C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6404:*:*:managed_service_providers:*:*:*", matchCriteriaId: "45A56669-35DF-4E77-8A56-B5DDD4073A5E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "E122344B-C813-43DF-A9A0-DE1293A0BC35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6503:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3BB0010E-6553-4BA2-A9C9-D7F5A6DC14F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6504:*:*:managed_service_providers:*:*:*", matchCriteriaId: "F5270D44-D7C0-4CB7-A72C-393225A33005", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6505:*:*:managed_service_providers:*:*:*", matchCriteriaId: "23AD6263-D363-44BD-BDF8-5DACBFA7AA49", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.6:build6600:*:*:managed_service_providers:*:*:*", matchCriteriaId: "6F801D6A-ABB1-4B20-A027-545AF3B7BA83", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.7:build6700:*:*:managed_service_providers:*:*:*", matchCriteriaId: "94C0DB11-19DD-4A65-8A29-F6401E788B62", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.7:build6701:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3B7A79E9-FD83-493B-8928-7BF4C7611977", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6800:*:*:managed_service_providers:*:*:*", matchCriteriaId: "576F4055-FDCD-426C-8A8C-F4F944847873", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6801:*:*:managed_service_providers:*:*:*", matchCriteriaId: "EFFAA39D-1DEB-4728-A481-62A13F585F70", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6802:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C2D7736E-5F5B-4155-B8F5-2C37A9DD4059", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6803:*:*:managed_service_providers:*:*:*", matchCriteriaId: "F76B409F-5994-4DDD-A5E5-920F5C8EEE43", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "81915238-4492-4726-95F2-D50741A4B400", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6900:*:*:managed_service_providers:*:*:*", matchCriteriaId: "BD5C993F-4D25-4BF9-8577-19F84FB22F25", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6901:*:*:managed_service_providers:*:*:*", matchCriteriaId: "183FA742-E32E-4A0C-95DD-53FE7925B489", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6902:*:*:managed_service_providers:*:*:*", matchCriteriaId: "2A1FD798-614B-43C1-9E22-DF4F63AAB10D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6903:*:*:managed_service_providers:*:*:*", matchCriteriaId: "80BECF57-5EC5-41E5-9489-755FABD5AB64", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6904:*:*:managed_service_providers:*:*:*", matchCriteriaId: "04ED9F67-3A2A-4713-BFEB-357D8C480CA7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "AE1102C2-99A2-4992-B8FF-233927BFB942", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7000:*:*:managed_service_providers:*:*:*", matchCriteriaId: "E73F239A-5C13-431B-9F8E-EA53B5DE990B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7001:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C12F95B5-94C2-4FB2-A0C0-B51BAF651410", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7002:*:*:managed_service_providers:*:*:*", matchCriteriaId: "DC0767D1-877A-47F7-AF43-C2073DB2F70F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7003:*:*:managed_service_providers:*:*:*", matchCriteriaId: "2F8FDB70-0622-4258-B365-F682A6B0AA2E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection vulnerability in the MetadataServlet servlet in ManageEngine Password Manager Pro (PMP) and Password Manager Pro Managed Service Providers (MSP) edition 5 through 7 build 7003, IT360 and IT360 Managed Service Providers (MSP) edition before 10.3.3 build 10330, and possibly other ManageEngine products, allows remote attackers or remote authenticated users to execute arbitrary SQL commands via the sv parameter to MetadataServlet.dat.", }, { lang: "es", value: "Vulnerabilidad de inyección SQL en el servlet MetadataServlet en la edición ManageEngine Password Manager Pro (PMP) y Password Manager Pro Managed Service Providers (MSP) 5 hasta 7 build 7003, la edición IT360 y IT360 Managed Service Providers (MSP) anterior a 10.3.3 build 10330, y posiblemente otros productos ManageEngine, permite a atacantes remotos o usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través del parámetro sv en MetadataServlet.dat.", }, ], id: "CVE-2014-3997", lastModified: "2024-11-21T02:09:18.147", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-12-05T15:59:01.353", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2014/Aug/55", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2014/Aug/85", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2014/Aug/55", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2014/Aug/85", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-16 13:15
Modified
2024-11-21 06:06
Severity ?
Summary
In Zoho ManageEngine Password Manager Pro before 11.1 build 11104, attackers are able to retrieve credentials via a browser extension for non-website resource types.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.manageengine.com | Vendor Advisory | |
cve@mitre.org | https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11104 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11104 | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_password_manager_pro | * | |
zohocorp | manageengine_password_manager_pro | 11.1 | |
zohocorp | manageengine_password_manager_pro | 11.1 | |
zohocorp | manageengine_password_manager_pro | 11.1 | |
zohocorp | manageengine_password_manager_pro | 11.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "BF3F9A2A-5595-4AF2-BECD-A95AF2063C10", versionEndExcluding: "11.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:-:*:*:*:*:*:*", matchCriteriaId: "7BA95690-4351-4EDF-B794-2D3B7F89DCFF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11101:*:*:*:*:*:*", matchCriteriaId: "564A39DB-D202-4223-97E9-E6378CE69013", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11102:*:*:*:*:*:*", matchCriteriaId: "8C7BA06B-AA80-4276-912F-FF6BFE252E23", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11103:*:*:*:*:*:*", matchCriteriaId: "6BCAD9CA-5C31-442D-9E50-D2B992907362", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Zoho ManageEngine Password Manager Pro before 11.1 build 11104, attackers are able to retrieve credentials via a browser extension for non-website resource types.", }, { lang: "es", value: "En Zoho ManageEngine Password Manager Pro versiones anteriores a 11.1 build 11104, unos atacantes son capaces de recuperar credenciales por medio de una extensión del navegador para tipos de recursos que no son del sitio web", }, ], id: "CVE-2021-31857", lastModified: "2024-11-21T06:06:22.123", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-16T13:15:11.927", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11104", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11104", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-04-28 20:15
Modified
2025-01-13 16:23
Severity ?
Summary
Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass on a few Rest API URLs (for SSOutAction. SSLAction. LicenseMgr. GetProductDetails. GetDashboard. FetchEvents. and Synchronize) via the ../RestAPI substring.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html | Vendor Advisory | |
cve@mitre.org | https://www.tenable.com/security/research/tra-2022-14 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2022-14 | Exploit, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.0:build4000:*:*:*:*:*:*", matchCriteriaId: "44296707-E77D-492A-BDA5-A8B29498A6A4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.1:build4100:*:*:*:*:*:*", matchCriteriaId: "8B75058A-D530-471C-B02D-F5DCD10BF608", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.1:build4101:*:*:*:*:*:*", matchCriteriaId: "C75E408E-8CF4-4AB0-8832-3BF0CEA0620F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4200:*:*:*:*:*:*", matchCriteriaId: "92B4C025-B3AF-4991-935A-773662F01EA6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4201:*:*:*:*:*:*", matchCriteriaId: "FB6AB14A-CF17-44A2-A32F-4E1DBBAC8AAF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4202:*:*:*:*:*:*", matchCriteriaId: "B2793FC1-CA8B-4AC5-B470-4454FB1F1A23", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4203:*:*:*:*:*:*", matchCriteriaId: "FA799225-17EF-49DE-A5B0-2EABB957CD4E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*", matchCriteriaId: "D5DEC045-6A7E-4041-88F8-5ABC4AB51C29", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*", matchCriteriaId: "52DDE5D9-28DE-446F-A402-7BE3C33A4B35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4001:*:*:*:*:*:*", matchCriteriaId: "3EE9114D-B6D8-430F-855C-CF1D3AB3157D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4002:*:*:*:*:*:*", matchCriteriaId: "BA3B9724-2C69-49CD-9916-F43B22CB194E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4100:*:*:*:*:*:*", matchCriteriaId: "C0384D4E-26C7-447B-84D3-9E38E7FC7F66", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4101:*:*:*:*:*:*", matchCriteriaId: "8CDCC599-19C7-4AA7-84BB-2120EDC9FCBA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4500:*:*:*:*:*:*", matchCriteriaId: "1545BCA4-88C9-4D0D-82E5-DB3D9F21601F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4501:*:*:*:*:*:*", matchCriteriaId: "02A19736-57EC-454C-8838-E0A9752DD468", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5000:*:*:*:*:*:*", matchCriteriaId: "22E8183E-8ACC-40C6-8EF3-253E4A2E63FA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5001:*:*:*:*:*:*", matchCriteriaId: "C4532F06-14BF-4EC5-9A7E-AD934FE69ABF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5002:*:*:*:*:*:*", matchCriteriaId: "D951BC8D-AF9A-4F2A-A801-3A5EDAB1A5E6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5003:*:*:*:*:*:*", matchCriteriaId: "3AE0A2E4-71A2-447F-9496-D1B9D1D748A5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5004:*:*:*:*:*:*", matchCriteriaId: "BADE0425-A94E-4621-BF9D-F3A1219C4D57", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.1:build5100:*:*:*:*:*:*", matchCriteriaId: "331DB356-27EA-4DF8-8A29-C9C8E75E4EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.2:build5200:*:*:*:*:*:*", matchCriteriaId: "2C655F9A-C769-413E-9211-E89BADE1A509", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5300:*:*:*:*:*:*", matchCriteriaId: "11523C00-D2EE-4E2D-AFF9-546C77A29CE5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5301:*:*:*:*:*:*", matchCriteriaId: "F72FB8EA-A643-4295-92F3-4F64C31820D5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5302:*:*:*:*:*:*", matchCriteriaId: "6A20B1E4-F212-4771-8774-DA8085B35829", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.4:build5400:*:*:*:*:*:*", matchCriteriaId: "131FFFF9-79B7-42C7-BECC-397C6AC1C418", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10103:*:*:*:*:*:*", matchCriteriaId: "E4DA1517-9C49-4E46-9BE4-7B6A9B9CA71D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10104:*:*:*:*:*:*", matchCriteriaId: "D56A0C6E-8865-409D-A7F3-600A466CB7F4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.2:build10200:*:*:*:*:*:*", matchCriteriaId: "92DCA776-14CD-4258-8804-1C531966F8FB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10300:*:*:*:*:*:*", matchCriteriaId: "38BB8CEB-43AE-43FC-80E9-1FD5D518C822", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10301:*:*:*:*:*:*", matchCriteriaId: "A5DBA962-E485-47FB-8C06-B74B28417E87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10302:*:*:*:*:*:*", matchCriteriaId: "E34CD968-6820-4D24-A792-F272E4A582BE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10400:*:*:*:*:*:*", matchCriteriaId: "EBE9858E-817C-4E40-B880-4B466272FD87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10401:*:*:*:*:*:*", matchCriteriaId: "5B94A45F-595F-4F2A-83C9-501DDFDF1DC3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10402:*:*:*:*:*:*", matchCriteriaId: "EA1DD26C-22D3-45F4-B877-605B56379A0B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:11104:*:*:*:*:*:*", matchCriteriaId: "550C1332-D1DC-4709-9F87-1A7F4EE08EEA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11101:*:*:*:*:*:*", matchCriteriaId: "564A39DB-D202-4223-97E9-E6378CE69013", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11102:*:*:*:*:*:*", matchCriteriaId: "8C7BA06B-AA80-4276-912F-FF6BFE252E23", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11103:*:*:*:*:*:*", matchCriteriaId: "6BCAD9CA-5C31-442D-9E50-D2B992907362", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:build11200:*:*:*:*:*:*", matchCriteriaId: "FBB91B4D-EA5E-4FE3-8A2A-2A4DCB2340B9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:build11201:*:*:*:*:*:*", matchCriteriaId: "4CA1C194-0258-42EB-BD9F-87D5CA602008", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.3:build11300:*:*:*:*:*:*", matchCriteriaId: "1AC71CFB-5AF2-4C0F-8C92-01C883BE271F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.3:build11301:*:*:*:*:*:*", matchCriteriaId: "B1203498-41EA-43C9-9F6A-63BBD6955C83", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12000:*:*:*:*:*:*", matchCriteriaId: "5B722DB9-4258-4994-B498-0A4E1D3B3F8E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12001:*:*:*:*:*:*", matchCriteriaId: "2C9E0BBA-DCC1-47A6-A329-2E7D363F840C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12002:*:*:*:*:*:*", matchCriteriaId: "D8011EC7-EEAE-4F0E-AD76-EE2C9F8BF807", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12003:*:*:*:*:*:*", matchCriteriaId: "5404C39E-BD07-40AF-9467-10F4D0CB5F14", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12004:*:*:*:*:*:*", matchCriteriaId: "C4D42670-966F-445D-A2E3-0E728B287FCB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12005:*:*:*:*:*:*", matchCriteriaId: "3C6F70E1-5B52-457C-A321-F11EC1075E6F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12006:*:*:*:*:*:*", matchCriteriaId: "122B23D8-973E-40E6-85B1-E5107DA0F088", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass on a few Rest API URLs (for SSOutAction. SSLAction. LicenseMgr. GetProductDetails. GetDashboard. FetchEvents. and Synchronize) via the ../RestAPI substring.", }, { lang: "es", value: "Zoho ManageEngine Access Manager Plus versiones anteriores a 4302, Password Manager Pro versiones anteriores a 12007 y PAM360 versiones anteriores a 5401 son vulnerables a una omisión del control de acceso en algunas URL de la API Rest (para SSOutAction. SSLAction. LicenseMgr. GetProductDetails. GetDashboard. FetchEvents. y Synchronize) por medio de la subcadena ../RestAPI", }, ], id: "CVE-2022-29081", lastModified: "2025-01-13T16:23:00.453", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-04-28T20:15:08.017", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.tenable.com/security/research/tra-2022-14", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.tenable.com/security/research/tra-2022-14", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Undergoing Analysis", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-06-18 22:15
Modified
2024-11-21 04:22
Severity ?
Summary
Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_analytics_plus:1.0:*:*:*:*:*:*:*", matchCriteriaId: "14FAD4FD-CD54-4FE7-A849-A4837D3413B1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_browser_security_plus:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB71331-CB4A-41FD-AC26-90F833ED9D52", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_desktop_central:10.0.380:*:*:*:*:*:*:*", matchCriteriaId: "643C7F9E-F838-421C-BB13-ECCFDF073C91", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:12.0.2:*:*:*:*:*:*:*", matchCriteriaId: "67C97619-847C-43B7-ADC8-B9B9833FA5DD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall:12.0:*:*:*:*:*:*:*", matchCriteriaId: "5FCF81E8-5FEE-4178-9FB0-49CB377329BB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_key_manager_plus:5.6:*:*:*:*:*:*:*", matchCriteriaId: "ABCFC9E0-7B46-46AB-87D4-596993A15859", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:9.0.0:*:*:*:*:*:*:*", matchCriteriaId: "2B2AF501-8A1A-4BB8-B796-0AFCF379B23A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:11.0:*:*:*:*:*:*:*", matchCriteriaId: "26D0B03D-B7B2-4E45-837A-C29DF895C065", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:11.0:*:*:*:*:*:*:*", matchCriteriaId: "AB014B4E-EB9B-4B71-9E9C-EB28E254FBB6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_o365_manager_plus:4.0:*:*:*:*:*:*:*", matchCriteriaId: "2F7C3D36-6C00-488D-B862-68EC243A9348", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*", matchCriteriaId: "11843753-531F-4D94-AC7F-F23D6EC8728F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:11.0:*:*:*:*:*:*:*", matchCriteriaId: "B1B6B47F-EE8C-49C7-B2FF-B886C2D68849", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.9:*:*:*:*:*:*:*", matchCriteriaId: "3E409911-AB1C-47CA-9E69-484B7E16FC17", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:*:*:*:*:*:*:*", matchCriteriaId: "DC1451EC-1F96-42AF-BEC9-0D370E827643", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_manager_plus:9.0.0:*:*:*:*:*:*:*", matchCriteriaId: "F64E8AC1-A456-46B8-8940-A200C328A7EF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:10.0.0:*:*:*:*:*:*:*", matchCriteriaId: "8AD30D38-181E-4397-98DF-A7BE8D745A10", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:8.1:*:*:*:*:*:*:*", matchCriteriaId: "457BE370-7CAF-4010-AC8C-A059F4892408", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_vulnerability_manager_plus:9.0.0:*:*:*:*:*:*:*", matchCriteriaId: "D50F7EAA-D965-4C81-867C-FE4FC0DC9BB9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.", }, { lang: "es", value: "Varios productos Zoho ManageEngine sufren una escalada de privilegios locales debido a permisos inapropiados para el directorio %SYSTEMDRIVE%\\ManageEngine y sus subcarpetas. Además, los servicios asociados con dichos productos intentan ejecutar archivos binarios como sc.exe desde el directorio actual durante un inicio de sistema. Esto permitirá efectivamente a los usuarios no privilegiados escalar sus privilegios a NT AUTHORITY\\SYSTEM. Esto afecta a Desktop Central versión 10.0.380, EventLog Analyzer versión 12.0.2, ServiceDesk Plus versión 10.0.0, SupportCenter Plus versión 8.1, O365 Manager Plus versión 4.0, Mobile Device Manager Plus versión 9.0.0, Patch Connect Plus versión 9.0.0, Vulnerability Manager Plus versión 9.0.0 , Patch Manager Plus versión 9.0.0, OpManager versión 12.3, NetFlow Analyzer versión 11.0, OpUtils versión 11.0, Network Configuration Manager versión 11.0, FireWall versión 12.0, Key Manager Plus versión 5.6, Password Manager Pro versión 9.9, Analytics Plus versión 1.0 y Browser Security Plus.", }, ], id: "CVE-2019-12133", lastModified: "2024-11-21T04:22:17.113", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-06-18T22:15:12.027", references: [ { source: "cve@mitre.org", url: "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-427", }, { lang: "en", value: "CWE-732", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-01-05 08:15
Modified
2024-11-21 07:32
Severity ?
Summary
Zoho ManageEngine Access Manager Plus before 4309, Password Manager Pro before 12210, and PAM360 before 5801 are vulnerable to SQL Injection.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "8B2A2278-0B89-44FB-9D95-30647BBA63D3", versionEndExcluding: "12.2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.2:build12200:*:*:*:*:*:*", matchCriteriaId: "45976216-66CF-45D6-9940-280594D711D1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:*:*:*:*:*:*:*:*", matchCriteriaId: "19340150-5197-4F06-96EF-FE4A29AE2B9B", versionEndExcluding: "5.8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.8:build5800:*:*:*:*:*:*", matchCriteriaId: "17933D57-20D9-47A0-B29C-5B06D0B90F92", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "5FDF15FF-2561-4139-AC5E-4812584B1B03", versionEndExcluding: "4.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*", matchCriteriaId: "D5DEC045-6A7E-4041-88F8-5ABC4AB51C29", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*", matchCriteriaId: "52DDE5D9-28DE-446F-A402-7BE3C33A4B35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4302:*:*:*:*:*:*", matchCriteriaId: "F6E1E4D8-B7F0-4BDB-B5A2-55436BEC85F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4303:*:*:*:*:*:*", matchCriteriaId: "59675CC4-8A5C-4668-908C-0886B4B310DC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4304:*:*:*:*:*:*", matchCriteriaId: "45084336-F1DC-4E5B-A45E-506A779985D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4305:*:*:*:*:*:*", matchCriteriaId: "1B2CC071-5BB3-4A25-88F2-DBC56B94D895", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4306:*:*:*:*:*:*", matchCriteriaId: "E6FDF373-4711-4B72-A14E-CEB19301C40F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4307:*:*:*:*:*:*", matchCriteriaId: "0E0F346C-0445-4D38-8583-3379962B540F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4308:*:*:*:*:*:*", matchCriteriaId: "18B78BDC-0EAA-4781-8D62-01E47AA3BF40", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Zoho ManageEngine Access Manager Plus before 4309, Password Manager Pro before 12210, and PAM360 before 5801 are vulnerable to SQL Injection.", }, { lang: "es", value: "Zoho ManageEngine Access Manager Plus anterior a 4309, Password Manager Pro anterior a 12210 y PAM360 anterior a 5801 son vulnerables a la inyección SQL.", }, ], id: "CVE-2022-47523", lastModified: "2024-11-21T07:32:08.650", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-01-05T08:15:08.877", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.manageengine.com/privileged-session-management/advisory/cve-2022-47523.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.manageengine.com/privileged-session-management/advisory/cve-2022-47523.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-03-16 22:15
Modified
2024-11-21 05:40
Severity ?
Summary
Zoho ManageEngine Password Manager Pro through 10.x has a CSV Excel Macro Injection vulnerability via a crafted name that is mishandled by the Export Passwords feature. NOTE: the vendor disputes the significance of this report because they expect CSV risk mitigation to be provided by an external application, and do not plan to add CSV constraints to their own products
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:-:*:*:*:*:*:*", matchCriteriaId: "4C9B2448-E35C-4198-A389-11F46D98907C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:build10001:*:*:*:*:*:*", matchCriteriaId: "422EF4FC-F29E-4166-9EA0-C34BA3F160B6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10100:*:*:*:*:*:*", matchCriteriaId: "5E6B99B8-4B22-40D6-8E9B-7E51C4E0BC03", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10101:*:*:*:*:*:*", matchCriteriaId: "E8DAC87D-4501-47B9-A3EE-7AC28646377B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10102:*:*:*:*:*:*", matchCriteriaId: "83A397DA-91F0-42E9-8066-DBC2A02C680A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10103:*:*:*:*:*:*", matchCriteriaId: "E4DA1517-9C49-4E46-9BE4-7B6A9B9CA71D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10104:*:*:*:*:*:*", matchCriteriaId: "D56A0C6E-8865-409D-A7F3-600A466CB7F4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.2:build10200:*:*:*:*:*:*", matchCriteriaId: "92DCA776-14CD-4258-8804-1C531966F8FB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10300:*:*:*:*:*:*", matchCriteriaId: "38BB8CEB-43AE-43FC-80E9-1FD5D518C822", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10301:*:*:*:*:*:*", matchCriteriaId: "A5DBA962-E485-47FB-8C06-B74B28417E87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10302:*:*:*:*:*:*", matchCriteriaId: "E34CD968-6820-4D24-A792-F272E4A582BE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:-:*:*:*:*:*:*", matchCriteriaId: "310987F7-216C-47DC-9AEA-F383D31B2F8C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10400:*:*:*:*:*:*", matchCriteriaId: "EBE9858E-817C-4E40-B880-4B466272FD87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10401:*:*:*:*:*:*", matchCriteriaId: "5B94A45F-595F-4F2A-83C9-501DDFDF1DC3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10402:*:*:*:*:*:*", matchCriteriaId: "EA1DD26C-22D3-45F4-B877-605B56379A0B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [ { sourceIdentifier: "cve@mitre.org", tags: [ "disputed", ], }, ], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro through 10.x has a CSV Excel Macro Injection vulnerability via a crafted name that is mishandled by the Export Passwords feature. NOTE: the vendor disputes the significance of this report because they expect CSV risk mitigation to be provided by an external application, and do not plan to add CSV constraints to their own products", }, { lang: "es", value: "** EN DISPUTA ** Zoho ManageEngine Password Manager Pro hasta la versión de 10.x tiene una vulnerabilidad de inyección de macro en Excel CSV a través de un nombre especialmente diseñado que es mal manejado por la función Exportar contraseñas. NOTA: el proveedor cuestiona la importancia de este informe porque espera que una aplicación externa proporcione la mitigación del riesgo de CSV y no planea agregar restricciones de CSV a sus propios productos.", }, ], id: "CVE-2020-9347", lastModified: "2024-11-21T05:40:27.633", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-03-16T22:15:15.247", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.x_CSV_Excel_Macro_Injection.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.x_CSV_Excel_Macro_Injection.txt", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-1236", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-12 04:15
Modified
2024-11-21 07:27
Severity ?
Summary
Zoho ManageEngine Password Manager Pro before 12122, PAM360 before 5711, and Access Manager Plus before 4306 allow SQL Injection.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "5FDF15FF-2561-4139-AC5E-4812584B1B03", versionEndExcluding: "4.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*", matchCriteriaId: "D5DEC045-6A7E-4041-88F8-5ABC4AB51C29", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*", matchCriteriaId: "52DDE5D9-28DE-446F-A402-7BE3C33A4B35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4302:*:*:*:*:*:*", matchCriteriaId: "F6E1E4D8-B7F0-4BDB-B5A2-55436BEC85F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4303:*:*:*:*:*:*", matchCriteriaId: "59675CC4-8A5C-4668-908C-0886B4B310DC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4304:*:*:*:*:*:*", matchCriteriaId: "45084336-F1DC-4E5B-A45E-506A779985D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4305:*:*:*:*:*:*", matchCriteriaId: "1B2CC071-5BB3-4A25-88F2-DBC56B94D895", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:*:*:*:*:*:*:*:*", matchCriteriaId: "1478BFC3-A0B2-415B-BA1C-AA09D9451C93", versionEndExcluding: "5.7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5700:*:*:*:*:*:*", matchCriteriaId: "1E270FB5-C447-4C93-9947-2CE50850A46B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5710:*:*:*:*:*:*", matchCriteriaId: "496AFB26-1E11-4632-8C10-CD80F601FCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "76C7DC97-8BF1-421F-9272-FD301D2D7A3F", versionEndExcluding: "12.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12100:*:*:*:*:*:*", matchCriteriaId: "9BE65B96-74ED-48F1-B86D-CB3387D989CB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12101:*:*:*:*:*:*", matchCriteriaId: "B4127640-1F60-4687-A24A-22B05A125290", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12110:*:*:*:*:*:*", matchCriteriaId: "E42928FB-E0E7-4951-B9B1-CEF60560A945", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12120:*:*:*:*:*:*", matchCriteriaId: "43C059E6-E1CA-4792-B383-93062CD82D66", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12121:*:*:*:*:*:*", matchCriteriaId: "8D21A9EB-51BC-4EEA-BAA4-8C2096A9DDD5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro before 12122, PAM360 before 5711, and Access Manager Plus before 4306 allow SQL Injection.", }, { lang: "es", value: "Zoho ManageEngine Password Manager Pro anterior a 12122, PAM360 anterior a 5711 y Access Manager Plus anterior a 4306 permiten la inyección SQL.", }, ], id: "CVE-2022-43671", lastModified: "2024-11-21T07:27:00.770", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-12T04:15:10.057", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-43671.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-43671.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2015-07-08 15:59
Modified
2024-11-21 02:33
Severity ?
Summary
SQL injection vulnerability in the AdvanceSearch.class in AdventNetPassTrix.jar in ManageEngine Password Manager Pro (PMP) before 8.1 Build 8101 allows remote authenticated users to execute arbitrary SQL commands via the ANDOR parameter, as demonstrated by a request to STATE_ID/1425543888647/SQLAdvancedALSearchResult.cc.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_password_manager_pro | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "7150117C-B22E-4F9C-9275-A63C7DF3840B", versionEndIncluding: "8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection vulnerability in the AdvanceSearch.class in AdventNetPassTrix.jar in ManageEngine Password Manager Pro (PMP) before 8.1 Build 8101 allows remote authenticated users to execute arbitrary SQL commands via the ANDOR parameter, as demonstrated by a request to STATE_ID/1425543888647/SQLAdvancedALSearchResult.cc.", }, { lang: "es", value: "Vulnerabilidad de inyección SQL en AdvanceSearch.class en AdventNetPassTrix.jar en ManageEngine Password Manager Pro (PMP) anterior a 8.1 Build 8101 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través del parámetro ANDOR, tal y como fue demostrado por una solicitud a STATE_ID/1425543888647/SQLAdvancedALSearchResult.cc.", }, ], id: "CVE-2015-5459", lastModified: "2024-11-21T02:33:02.693", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2015-07-08T15:59:12.347", references: [ { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://packetstormsecurity.com/files/132511/ManageEngine-Password-Manager-Pro-8.1-SQL-Injection.html", }, { source: "cve@mitre.org", url: "http://seclists.org/fulldisclosure/2015/Jul/19", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://seclists.org/fulldisclosure/2015/Jun/104", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/75692", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://packetstormsecurity.com/files/132511/ManageEngine-Password-Manager-Pro-8.1-SQL-Injection.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://seclists.org/fulldisclosure/2015/Jul/19", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://seclists.org/fulldisclosure/2015/Jun/104", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/75692", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-16 23:15
Modified
2025-01-13 16:23
Severity ?
Summary
Zoho ManageEngine Password Manager Pro through 12120 before 12121, PAM360 through 5550 before 5600, and Access Manager Plus through 4304 before 4305 have multiple SQL injection vulnerabilities.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.0:build4000:*:*:*:*:*:*", matchCriteriaId: "44296707-E77D-492A-BDA5-A8B29498A6A4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.1:build4100:*:*:*:*:*:*", matchCriteriaId: "8B75058A-D530-471C-B02D-F5DCD10BF608", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.1:build4101:*:*:*:*:*:*", matchCriteriaId: "C75E408E-8CF4-4AB0-8832-3BF0CEA0620F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4200:*:*:*:*:*:*", matchCriteriaId: "92B4C025-B3AF-4991-935A-773662F01EA6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4201:*:*:*:*:*:*", matchCriteriaId: "FB6AB14A-CF17-44A2-A32F-4E1DBBAC8AAF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4202:*:*:*:*:*:*", matchCriteriaId: "B2793FC1-CA8B-4AC5-B470-4454FB1F1A23", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4203:*:*:*:*:*:*", matchCriteriaId: "FA799225-17EF-49DE-A5B0-2EABB957CD4E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*", matchCriteriaId: "D5DEC045-6A7E-4041-88F8-5ABC4AB51C29", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*", matchCriteriaId: "52DDE5D9-28DE-446F-A402-7BE3C33A4B35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4302:*:*:*:*:*:*", matchCriteriaId: "F6E1E4D8-B7F0-4BDB-B5A2-55436BEC85F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4303:*:*:*:*:*:*", matchCriteriaId: "59675CC4-8A5C-4668-908C-0886B4B310DC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4304:*:*:*:*:*:*", matchCriteriaId: "45084336-F1DC-4E5B-A45E-506A779985D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:*:*:*:*:*:*:*", matchCriteriaId: "AB937707-FD53-491F-A9F6-BD4C53561921", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4001:*:*:*:*:*:*", matchCriteriaId: "3EE9114D-B6D8-430F-855C-CF1D3AB3157D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4002:*:*:*:*:*:*", matchCriteriaId: "BA3B9724-2C69-49CD-9916-F43B22CB194E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:*:*:*:*:*:*:*", matchCriteriaId: "D434061A-4282-49CE-AC4C-01C3784E1BE9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4100:*:*:*:*:*:*", matchCriteriaId: "C0384D4E-26C7-447B-84D3-9E38E7FC7F66", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4101:*:*:*:*:*:*", matchCriteriaId: "8CDCC599-19C7-4AA7-84BB-2120EDC9FCBA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:*:*:*:*:*:*:*", matchCriteriaId: "C4AD81D8-8F30-48CC-A859-15EC143BACE4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4500:*:*:*:*:*:*", matchCriteriaId: "1545BCA4-88C9-4D0D-82E5-DB3D9F21601F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4501:*:*:*:*:*:*", matchCriteriaId: "02A19736-57EC-454C-8838-E0A9752DD468", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:*:*:*:*:*:*:*", matchCriteriaId: "77A7FA46-518F-4519-81FE-00FDE3C257F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5000:*:*:*:*:*:*", matchCriteriaId: "22E8183E-8ACC-40C6-8EF3-253E4A2E63FA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5001:*:*:*:*:*:*", matchCriteriaId: "C4532F06-14BF-4EC5-9A7E-AD934FE69ABF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5002:*:*:*:*:*:*", matchCriteriaId: "D951BC8D-AF9A-4F2A-A801-3A5EDAB1A5E6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5003:*:*:*:*:*:*", matchCriteriaId: "3AE0A2E4-71A2-447F-9496-D1B9D1D748A5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5004:*:*:*:*:*:*", matchCriteriaId: "BADE0425-A94E-4621-BF9D-F3A1219C4D57", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.1:*:*:*:*:*:*:*", matchCriteriaId: "67B092E1-F298-4ED1-BEC3-7F9ABC6D10B1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.1:build5100:*:*:*:*:*:*", matchCriteriaId: "331DB356-27EA-4DF8-8A29-C9C8E75E4EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.2:*:*:*:*:*:*:*", matchCriteriaId: "B1202736-A94B-4046-ABC9-BBC89CCD1F09", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.2:build5200:*:*:*:*:*:*", matchCriteriaId: "2C655F9A-C769-413E-9211-E89BADE1A509", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:*:*:*:*:*:*:*", matchCriteriaId: "328C12F2-B818-46E5-A273-C043B54D200D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5300:*:*:*:*:*:*", matchCriteriaId: "11523C00-D2EE-4E2D-AFF9-546C77A29CE5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5301:*:*:*:*:*:*", matchCriteriaId: "F72FB8EA-A643-4295-92F3-4F64C31820D5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5302:*:*:*:*:*:*", matchCriteriaId: "6A20B1E4-F212-4771-8774-DA8085B35829", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5303:*:*:*:*:*:*", matchCriteriaId: "3AB8972E-3D17-4D01-BA26-82D73824CB3E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5304:*:*:*:*:*:*", matchCriteriaId: "DB4425CD-6A3A-4AFE-BFE6-1186AA689940", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5305:*:*:*:*:*:*", matchCriteriaId: "F8359FA6-0E5C-48BB-8EFA-CC29513F374D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5306:*:*:*:*:*:*", matchCriteriaId: "30342322-9774-43F4-8F18-4C0334BA54D1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.4:build5400:*:*:*:*:*:*", matchCriteriaId: "131FFFF9-79B7-42C7-BECC-397C6AC1C418", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.4:build5401:*:*:*:*:*:*", matchCriteriaId: "7630BA98-9A38-4CFC-BFAB-8A9A95434CC6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.5:build5500:*:*:*:*:*:*", matchCriteriaId: "0D1A2884-93DD-45FD-8024-81E007AEE787", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.5:build5510:*:*:*:*:*:*", matchCriteriaId: "DCEA34E7-49DE-4CE8-AC77-8242F48CBB4E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.5:build5520:*:*:*:*:*:*", matchCriteriaId: "C62233EB-AD38-40D7-B92E-CB4ED49C6F19", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.5:build5550:*:*:*:*:*:*", matchCriteriaId: "9CECA910-DA9B-4ED7-AD10-B1416EE0F6E0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:4.6:build4600:*:*:-:*:*:*", matchCriteriaId: "8B23AAEC-8232-49BB-ACF6-59E58C1DD8D1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:4.6:build4600:*:*:managed_service_providers:*:*:*", matchCriteriaId: "A97E8936-E630-442F-B898-14EF111FBD63", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:4.7:build4700:*:*:-:*:*:*", matchCriteriaId: "C65820E1-1D09-416E-B8F9-C60B5C69962D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:4.7:build4700:*:*:managed_service_providers:*:*:*", matchCriteriaId: "72928CAF-32E0-448C-875C-E47B22B25721", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:4.8:build4803:*:*:-:*:*:*", matchCriteriaId: "4254268C-D40A-444F-B887-E5CCD0336604", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:4.8:build4803:*:*:managed_service_providers:*:*:*", matchCriteriaId: "47107E96-A7F0-4902-BC1D-B3CDE5B347D3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.0:*:*:*:-:*:*:*", matchCriteriaId: "A5E5F536-9AB1-4D3F-A8DC-6242AF30DB19", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.0:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "6A2D0F09-5F20-473F-98C3-DA31B5A7AAF5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.1:*:*:*:-:*:*:*", matchCriteriaId: "4CEE22EB-EB76-4B56-A118-C204EA0F106D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.1:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "2CBE694B-0B6D-4C4C-87AC-7FE0F88F211E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.2:*:*:*:-:*:*:*", matchCriteriaId: "75EDFEEE-694C-488B-A6F8-95B0D1360E69", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.2:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "50FB56D1-D150-47F9-B8DB-2EA27A6220B8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.3:*:*:*:-:*:*:*", matchCriteriaId: "E197858B-2FB6-471C-88B9-2C69BA6A2090", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.3:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "BB57288B-2688-4FAB-B1C3-AF3C208B4C87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.4:*:*:*:-:*:*:*", matchCriteriaId: "5A0CC732-5D68-4890-BC3B-B02DA372FD54", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:5.4:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3075719E-D879-42E5-B604-F1F0A14CA197", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.0:*:*:*:-:*:*:*", matchCriteriaId: "FA458408-3EFA-439D-9EFD-84A4C5B477B1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.0:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "1FA339F7-ED6B-4514-91F7-0BB38F29CD0F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.0:build6002:*:*:-:*:*:*", matchCriteriaId: "BCC8AAA2-B079-43C7-BC3E-920954AF5685", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.0:build6002:*:*:managed_service_providers:*:*:*", matchCriteriaId: "D6CC265D-2D91-4A19-87F7-904B920106DD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.1:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "B01FB0FC-9705-462B-8A5C-69D5D52C8EBF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.1:build6104:*:*:-:*:*:*", matchCriteriaId: "1F91875D-75A0-4823-84DC-C082567CA84E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.1:build6104:*:*:managed_service_providers:*:*:*", matchCriteriaId: "133BDD75-D6CB-40CD-B1CF-6D5678E1DEFE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.2:*:*:*:-:*:*:*", matchCriteriaId: "2DFF99B9-C5D0-44A1-B54B-301CA1704CA6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.2:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "FDECD276-38D9-4EF6-8BF2-DC79BFB9E8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.2:build6201:*:*:-:*:*:*", matchCriteriaId: "27071ED3-C20D-4B9D-9442-44EC9D6E8DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.2:build6201:*:*:managed_service_providers:*:*:*", matchCriteriaId: "A9CCC8F7-3508-4136-9F94-5B6443D35B5E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.3:*:*:*:-:*:*:*", matchCriteriaId: "655D238F-5345-42FB-8031-8EB48664AC30", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.3:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "A1C40444-0385-4F96-976C-5D59CA88E7CD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:*:*:*:-:*:*:*", matchCriteriaId: "3DD9310B-3D5B-4A16-A0D6-F604F76E1100", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "019FA9DB-4FDD-42FE-8E1E-8E22A32EC518", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6401:*:*:-:*:*:*", matchCriteriaId: "B5F16F44-2426-43B9-BE33-4E7FEA7036FC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6401:*:*:managed_service_providers:*:*:*", matchCriteriaId: "862C8B61-3B4A-447C-A286-40FCA3E921CF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6402:*:*:-:*:*:*", matchCriteriaId: "90E96158-B75D-40C2-A5E7-493974A2AEED", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6402:*:*:managed_service_providers:*:*:*", matchCriteriaId: "8D035C4F-F0BA-4A67-ABE1-C2DF3F3C42A1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6403:*:*:-:*:*:*", matchCriteriaId: "50DD364E-2817-487F-A2F3-F29AF3EFB8D7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6403:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C79C8547-72A8-49EF-93DC-0CA932B3720C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6404:*:*:-:*:*:*", matchCriteriaId: "70077945-E672-4831-A81B-AB4778256D3C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6404:*:*:managed_service_providers:*:*:*", matchCriteriaId: "45A56669-35DF-4E77-8A56-B5DDD4073A5E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:*:*:*:-:*:*:*", matchCriteriaId: "73887589-69A9-4FEF-8BC5-89BD7EDBF924", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "E122344B-C813-43DF-A9A0-DE1293A0BC35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6503:*:*:-:*:*:*", matchCriteriaId: "B9DFFF51-430B-4FCA-9B14-DD0DC4322E35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6503:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3BB0010E-6553-4BA2-A9C9-D7F5A6DC14F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6504:*:*:-:*:*:*", matchCriteriaId: "6553FBD9-7E29-4663-9DCC-1F5AC8C215AF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6504:*:*:managed_service_providers:*:*:*", matchCriteriaId: "F5270D44-D7C0-4CB7-A72C-393225A33005", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6505:*:*:-:*:*:*", matchCriteriaId: "B865BD30-39E6-4674-8DF4-5971A63B24AB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6505:*:*:managed_service_providers:*:*:*", matchCriteriaId: "23AD6263-D363-44BD-BDF8-5DACBFA7AA49", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.6:build6600:*:*:-:*:*:*", matchCriteriaId: "55FD92EC-8065-4CBF-8370-B28B3E81C005", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.6:build6600:*:*:managed_service_providers:*:*:*", matchCriteriaId: "6F801D6A-ABB1-4B20-A027-545AF3B7BA83", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.7:build6700:*:*:-:*:*:*", matchCriteriaId: "73CA5EFF-EF35-4030-830C-4D492DC440D6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.7:build6700:*:*:managed_service_providers:*:*:*", matchCriteriaId: "94C0DB11-19DD-4A65-8A29-F6401E788B62", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.7:build6701:*:*:-:*:*:*", matchCriteriaId: "F4E376B5-D710-44FB-A3BA-CBF96781D1CB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.7:build6701:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3B7A79E9-FD83-493B-8928-7BF4C7611977", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6800:*:*:-:*:*:*", matchCriteriaId: "AB784C5F-B0E1-4942-8D96-510419D789CF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6800:*:*:managed_service_providers:*:*:*", matchCriteriaId: "576F4055-FDCD-426C-8A8C-F4F944847873", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6801:*:*:-:*:*:*", matchCriteriaId: "E1DA7102-44CE-44EE-8750-05C12061E437", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6801:*:*:managed_service_providers:*:*:*", matchCriteriaId: "EFFAA39D-1DEB-4728-A481-62A13F585F70", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6802:*:*:-:*:*:*", matchCriteriaId: "B147154E-3960-44D8-8BE8-7A6DF5192ED2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6802:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C2D7736E-5F5B-4155-B8F5-2C37A9DD4059", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6803:*:*:-:*:*:*", matchCriteriaId: "3135E48F-1CF2-4DC6-A066-BEBED1664205", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6803:*:*:managed_service_providers:*:*:*", matchCriteriaId: "F76B409F-5994-4DDD-A5E5-920F5C8EEE43", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:*:*:*:-:*:*:*", matchCriteriaId: "75B96AEC-BB98-44A1-A118-710DA71CDCC1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "81915238-4492-4726-95F2-D50741A4B400", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6900:*:*:-:*:*:*", matchCriteriaId: "47491EFB-44B0-45C2-A50E-55F9BDC6052B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6900:*:*:managed_service_providers:*:*:*", matchCriteriaId: "BD5C993F-4D25-4BF9-8577-19F84FB22F25", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6901:*:*:-:*:*:*", matchCriteriaId: "472440BF-EFA4-4959-B671-2F7D653D324D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6901:*:*:managed_service_providers:*:*:*", matchCriteriaId: "183FA742-E32E-4A0C-95DD-53FE7925B489", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6902:*:*:-:*:*:*", matchCriteriaId: "4369642E-9DD7-4181-8F1C-89C340BFBE2E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6902:*:*:managed_service_providers:*:*:*", matchCriteriaId: "2A1FD798-614B-43C1-9E22-DF4F63AAB10D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6903:*:*:-:*:*:*", matchCriteriaId: "B6AB46C0-5570-4C8D-BF45-12475310020E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6903:*:*:managed_service_providers:*:*:*", matchCriteriaId: "80BECF57-5EC5-41E5-9489-755FABD5AB64", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6904:*:*:-:*:*:*", matchCriteriaId: "7A6F8938-C37C-4B7F-9A12-A82640C69CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6904:*:*:managed_service_providers:*:*:*", matchCriteriaId: "04ED9F67-3A2A-4713-BFEB-357D8C480CA7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:*:*:*:-:*:*:*", matchCriteriaId: "1603D672-C8ED-42A5-84AF-B8B7818BE9E4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "AE1102C2-99A2-4992-B8FF-233927BFB942", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7000:*:*:-:*:*:*", matchCriteriaId: "F7041071-8EBB-4B4D-99EA-E7CA6B6021E1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7000:*:*:managed_service_providers:*:*:*", matchCriteriaId: "E73F239A-5C13-431B-9F8E-EA53B5DE990B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7001:*:*:-:*:*:*", matchCriteriaId: "15A26E93-897D-4E2B-9A59-A4BAEB0F05B8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7001:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C12F95B5-94C2-4FB2-A0C0-B51BAF651410", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7002:*:*:-:*:*:*", matchCriteriaId: "3A31DA9A-3F01-40E2-8564-AE515B83D974", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7002:*:*:managed_service_providers:*:*:*", matchCriteriaId: "DC0767D1-877A-47F7-AF43-C2073DB2F70F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7003:*:*:-:*:*:*", matchCriteriaId: "DEE65B08-E206-4D2A-B274-C8C03910BF15", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7003:*:*:managed_service_providers:*:*:*", matchCriteriaId: "2F8FDB70-0622-4258-B365-F682A6B0AA2E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:*:*:*:-:*:*:*", matchCriteriaId: "E2278698-CE31-46AE-9978-D8DC13FDF460", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:*:*:*:managed_service_providers:*:*:*", matchCriteriaId: "4272B431-084A-4155-848D-92DB2C5E839F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7100:*:*:-:*:*:*", matchCriteriaId: "30C3F9AA-8201-423E-ACDE-489E022985CE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7100:*:*:managed_service_providers:*:*:*", matchCriteriaId: "F0C2DF84-EF55-40DC-8894-56C651B3E60A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7101:*:*:-:*:*:*", matchCriteriaId: "6D594817-7871-494C-843D-AE7476F39ECD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7101:*:*:managed_service_providers:*:*:*", matchCriteriaId: "60C677CC-7812-4058-8A86-A3E08554B918", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7102:*:*:-:*:*:*", matchCriteriaId: "36869425-4E82-4A0B-99D2-1D5993733C13", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7102:*:*:managed_service_providers:*:*:*", matchCriteriaId: "A9E28217-0C2B-42ED-8D90-DE483CB7CBEC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7103:*:*:-:*:*:*", matchCriteriaId: "01761B79-E58D-4C40-8764-B6BAFEDF1839", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7103:*:*:managed_service_providers:*:*:*", matchCriteriaId: "807F96A6-CAB3-42C1-AA47-9E79D9AE1BE6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7104:*:*:-:*:*:*", matchCriteriaId: "A48B389E-1210-4D26-8936-FEEFF5BA2F25", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7104:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C1967F96-2185-4513-9EE3-D533D7572F7F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7105:*:*:-:*:*:*", matchCriteriaId: "B98BEF15-61E3-4F80-A00F-764758F2D33E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7105:*:*:managed_service_providers:*:*:*", matchCriteriaId: "1FFD787D-F5F2-4D2E-BDE8-F5583E0C17F4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.5:build7500:*:*:-:*:*:*", matchCriteriaId: "3B2A61BF-441C-407B-B003-2FD04690726B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.5:build7500:*:*:managed_service_providers:*:*:*", matchCriteriaId: "62788F83-CDAA-4A35-BF81-53164C926552", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.5:build7501:*:*:-:*:*:*", matchCriteriaId: "942C5555-4C3C-4F34-9681-B85B93D26FA7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.5:build7501:*:*:managed_service_providers:*:*:*", matchCriteriaId: "05C4336B-B017-4322-BD61-2FCDB6E08DFD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.6:build7600:*:*:-:*:*:*", matchCriteriaId: "DE77A9B7-06AE-4437-8156-7161BF1E1615", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.6:build7600:*:*:managed_service_providers:*:*:*", matchCriteriaId: "0D50FFD2-DE7D-40AD-A1CB-66E38D976C8A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.0:build8000:*:*:-:*:*:*", matchCriteriaId: "31260CA9-D26C-4306-9D2D-9C1A8063B243", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.0:build8000:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3EBADE2F-38ED-41AA-BCF3-11E5D2A93A76", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.0:build8001:*:*:-:*:*:*", matchCriteriaId: "5A541087-6CAF-4780-960E-84BE68234895", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.0:build8001:*:*:managed_service_providers:*:*:*", matchCriteriaId: "788FBECC-ADC0-4BF4-BB07-31DB06724B20", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.1:build8100:*:*:-:*:*:*", matchCriteriaId: "89C81231-713F-4546-8697-FD0BCDC9C442", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.1:build8100:*:*:managed_service_providers:*:*:*", matchCriteriaId: "0720BD98-26AA-4768-84AB-2E6411D37D0B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.1:build8101:*:*:-:*:*:*", matchCriteriaId: "832B36F6-1F11-4BE6-8F68-2EFB0ACDD108", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.1:build8101:*:*:managed_service_providers:*:*:*", matchCriteriaId: "BE99C3C9-3FF7-4A30-9D2F-5E81CC74B6B5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.1:build8102:*:*:-:*:*:*", matchCriteriaId: "84C574B2-5859-4459-AAF7-4A3AFF60677F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.1:build8102:*:*:managed_service_providers:*:*:*", matchCriteriaId: "4A5974B3-0C17-4E6E-B6D3-CAA1C9EF3936", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.2:build8200:*:*:-:*:*:*", matchCriteriaId: "BC908D83-C0FA-4F0A-9F57-96EE09452A73", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.2:build8200:*:*:managed_service_providers:*:*:*", matchCriteriaId: "131DBD8D-4A0D-478A-A4A3-D65026B5826A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8300:*:*:-:*:*:*", matchCriteriaId: "C9C21549-9CD4-4771-9486-C44EBF71037E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8300:*:*:managed_service_providers:*:*:*", matchCriteriaId: "363B65F8-AA3F-4D07-96F2-25C36FC1F895", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8301:*:*:-:*:*:*", matchCriteriaId: "561731F9-6670-472E-9666-A3DB1B4A1760", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8301:*:*:managed_service_providers:*:*:*", matchCriteriaId: "01599BDB-AFA7-47F9-8D3F-3B3F5873E31D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8302:*:*:-:*:*:*", matchCriteriaId: "BCEEDB1C-A853-4BED-B079-A904EE687D40", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8302:*:*:managed_service_providers:*:*:*", matchCriteriaId: "6BC9DBD8-5559-4A78-AF4B-06F230B52720", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8303:*:*:-:*:*:*", matchCriteriaId: "8A0DFBC4-0822-4012-811E-E9C3CA636DC9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8303:*:*:managed_service_providers:*:*:*", matchCriteriaId: "B06730A6-8AF1-4050-9F5A-3B8C01E83821", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8041:*:*:-:*:*:*", matchCriteriaId: "C43DF755-9EC2-4394-B357-FF2E44A38B25", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8041:*:*:managed_service_providers:*:*:*", matchCriteriaId: "679D98CA-E540-470A-8A6E-55556C8D80D0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8400:*:*:-:*:*:*", matchCriteriaId: "8DF43C1E-0383-4B68-B8B4-C86F2666E54C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8400:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C04B08B3-EA6E-4451-B8C3-1EDD433CC99E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8402:*:*:-:*:*:*", matchCriteriaId: "A9DBC517-13BD-420E-8382-D939B5CC2EE4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8402:*:*:managed_service_providers:*:*:*", matchCriteriaId: "965F61D0-588C-43F0-A4F5-C30C43740E3C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8403:*:*:-:*:*:*", matchCriteriaId: "72E64F5B-5632-424D-9E42-F2C4F43156FC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8403:*:*:managed_service_providers:*:*:*", matchCriteriaId: "E1B03F09-2337-4D37-840E-F29E2E913B51", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8404:*:*:-:*:*:*", matchCriteriaId: "6D81508C-7470-4FB4-A0C3-01A1FEB78BCC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8404:*:*:managed_service_providers:*:*:*", matchCriteriaId: "FADEF2A7-4F64-43E1-BD98-DAFE33567D88", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8500:*:*:-:*:*:*", matchCriteriaId: "C32ADF8B-CEFC-4020-AF79-12ABEE460586", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8500:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3CC0D91B-8858-4792-B238-5BD26A695504", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8501:*:*:-:*:*:*", matchCriteriaId: "5E8092D0-5D9F-4C1A-82C4-7A0C3120C880", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8501:*:*:managed_service_providers:*:*:*", matchCriteriaId: "78B13DC0-F5E1-4D87-8B4F-BD26A51CF939", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8502:*:*:-:*:*:*", matchCriteriaId: "DADB620F-DA29-44E4-92DB-714FF224ACA9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8502:*:*:managed_service_providers:*:*:*", matchCriteriaId: "8F9DF4DF-2FB3-4EE0-BE08-838E726AE0C4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8503:*:*:-:*:*:*", matchCriteriaId: "F2E3E7D7-FF81-4B65-98E3-2794696B73F6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8503:*:*:managed_service_providers:*:*:*", matchCriteriaId: "2607FFAD-323E-43B2-91D1-E50D39424E1D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8504:*:*:-:*:*:*", matchCriteriaId: "4E09899E-2E68-4608-9B67-A09B8602D94F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8504:*:*:managed_service_providers:*:*:*", matchCriteriaId: "AE42ECE1-8F61-4E78-9FD1-6BD6924C68AE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8505:*:*:-:*:*:*", matchCriteriaId: "77F50904-8B96-4775-93CE-0ECC9E2202C8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8505:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3A45F004-B808-4651-A593-07176D4E814B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8600:*:*:-:*:*:*", matchCriteriaId: "D0CDD8BD-040F-48C8-94C7-F8531376CCCE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8600:*:*:managed_service_providers:*:*:*", matchCriteriaId: "864AAAEE-4B5A-4B30-9EB7-28BE5659BA9E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8601:*:*:-:*:*:*", matchCriteriaId: "9DB535EA-2AB3-4C68-A019-6CD234C43601", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8601:*:*:managed_service_providers:*:*:*", matchCriteriaId: "7C08C295-C691-4241-95AC-6C320826ED69", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8602:*:*:-:*:*:*", matchCriteriaId: "29514D57-4107-4D2B-A08B-F6E530628B02", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8602:*:*:managed_service_providers:*:*:*", matchCriteriaId: "15C755BD-549F-43A6-8772-4BF6A10E82F2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8603:*:*:-:*:*:*", matchCriteriaId: "25F841AE-7697-4800-8B9C-75A78C847E16", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8603:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C6C8D60C-071D-4138-BEFC-97F131AF63A9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8604:*:*:-:*:*:*", matchCriteriaId: "8CD70E27-AC4B-4F77-B76C-323D7043CD3A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8604:*:*:managed_service_providers:*:*:*", matchCriteriaId: "784E46D8-E7B4-47E7-A014-58569B8A24F9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8700:*:*:-:*:*:*", matchCriteriaId: "9F4D24B6-1D55-4256-B652-9886288844FF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8700:*:*:managed_service_providers:*:*:*", matchCriteriaId: "298249E5-67DD-4EAF-9FF5-3A93F5B82901", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8701:*:*:-:*:*:*", matchCriteriaId: "A67E3918-5472-4808-A67C-E2A1AC172176", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8701:*:*:managed_service_providers:*:*:*", matchCriteriaId: "94976CEC-5C09-4F3A-AB5F-EC346313EA27", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8702:*:*:-:*:*:*", matchCriteriaId: "F5494B4D-D17C-4206-988B-ACE79330443E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8702:*:*:managed_service_providers:*:*:*", matchCriteriaId: "02E7F021-2850-4385-91F6-418091E41BB2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8703:*:*:-:*:*:*", matchCriteriaId: "D2CB80B3-8DA9-4506-81D4-ECC37A5C7623", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8703:*:*:managed_service_providers:*:*:*", matchCriteriaId: "B283040C-784D-4F49-86AF-C32C3C6AE4C5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8704:*:*:-:*:*:*", matchCriteriaId: "D75C750D-1D43-4A3B-B723-3F774AF891DF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8704:*:*:managed_service_providers:*:*:*", matchCriteriaId: "F8F41188-AD29-4C89-866A-5C7EE29F4E25", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:-:*:*:*:*:*:*", matchCriteriaId: "84CCF040-19D4-4FC3-8267-AE2AA1191BAC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9000:*:*:-:*:*:*", matchCriteriaId: "EB907752-0135-43AA-B062-2EFBE8071A9F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9000:*:*:managed_service_providers:*:*:*", matchCriteriaId: "2AADA665-BFF5-4393-9533-120F8224B660", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9001:*:*:-:*:*:*", matchCriteriaId: "09F7354D-9163-4076-90D5-C2DA329F280D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9001:*:*:managed_service_providers:*:*:*", matchCriteriaId: "A32E3026-1C67-47E2-84A8-7F39FA6486F4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9002:*:*:-:*:*:*", matchCriteriaId: "6601C8CB-0AB7-47F7-A86B-F84DD721292D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9002:*:*:managed_service_providers:*:*:*", matchCriteriaId: "56A10718-A22F-4D55-8F09-F55E52E5C73F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9003:*:*:-:*:*:*", matchCriteriaId: "A2B16103-93EB-410D-8950-ADEA90AC56F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9003:*:*:managed_service_providers:*:*:*", matchCriteriaId: "F1F84BCC-7EB6-4F03-893B-BF9770ECF5AF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.1:-:*:*:*:*:*:*", matchCriteriaId: "26C7F987-3061-40B8-BBB3-C46DB0C9D842", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.1:build9100:*:*:-:*:*:*", matchCriteriaId: "E319A0B8-4C02-458A-9F2A-17FEBCECD1F5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.1:build9100:*:*:managed_service_providers:*:*:*", matchCriteriaId: "552D203E-9FB8-4173-9A1E-52554AC6D71D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.1:build9101:*:*:-:*:*:*", matchCriteriaId: "C8FDA2BC-944A-4F1D-A6EA-BBB3B11C782F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.1:build9101:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C96DC9E7-F9DC-47A0-9509-15E627B955D8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.2:-:*:*:*:*:*:*", matchCriteriaId: "BC327395-FC18-4D5E-9C80-D79CE4501FD6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.2:build9200:*:*:-:*:*:*", matchCriteriaId: "329C898E-0E06-4079-889B-226B63359855", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.2:build9200:*:*:managed_service_providers:*:*:*", matchCriteriaId: "BEC977C4-800D-4014-8D3F-0E9E7E4EF4B1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.3:-:*:*:*:*:*:*", matchCriteriaId: "20D326A8-87C2-4B64-93C8-6E2B14671E8E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.3:build9300:*:*:-:*:*:*", matchCriteriaId: "7BA8CEA7-45C8-467C-9E84-ECA11697F09D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.3:build9300:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C62C38E3-FB8F-4029-AAD1-2DC7248D20E9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.4:build9400:*:*:-:*:*:*", matchCriteriaId: "15B7CE98-C0D0-47F6-93B5-FC711AA21E5E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.4:build9400:*:*:managed_service_providers:*:*:*", matchCriteriaId: "0A6050E9-9F09-451B-BE50-A7293B1E8DBD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.4:build9401:*:*:-:*:*:*", matchCriteriaId: "8D823ACF-6F24-445A-B479-7E483B96276B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.4:build9401:*:*:managed_service_providers:*:*:*", matchCriteriaId: "5EF2494B-F2F6-4F9F-BA56-B35FD7CB838E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.4:build9402:*:*:-:*:*:*", matchCriteriaId: "F3EA0FD7-3B6D-4C68-9D43-1AC16FED51DD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.4:build9402:*:*:managed_service_providers:*:*:*", matchCriteriaId: "E8F66FA9-CB6D-4499-AF8C-F4857A3BAEB4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.5:build9500:*:*:-:*:*:*", matchCriteriaId: "BD6D4AED-62D9-4913-9C1C-39C02839CB2C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.5:build9500:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3DA5C7B8-7800-4E67-8579-30813205B479", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.5:build9501:*:*:-:*:*:*", matchCriteriaId: "42C7801B-DB30-4840-A165-3C39D22D60EE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.5:build9501:*:*:managed_service_providers:*:*:*", matchCriteriaId: "7B4FB502-7F61-4027-AA7B-8EF3AB6A4970", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.5:build9502:*:*:-:*:*:*", matchCriteriaId: "2945B423-933A-49C2-BC94-9BA03368D3FF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.5:build9502:*:*:managed_service_providers:*:*:*", matchCriteriaId: "3FDB100A-31E3-43A5-B164-CF8D49E2ECB4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.6:build9600:*:*:-:*:*:*", matchCriteriaId: "E99050B1-4357-434A-89A8-2F8FAF8C4925", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.6:build9600:*:*:managed_service_providers:*:*:*", matchCriteriaId: "C65551CE-73B4-4A9D-BB7E-15650A37E8FC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.6:build9601:*:*:-:*:*:*", matchCriteriaId: "3BBAF19B-90A4-4DA0-8CB2-92881835D5B9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.6:build9601:*:*:managed_service_providers:*:*:*", matchCriteriaId: "41831FE9-4361-47A8-B865-D30AC87106AD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.7:build9700:*:*:-:*:*:*", matchCriteriaId: "2FBA0979-37EE-4A05-AE92-9DF76DF4D0EB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.7:build9700:*:*:managed_service_providers:*:*:*", matchCriteriaId: "A4C05B80-6F5D-48B3-8A30-A92D25464C36", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.7:build9701:*:*:-:*:*:*", matchCriteriaId: "6F3A51B2-17EF-40D2-9EF4-7853DA02BB1B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.7:build9701:*:*:managed_service_providers:*:*:*", matchCriteriaId: "53C452B4-C2FD-4782-B7C2-51C0E0EF8438", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.7:build9702:*:*:-:*:*:*", matchCriteriaId: "A25F9FD5-FBAC-497F-B752-02396B24F6C0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.7:build9702:*:*:managed_service_providers:*:*:*", matchCriteriaId: "9C1CC592-5983-4E57-A5A0-41EB206126F9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9800:*:*:-:*:*:*", matchCriteriaId: "E2D04AFE-0F14-4AC4-829D-613FE9E6C4D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9800:*:*:managed_service_providers:*:*:*", matchCriteriaId: "70228608-DD64-45E3-B2A7-50E09EBFECF1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9801:*:*:-:*:*:*", matchCriteriaId: "16C3C705-57BF-46B3-81BE-0B0BEDB107DB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9801:*:*:managed_service_providers:*:*:*", matchCriteriaId: "961CF887-8508-48C3-A05C-33EE9E8F1BF2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9802:*:*:-:*:*:*", matchCriteriaId: "2A16F6B4-81B2-4D07-8348-C8DA66E619AE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9802:*:*:managed_service_providers:*:*:*", matchCriteriaId: "B5B14C15-F90F-4FF1-AF71-F9E18A8F0A76", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9803:*:*:-:*:*:*", matchCriteriaId: "914A12EA-CCF0-4199-B8B2-BBA5DF41C37B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9803:*:*:managed_service_providers:*:*:*", matchCriteriaId: "85378436-B993-4E3E-96A4-76BCBC0A692E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.9:-:*:*:*:*:*:*", matchCriteriaId: "E29F5C49-5D07-4F67-93CE-3FD928C847B9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.9:build9900:*:*:-:*:*:*", matchCriteriaId: "4E25C3C7-10D7-4653-B5EF-CA7A27DAF0BC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.9:build9900:*:*:managed_service_providers:*:*:*", matchCriteriaId: "6721D372-0E9C-47D7-AD38-3C57329A959A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.9:build9901:*:*:-:*:*:*", matchCriteriaId: "46A8E6D7-2AD7-467E-885F-D072AF1889D2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.9:build9901:*:*:managed_service_providers:*:*:*", matchCriteriaId: "5E407FB8-DA89-48B4-AE56-42C79BBD79D4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:-:*:*:*:*:*:*", matchCriteriaId: "4C9B2448-E35C-4198-A389-11F46D98907C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:build10000:*:*:-:*:*:*", matchCriteriaId: "F5B2FC21-EBE1-49DC-9527-4AA628B5494B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:build10000:*:*:managed_service_providers:*:*:*", matchCriteriaId: "E9BC9D09-0D74-48DC-A6F4-CFADABD6EF0F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:build10001:*:*:*:*:*:*", matchCriteriaId: "422EF4FC-F29E-4166-9EA0-C34BA3F160B6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:build10001:*:*:-:*:*:*", matchCriteriaId: "C5660E2F-042C-41FD-BF64-81DE43864382", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:build10001:*:*:managed_service_providers:*:*:*", matchCriteriaId: "86A00E50-BE79-4546-9E6E-BCE6E98D61C8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10100:*:*:*:*:*:*", matchCriteriaId: "5E6B99B8-4B22-40D6-8E9B-7E51C4E0BC03", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10100:*:*:-:*:*:*", matchCriteriaId: "106F5D0D-F89E-4B89-A7CD-87FBD103D3C8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10100:*:*:managed_service_providers:*:*:*", matchCriteriaId: "083C8D95-E07F-4C62-B0CA-EA19152E82F9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10101:*:*:*:*:*:*", matchCriteriaId: "E8DAC87D-4501-47B9-A3EE-7AC28646377B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10101:*:*:-:*:*:*", matchCriteriaId: "F8376C88-59C7-4C6B-B353-E0DD26614077", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10101:*:*:managed_service_providers:*:*:*", matchCriteriaId: "76C5055E-8188-4EA9-98B8-4216D3341ED4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10102:*:*:*:*:*:*", matchCriteriaId: "83A397DA-91F0-42E9-8066-DBC2A02C680A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10102:*:*:-:*:*:*", matchCriteriaId: "A3B098D3-0140-4F48-94E3-39D32A1D43AE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10102:*:*:managed_service_providers:*:*:*", matchCriteriaId: "FBCF9544-66CA-42B6-8E4A-748144E7CF86", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10103:*:*:*:*:*:*", matchCriteriaId: "E4DA1517-9C49-4E46-9BE4-7B6A9B9CA71D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10103:*:*:-:*:*:*", matchCriteriaId: "7FBF4900-CC7B-438E-8126-B02A2C1105DB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10103:*:*:managed_service_providers:*:*:*", matchCriteriaId: "2C319E36-0143-4642-992B-0D228A75161B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10104:*:*:*:*:*:*", matchCriteriaId: "D56A0C6E-8865-409D-A7F3-600A466CB7F4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.2:build10200:*:*:*:*:*:*", matchCriteriaId: "92DCA776-14CD-4258-8804-1C531966F8FB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10300:*:*:*:*:*:*", matchCriteriaId: "38BB8CEB-43AE-43FC-80E9-1FD5D518C822", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10301:*:*:*:*:*:*", matchCriteriaId: "A5DBA962-E485-47FB-8C06-B74B28417E87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10302:*:*:*:*:*:*", matchCriteriaId: "E34CD968-6820-4D24-A792-F272E4A582BE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:*:*:*:*:*:*:*", matchCriteriaId: "AD333571-D1B4-424A-A5FD-6900F9B89244", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:-:*:*:*:*:*:*", matchCriteriaId: "310987F7-216C-47DC-9AEA-F383D31B2F8C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10400:*:*:*:*:*:*", matchCriteriaId: "EBE9858E-817C-4E40-B880-4B466272FD87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10401:*:*:*:*:*:*", matchCriteriaId: "5B94A45F-595F-4F2A-83C9-501DDFDF1DC3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10402:*:*:*:*:*:*", matchCriteriaId: "EA1DD26C-22D3-45F4-B877-605B56379A0B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:-:*:*:*:*:*:*", matchCriteriaId: "7BA95690-4351-4EDF-B794-2D3B7F89DCFF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:11104:*:*:*:*:*:*", matchCriteriaId: "550C1332-D1DC-4709-9F87-1A7F4EE08EEA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11101:*:*:*:*:*:*", matchCriteriaId: "564A39DB-D202-4223-97E9-E6378CE69013", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11102:*:*:*:*:*:*", matchCriteriaId: "8C7BA06B-AA80-4276-912F-FF6BFE252E23", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11103:*:*:*:*:*:*", matchCriteriaId: "6BCAD9CA-5C31-442D-9E50-D2B992907362", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:-:*:*:*:*:*:*", matchCriteriaId: "B0E267E6-601A-4F0E-8DA9-7018B825B6F3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:build11200:*:*:*:*:*:*", matchCriteriaId: "FBB91B4D-EA5E-4FE3-8A2A-2A4DCB2340B9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:build11201:*:*:*:*:*:*", matchCriteriaId: "4CA1C194-0258-42EB-BD9F-87D5CA602008", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.3:build11300:*:*:*:*:*:*", matchCriteriaId: "1AC71CFB-5AF2-4C0F-8C92-01C883BE271F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.3:build11301:*:*:*:*:*:*", matchCriteriaId: "B1203498-41EA-43C9-9F6A-63BBD6955C83", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12000:*:*:*:*:*:*", matchCriteriaId: "5B722DB9-4258-4994-B498-0A4E1D3B3F8E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12001:*:*:*:*:*:*", matchCriteriaId: "2C9E0BBA-DCC1-47A6-A329-2E7D363F840C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12002:*:*:*:*:*:*", matchCriteriaId: "D8011EC7-EEAE-4F0E-AD76-EE2C9F8BF807", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12003:*:*:*:*:*:*", matchCriteriaId: "5404C39E-BD07-40AF-9467-10F4D0CB5F14", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12004:*:*:*:*:*:*", matchCriteriaId: "C4D42670-966F-445D-A2E3-0E728B287FCB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12005:*:*:*:*:*:*", matchCriteriaId: "3C6F70E1-5B52-457C-A321-F11EC1075E6F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12006:*:*:*:*:*:*", matchCriteriaId: "122B23D8-973E-40E6-85B1-E5107DA0F088", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12007:*:*:*:*:*:*", matchCriteriaId: "F791DE51-E80C-4A0B-9F8C-58E890E23590", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12100:*:*:*:*:*:*", matchCriteriaId: "9BE65B96-74ED-48F1-B86D-CB3387D989CB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12101:*:*:*:*:*:*", matchCriteriaId: "B4127640-1F60-4687-A24A-22B05A125290", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12110:*:*:*:*:*:*", matchCriteriaId: "E42928FB-E0E7-4951-B9B1-CEF60560A945", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12120:*:*:*:*:*:*", matchCriteriaId: "43C059E6-E1CA-4792-B383-93062CD82D66", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro through 12120 before 12121, PAM360 through 5550 before 5600, and Access Manager Plus through 4304 before 4305 have multiple SQL injection vulnerabilities.", }, { lang: "es", value: "Zoho ManageEngine Password Manager Pro versiones hasta 12120 anteriores a 12121, PAM360 versiones hasta 5550 anteriores a 5600, y Access Manager Plus versiones hasta 4304 anteriores a 4305, presentan múltiples vulnerabilidades de inyección SQL", }, ], id: "CVE-2022-40300", lastModified: "2025-01-13T16:23:00.453", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-16T23:15:11.553", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-40300.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-40300.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Undergoing Analysis", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-07-31 17:15
Modified
2024-11-21 06:09
Severity ?
Summary
Zoho ManageEngine Password Manager Pro before 11.2 11200 allows login/AjaxResponse.jsp?RequestType=GetUserDomainName&userName= username enumeration, because the response (to a failed login request) is null only when the username is invalid.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://herolab.usd.de/security-advisories/usd-2021-0015/ | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.manageengine.com | Vendor Advisory | |
cve@mitre.org | https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11200 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://herolab.usd.de/security-advisories/usd-2021-0015/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11200 | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_password_manager_pro | * | |
zohocorp | manageengine_password_manager_pro | 11.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "4E4BC9A8-AC6C-470A-9785-0C48DEAA913B", versionEndExcluding: "11.2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:-:*:*:*:*:*:*", matchCriteriaId: "B0E267E6-601A-4F0E-8DA9-7018B825B6F3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro before 11.2 11200 allows login/AjaxResponse.jsp?RequestType=GetUserDomainName&userName= username enumeration, because the response (to a failed login request) is null only when the username is invalid.", }, { lang: "es", value: "Zoho ManageEngine Password Manager Pro versiones anteriores a 11.2 11200, permite la enumeración login/AjaxResponse.jsp?RequestType=GetUserDomainName&userName= username, porque la respuesta (a una petición de inicio de sesión fallida) es nula sólo cuando el nombre de usuario no es válido", }, ], id: "CVE-2021-33617", lastModified: "2024-11-21T06:09:12.063", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-07-31T17:15:07.957", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://herolab.usd.de/security-advisories/usd-2021-0015/", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11200", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://herolab.usd.de/security-advisories/usd-2021-0015/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11200", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-08-11 14:15
Modified
2024-11-21 05:21
Severity ?
Summary
Cross Site Scripting (XSS) vulnerability in Query Report feature in Zoho ManageEngine Password Manager Pro version 11001, allows remote attackers to execute arbitrary code and steal cookies via crafted JavaScript payload.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugbounty.zoho.com/bb/#/bug/101000003619211 | Permissions Required, Vendor Advisory | |
cve@mitre.org | https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11002 | Product, Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugbounty.zoho.com/bb/#/bug/101000003619211 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11002 | Product, Release Notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_password_manager_pro | 11.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11101:*:*:*:*:*:*", matchCriteriaId: "564A39DB-D202-4223-97E9-E6378CE69013", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross Site Scripting (XSS) vulnerability in Query Report feature in Zoho ManageEngine Password Manager Pro version 11001, allows remote attackers to execute arbitrary code and steal cookies via crafted JavaScript payload.", }, { lang: "es", value: "Una vulnerabilidad de Cross-Site Scripting (XSS) en la función Query Report en Zoho ManageEngine Password Manager Pro versión 11001, permite a atacantes remotos ejecutar código arbitrario y robar cookies a través de un payload JavaScript manipulado. ", }, ], id: "CVE-2020-27449", lastModified: "2024-11-21T05:21:13.237", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-08-11T14:15:10.840", references: [ { source: "cve@mitre.org", tags: [ "Permissions Required", "Vendor Advisory", ], url: "https://bugbounty.zoho.com/bb/#/bug/101000003619211", }, { source: "cve@mitre.org", tags: [ "Product", "Release Notes", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Vendor Advisory", ], url: "https://bugbounty.zoho.com/bb/#/bug/101000003619211", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Product", "Release Notes", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html#pmp11002", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-04-26 21:15
Modified
2025-02-03 18:15
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Static credentials exist in the PostgreSQL data used in ManageEngine Access Manager Plus (AMP) build 4309, ManageEngine Password Manager Pro, and ManageEngine PAM360. These credentials could allow a malicious actor to modify configuration data that would escalate their permissions from that of a low-privileged user to an Administrative user.
References
▼ | URL | Tags | |
---|---|---|---|
vulnreport@tenable.com | https://tenable.com/security/research/tra-2023-16 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tenable.com/security/research/tra-2023-16 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_access_manager_plus | 4.3 | |
zohocorp | manageengine_pam360 | * | |
zohocorp | manageengine_password_manager_pro | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4309:*:*:*:*:*:*", matchCriteriaId: "A9EE7E99-B428-41EF-A693-7A316F695160", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:*:*:*:*:*:*:*:*", matchCriteriaId: "686A57A8-EB80-4920-8AD8-386FB96743EE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "83D1273D-8255-47D2-BD6C-9BE312685301", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Static credentials exist in the PostgreSQL data used in ManageEngine Access Manager Plus (AMP) build 4309, ManageEngine Password Manager Pro, and ManageEngine PAM360. These credentials could allow a malicious actor to modify configuration data that would escalate their permissions from that of a low-privileged user to an Administrative user.", }, ], id: "CVE-2023-2291", lastModified: "2025-02-03T18:15:30.620", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-04-26T21:15:09.037", references: [ { source: "vulnreport@tenable.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://tenable.com/security/research/tra-2023-16", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://tenable.com/security/research/tra-2023-16", }, ], sourceIdentifier: "vulnreport@tenable.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-798", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-12 04:15
Modified
2024-11-21 07:27
Severity ?
Summary
Zoho ManageEngine Password Manager Pro before 12122, PAM360 before 5711, and Access Manager Plus before 4306 allow SQL Injection (in a different software component relative to CVE-2022-43671.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "5FDF15FF-2561-4139-AC5E-4812584B1B03", versionEndExcluding: "4.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*", matchCriteriaId: "D5DEC045-6A7E-4041-88F8-5ABC4AB51C29", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*", matchCriteriaId: "52DDE5D9-28DE-446F-A402-7BE3C33A4B35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4302:*:*:*:*:*:*", matchCriteriaId: "F6E1E4D8-B7F0-4BDB-B5A2-55436BEC85F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4303:*:*:*:*:*:*", matchCriteriaId: "59675CC4-8A5C-4668-908C-0886B4B310DC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4304:*:*:*:*:*:*", matchCriteriaId: "45084336-F1DC-4E5B-A45E-506A779985D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4305:*:*:*:*:*:*", matchCriteriaId: "1B2CC071-5BB3-4A25-88F2-DBC56B94D895", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:*:*:*:*:*:*:*:*", matchCriteriaId: "1478BFC3-A0B2-415B-BA1C-AA09D9451C93", versionEndExcluding: "5.7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5700:*:*:*:*:*:*", matchCriteriaId: "1E270FB5-C447-4C93-9947-2CE50850A46B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5710:*:*:*:*:*:*", matchCriteriaId: "496AFB26-1E11-4632-8C10-CD80F601FCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "76C7DC97-8BF1-421F-9272-FD301D2D7A3F", versionEndExcluding: "12.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12100:*:*:*:*:*:*", matchCriteriaId: "9BE65B96-74ED-48F1-B86D-CB3387D989CB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12101:*:*:*:*:*:*", matchCriteriaId: "B4127640-1F60-4687-A24A-22B05A125290", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12110:*:*:*:*:*:*", matchCriteriaId: "E42928FB-E0E7-4951-B9B1-CEF60560A945", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12120:*:*:*:*:*:*", matchCriteriaId: "43C059E6-E1CA-4792-B383-93062CD82D66", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12121:*:*:*:*:*:*", matchCriteriaId: "8D21A9EB-51BC-4EEA-BAA4-8C2096A9DDD5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro before 12122, PAM360 before 5711, and Access Manager Plus before 4306 allow SQL Injection (in a different software component relative to CVE-2022-43671.", }, { lang: "es", value: "Zoho ManageEngine Password Manager Pro versiones anteriores a la 12122, PAM360 versiones anteriores a la 5711 y Access Manager Plus versiones anteriores a la 4306 permiten la inyección de SQL (en un componente de software diferente en relación con CVE-2022-43671.", }, ], id: "CVE-2022-43672", lastModified: "2024-11-21T07:27:00.930", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-12T04:15:10.290", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-43672.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-43672.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-12-15 19:29
Modified
2024-11-21 03:18
Severity ?
Summary
Zoho ManageEngine Password Manager Pro 9 before 9.4 (9400) has reflected XSS in SearchResult.ec and BulkAccessControlView.ec.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.manageengine.com/products/passwordmanagerpro/release-notes.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/products/passwordmanagerpro/release-notes.html | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_password_manager_pro | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "69EDE305-759A-43B5-9103-3A08F0038DA4", versionEndExcluding: "9.4", versionStartIncluding: "9.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro 9 before 9.4 (9400) has reflected XSS in SearchResult.ec and BulkAccessControlView.ec.", }, { lang: "es", value: "Zoho ManageEngine Password Manager Pro 9 en versiones anteriores a la 9.4 (9400) tiene XSS reflejado en SearchResult.ec y BulkAccessControlView.ec.", }, ], id: "CVE-2017-17698", lastModified: "2024-11-21T03:18:29.070", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-12-15T19:29:00.263", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/release-notes.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-03-16 22:15
Modified
2024-11-21 05:40
Severity ?
Summary
Zoho ManageEngine Password Manager Pro 10.4 and prior has no protection against Cross-site Request Forgery (CSRF) attacks, as demonstrated by changing a user's role.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.4_CSRF.txt | Third Party Advisory | |
cve@mitre.org | https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.4_CSRF.txt | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html | Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zohocorp | manageengine_password_manager_pro | * | |
zohocorp | manageengine_password_manager_pro | 10.4 | |
zohocorp | manageengine_password_manager_pro | 10.4 | |
zohocorp | manageengine_password_manager_pro | 10.4 | |
zohocorp | manageengine_password_manager_pro | 10.4 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "2753BE85-2E54-437C-95D3-EE0339BFCD0F", versionEndExcluding: "10.4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:-:*:*:*:*:*:*", matchCriteriaId: "310987F7-216C-47DC-9AEA-F383D31B2F8C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10400:*:*:*:*:*:*", matchCriteriaId: "EBE9858E-817C-4E40-B880-4B466272FD87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10401:*:*:*:*:*:*", matchCriteriaId: "5B94A45F-595F-4F2A-83C9-501DDFDF1DC3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10402:*:*:*:*:*:*", matchCriteriaId: "EA1DD26C-22D3-45F4-B877-605B56379A0B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Zoho ManageEngine Password Manager Pro 10.4 and prior has no protection against Cross-site Request Forgery (CSRF) attacks, as demonstrated by changing a user's role.", }, { lang: "es", value: "Zoho ManageEngine Password Manager Pro versiones 10.4 y anteriores, no poseen protección contra ataques de tipo Cross-site Request Forgery (CSRF), como es demostrado al cambiar el rol del usuario.", }, ], id: "CVE-2020-9346", lastModified: "2024-11-21T05:40:27.497", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-03-16T22:15:15.183", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.4_CSRF.txt", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.4_CSRF.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-28 09:15
Modified
2024-09-19 14:39
Severity ?
8.3 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Zohocorp ManageEngine Password Manager Pro versions before 12431 and ManageEngine PAM360 versions before 7001 are affected by authenticated SQL Injection vulnerability via a global search option.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:*:*:*:*:*:*:*", matchCriteriaId: "AB937707-FD53-491F-A9F6-BD4C53561921", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4001:*:*:*:*:*:*", matchCriteriaId: "3EE9114D-B6D8-430F-855C-CF1D3AB3157D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4002:*:*:*:*:*:*", matchCriteriaId: "BA3B9724-2C69-49CD-9916-F43B22CB194E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:*:*:*:*:*:*:*", matchCriteriaId: "D434061A-4282-49CE-AC4C-01C3784E1BE9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4100:*:*:*:*:*:*", matchCriteriaId: "C0384D4E-26C7-447B-84D3-9E38E7FC7F66", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4101:*:*:*:*:*:*", matchCriteriaId: "8CDCC599-19C7-4AA7-84BB-2120EDC9FCBA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:*:*:*:*:*:*:*", matchCriteriaId: "C4AD81D8-8F30-48CC-A859-15EC143BACE4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4500:*:*:*:*:*:*", matchCriteriaId: "1545BCA4-88C9-4D0D-82E5-DB3D9F21601F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4501:*:*:*:*:*:*", matchCriteriaId: "02A19736-57EC-454C-8838-E0A9752DD468", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:*:*:*:*:*:*:*", matchCriteriaId: "77A7FA46-518F-4519-81FE-00FDE3C257F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5000:*:*:*:*:*:*", matchCriteriaId: "22E8183E-8ACC-40C6-8EF3-253E4A2E63FA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5001:*:*:*:*:*:*", matchCriteriaId: "C4532F06-14BF-4EC5-9A7E-AD934FE69ABF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5002:*:*:*:*:*:*", matchCriteriaId: "D951BC8D-AF9A-4F2A-A801-3A5EDAB1A5E6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5003:*:*:*:*:*:*", matchCriteriaId: "3AE0A2E4-71A2-447F-9496-D1B9D1D748A5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5004:*:*:*:*:*:*", matchCriteriaId: "BADE0425-A94E-4621-BF9D-F3A1219C4D57", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.1:*:*:*:*:*:*:*", matchCriteriaId: "67B092E1-F298-4ED1-BEC3-7F9ABC6D10B1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.1:build5100:*:*:*:*:*:*", matchCriteriaId: "331DB356-27EA-4DF8-8A29-C9C8E75E4EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.2:*:*:*:*:*:*:*", matchCriteriaId: "B1202736-A94B-4046-ABC9-BBC89CCD1F09", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.2:build5200:*:*:*:*:*:*", matchCriteriaId: "2C655F9A-C769-413E-9211-E89BADE1A509", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:*:*:*:*:*:*:*", matchCriteriaId: "328C12F2-B818-46E5-A273-C043B54D200D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5300:*:*:*:*:*:*", matchCriteriaId: "11523C00-D2EE-4E2D-AFF9-546C77A29CE5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5301:*:*:*:*:*:*", matchCriteriaId: "F72FB8EA-A643-4295-92F3-4F64C31820D5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5302:*:*:*:*:*:*", matchCriteriaId: "6A20B1E4-F212-4771-8774-DA8085B35829", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5303:*:*:*:*:*:*", matchCriteriaId: "3AB8972E-3D17-4D01-BA26-82D73824CB3E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5304:*:*:*:*:*:*", matchCriteriaId: "DB4425CD-6A3A-4AFE-BFE6-1186AA689940", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5305:*:*:*:*:*:*", matchCriteriaId: "F8359FA6-0E5C-48BB-8EFA-CC29513F374D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5306:*:*:*:*:*:*", matchCriteriaId: "30342322-9774-43F4-8F18-4C0334BA54D1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.4:build5400:*:*:*:*:*:*", matchCriteriaId: "131FFFF9-79B7-42C7-BECC-397C6AC1C418", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.4:build5401:*:*:*:*:*:*", matchCriteriaId: "7630BA98-9A38-4CFC-BFAB-8A9A95434CC6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.5:build5500:*:*:*:*:*:*", matchCriteriaId: "0D1A2884-93DD-45FD-8024-81E007AEE787", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.5:build5510:*:*:*:*:*:*", matchCriteriaId: "DCEA34E7-49DE-4CE8-AC77-8242F48CBB4E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.5:build5520:*:*:*:*:*:*", matchCriteriaId: "C62233EB-AD38-40D7-B92E-CB4ED49C6F19", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.5:build5550:*:*:*:*:*:*", matchCriteriaId: "9CECA910-DA9B-4ED7-AD10-B1416EE0F6E0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5700:*:*:*:*:*:*", matchCriteriaId: "1E270FB5-C447-4C93-9947-2CE50850A46B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5710:*:*:*:*:*:*", matchCriteriaId: "496AFB26-1E11-4632-8C10-CD80F601FCFE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5711:*:*:*:*:*:*", matchCriteriaId: "B2CE86DA-B688-4E9E-AF16-1974858D18BF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5712:*:*:*:*:*:*", matchCriteriaId: "4BFA2F57-4506-4B3D-86E8-BE9BEC1134B4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.7:build5713:*:*:*:*:*:*", matchCriteriaId: "7997A499-E4DE-4C66-AE2D-CC030D8BF78A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.8:build5800:*:*:*:*:*:*", matchCriteriaId: "17933D57-20D9-47A0-B29C-5B06D0B90F92", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.8:build5801:*:*:*:*:*:*", matchCriteriaId: "3BE6576B-D8F8-41AF-90F7-81AEDB2D7405", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.8:build5810:*:*:*:*:*:*", matchCriteriaId: "C7D3CF71-4D46-468F-B83B-E4E2B497C75D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.9:build5900:*:*:*:*:*:*", matchCriteriaId: "9E19D934-A437-464A-96A6-BE046D8B1AF8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.9:build5950:*:*:*:*:*:*", matchCriteriaId: "45437824-F36E-4ECC-AE85-E8BDB37E6C86", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:5.9:build5951:*:*:*:*:*:*", matchCriteriaId: "8965F56C-4AA2-49B8-8A8A-6EEA4A8FE420", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.0:build6000:*:*:*:*:*:*", matchCriteriaId: "AA7E3C5F-232A-46F6-84E1-FBDC19E3B01A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.0:build6010:*:*:*:*:*:*", matchCriteriaId: "F8067D85-8476-4D7B-BE02-660825A150E6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.0:build6011:*:*:*:*:*:*", matchCriteriaId: "B02CCB71-35FC-48BE-96A7-154E754A4E35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.1:build6100:*:*:*:*:*:*", matchCriteriaId: "01313456-E276-47BF-9296-BD381B159286", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.2:build6200:*:*:*:*:*:*", matchCriteriaId: "A89A80FD-4B87-4CA5-8FE5-5AF90587AD3F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.2:build6210:*:*:*:*:*:*", matchCriteriaId: "DDA242CA-FED3-4EA1-A8A9-621260AB03EE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.3:build6300:*:*:*:*:*:*", matchCriteriaId: "B9D54E86-569B-4176-B331-127502F67EFA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.3:build6310:*:*:*:*:*:*", matchCriteriaId: "1F335F98-B4BF-4DD1-9269-E65F3647604A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.3:build6320:*:*:*:*:*:*", matchCriteriaId: "D46393BE-7930-4550-878B-BAFBCBD1385E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.4:build6400:*:*:*:*:*:*", matchCriteriaId: "7FA1ED4F-264D-4601-A0C4-4662020D86BD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.5:build6500:*:*:*:*:*:*", matchCriteriaId: "006349DC-B9C1-416C-9EC5-946C3B7537CD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.5:build6501:*:*:*:*:*:*", matchCriteriaId: "EBB48B3F-D8D5-44F2-831E-CB55FADEF3C0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.5:build6510:*:*:*:*:*:*", matchCriteriaId: "0EC50F60-8C65-474F-9109-74E9CD41A3E5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.5:build6520:*:*:*:*:*:*", matchCriteriaId: "FFF83B67-23EB-41D6-A8CB-6AE93DD75100", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.5:build6530:*:*:*:*:*:*", matchCriteriaId: "2C3C35DD-654F-4623-8BD6-578E22EA26F2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.5:build6540:*:*:*:*:*:*", matchCriteriaId: "3A5DD7E7-B753-473A-B5AA-EE5F765BB157", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.5:build6541:*:*:*:*:*:*", matchCriteriaId: "DA9B17A2-98BF-4334-9BD5-443B5725BD04", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.6:build6600:*:*:*:*:*:*", matchCriteriaId: "5BB6E490-C39A-4E90-A01B-DB3239106E9F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.6:build6601:*:*:*:*:*:*", matchCriteriaId: "BE0DC538-3D66-4037-8018-84D911CCFB87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.6:build6610:*:*:*:*:*:*", matchCriteriaId: "333D9110-7FA7-4E57-ABEE-039AEFDB181F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.6:build6611:*:*:*:*:*:*", matchCriteriaId: "AEFD31ED-E0AD-4961-8F0C-FCA2D4F3F88F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.7:build6700:*:*:*:*:*:*", matchCriteriaId: "A2714C78-9E57-4BCD-BD12-20AED8DA2265", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:6.7:build6710:*:*:*:*:*:*", matchCriteriaId: "78E8D0D0-B5AC-41C7-B6A3-9C90CD9F201E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:7.0:build7000:*:*:*:*:*:*", matchCriteriaId: "C99202CE-BFB6-42AF-8F66-0ECCE8F060D5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.0:build6002:*:*:-:*:*:*", matchCriteriaId: "BCC8AAA2-B079-43C7-BC3E-920954AF5685", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.1:build6104:*:*:-:*:*:*", matchCriteriaId: "1F91875D-75A0-4823-84DC-C082567CA84E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.2:build6201:*:*:-:*:*:*", matchCriteriaId: "27071ED3-C20D-4B9D-9442-44EC9D6E8DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6401:*:*:-:*:*:*", matchCriteriaId: "B5F16F44-2426-43B9-BE33-4E7FEA7036FC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6402:*:*:-:*:*:*", matchCriteriaId: "90E96158-B75D-40C2-A5E7-493974A2AEED", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6403:*:*:-:*:*:*", matchCriteriaId: "50DD364E-2817-487F-A2F3-F29AF3EFB8D7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.4:build6404:*:*:-:*:*:*", matchCriteriaId: "70077945-E672-4831-A81B-AB4778256D3C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6503:*:*:-:*:*:*", matchCriteriaId: "B9DFFF51-430B-4FCA-9B14-DD0DC4322E35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6504:*:*:-:*:*:*", matchCriteriaId: "6553FBD9-7E29-4663-9DCC-1F5AC8C215AF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.5:build6505:*:*:-:*:*:*", matchCriteriaId: "B865BD30-39E6-4674-8DF4-5971A63B24AB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.6:build6600:*:*:-:*:*:*", matchCriteriaId: "55FD92EC-8065-4CBF-8370-B28B3E81C005", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.7:build6700:*:*:-:*:*:*", matchCriteriaId: "73CA5EFF-EF35-4030-830C-4D492DC440D6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.7:build6701:*:*:-:*:*:*", matchCriteriaId: "F4E376B5-D710-44FB-A3BA-CBF96781D1CB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6800:*:*:-:*:*:*", matchCriteriaId: "AB784C5F-B0E1-4942-8D96-510419D789CF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6801:*:*:-:*:*:*", matchCriteriaId: "E1DA7102-44CE-44EE-8750-05C12061E437", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6802:*:*:-:*:*:*", matchCriteriaId: "B147154E-3960-44D8-8BE8-7A6DF5192ED2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.8:build6803:*:*:-:*:*:*", matchCriteriaId: "3135E48F-1CF2-4DC6-A066-BEBED1664205", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6900:*:*:-:*:*:*", matchCriteriaId: "47491EFB-44B0-45C2-A50E-55F9BDC6052B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6901:*:*:-:*:*:*", matchCriteriaId: "472440BF-EFA4-4959-B671-2F7D653D324D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6902:*:*:-:*:*:*", matchCriteriaId: "4369642E-9DD7-4181-8F1C-89C340BFBE2E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6903:*:*:-:*:*:*", matchCriteriaId: "B6AB46C0-5570-4C8D-BF45-12475310020E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:6.9:build6904:*:*:-:*:*:*", matchCriteriaId: "7A6F8938-C37C-4B7F-9A12-A82640C69CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7000:*:*:-:*:*:*", matchCriteriaId: "F7041071-8EBB-4B4D-99EA-E7CA6B6021E1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7001:*:*:-:*:*:*", matchCriteriaId: "15A26E93-897D-4E2B-9A59-A4BAEB0F05B8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7002:*:*:-:*:*:*", matchCriteriaId: "3A31DA9A-3F01-40E2-8564-AE515B83D974", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.0:build7003:*:*:-:*:*:*", matchCriteriaId: "DEE65B08-E206-4D2A-B274-C8C03910BF15", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7100:*:*:-:*:*:*", matchCriteriaId: "30C3F9AA-8201-423E-ACDE-489E022985CE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7101:*:*:-:*:*:*", matchCriteriaId: "6D594817-7871-494C-843D-AE7476F39ECD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7102:*:*:-:*:*:*", matchCriteriaId: "36869425-4E82-4A0B-99D2-1D5993733C13", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7103:*:*:-:*:*:*", matchCriteriaId: "01761B79-E58D-4C40-8764-B6BAFEDF1839", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7104:*:*:-:*:*:*", matchCriteriaId: "A48B389E-1210-4D26-8936-FEEFF5BA2F25", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.1:build7105:*:*:-:*:*:*", matchCriteriaId: "B98BEF15-61E3-4F80-A00F-764758F2D33E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.5:build7500:*:*:-:*:*:*", matchCriteriaId: "3B2A61BF-441C-407B-B003-2FD04690726B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.5:build7501:*:*:-:*:*:*", matchCriteriaId: "942C5555-4C3C-4F34-9681-B85B93D26FA7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:7.6:build7600:*:*:-:*:*:*", matchCriteriaId: "DE77A9B7-06AE-4437-8156-7161BF1E1615", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.0:build8000:*:*:-:*:*:*", matchCriteriaId: "31260CA9-D26C-4306-9D2D-9C1A8063B243", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.0:build8001:*:*:-:*:*:*", matchCriteriaId: "5A541087-6CAF-4780-960E-84BE68234895", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.1:build8100:*:*:-:*:*:*", matchCriteriaId: "89C81231-713F-4546-8697-FD0BCDC9C442", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.1:build8101:*:*:-:*:*:*", matchCriteriaId: "832B36F6-1F11-4BE6-8F68-2EFB0ACDD108", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.1:build8102:*:*:-:*:*:*", matchCriteriaId: "84C574B2-5859-4459-AAF7-4A3AFF60677F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.2:build8200:*:*:-:*:*:*", matchCriteriaId: "BC908D83-C0FA-4F0A-9F57-96EE09452A73", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8300:*:*:-:*:*:*", matchCriteriaId: "C9C21549-9CD4-4771-9486-C44EBF71037E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8301:*:*:-:*:*:*", matchCriteriaId: "561731F9-6670-472E-9666-A3DB1B4A1760", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8302:*:*:-:*:*:*", matchCriteriaId: "BCEEDB1C-A853-4BED-B079-A904EE687D40", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.3:build8303:*:*:-:*:*:*", matchCriteriaId: "8A0DFBC4-0822-4012-811E-E9C3CA636DC9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8041:*:*:-:*:*:*", matchCriteriaId: "C43DF755-9EC2-4394-B357-FF2E44A38B25", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8400:*:*:-:*:*:*", matchCriteriaId: "8DF43C1E-0383-4B68-B8B4-C86F2666E54C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8402:*:*:-:*:*:*", matchCriteriaId: "A9DBC517-13BD-420E-8382-D939B5CC2EE4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8403:*:*:-:*:*:*", matchCriteriaId: "72E64F5B-5632-424D-9E42-F2C4F43156FC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.4:build8404:*:*:-:*:*:*", matchCriteriaId: "6D81508C-7470-4FB4-A0C3-01A1FEB78BCC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8500:*:*:-:*:*:*", matchCriteriaId: "C32ADF8B-CEFC-4020-AF79-12ABEE460586", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8501:*:*:-:*:*:*", matchCriteriaId: "5E8092D0-5D9F-4C1A-82C4-7A0C3120C880", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8502:*:*:-:*:*:*", matchCriteriaId: "DADB620F-DA29-44E4-92DB-714FF224ACA9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8503:*:*:-:*:*:*", matchCriteriaId: "F2E3E7D7-FF81-4B65-98E3-2794696B73F6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8504:*:*:-:*:*:*", matchCriteriaId: "4E09899E-2E68-4608-9B67-A09B8602D94F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.5:build8505:*:*:-:*:*:*", matchCriteriaId: "77F50904-8B96-4775-93CE-0ECC9E2202C8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8600:*:*:-:*:*:*", matchCriteriaId: "D0CDD8BD-040F-48C8-94C7-F8531376CCCE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8601:*:*:-:*:*:*", matchCriteriaId: "9DB535EA-2AB3-4C68-A019-6CD234C43601", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8602:*:*:-:*:*:*", matchCriteriaId: "29514D57-4107-4D2B-A08B-F6E530628B02", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8603:*:*:-:*:*:*", matchCriteriaId: "25F841AE-7697-4800-8B9C-75A78C847E16", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.6:build8604:*:*:-:*:*:*", matchCriteriaId: "8CD70E27-AC4B-4F77-B76C-323D7043CD3A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8700:*:*:-:*:*:*", matchCriteriaId: "9F4D24B6-1D55-4256-B652-9886288844FF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8701:*:*:-:*:*:*", matchCriteriaId: "A67E3918-5472-4808-A67C-E2A1AC172176", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8702:*:*:-:*:*:*", matchCriteriaId: "F5494B4D-D17C-4206-988B-ACE79330443E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8703:*:*:-:*:*:*", matchCriteriaId: "D2CB80B3-8DA9-4506-81D4-ECC37A5C7623", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:8.7:build8704:*:*:-:*:*:*", matchCriteriaId: "D75C750D-1D43-4A3B-B723-3F774AF891DF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9000:*:*:-:*:*:*", matchCriteriaId: "EB907752-0135-43AA-B062-2EFBE8071A9F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9001:*:*:-:*:*:*", matchCriteriaId: "09F7354D-9163-4076-90D5-C2DA329F280D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9002:*:*:-:*:*:*", matchCriteriaId: "6601C8CB-0AB7-47F7-A86B-F84DD721292D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.0:build9003:*:*:-:*:*:*", matchCriteriaId: "A2B16103-93EB-410D-8950-ADEA90AC56F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.1:build9100:*:*:-:*:*:*", matchCriteriaId: "E319A0B8-4C02-458A-9F2A-17FEBCECD1F5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.1:build9101:*:*:-:*:*:*", matchCriteriaId: "C8FDA2BC-944A-4F1D-A6EA-BBB3B11C782F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.2:build9200:*:*:-:*:*:*", matchCriteriaId: "329C898E-0E06-4079-889B-226B63359855", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.3:build9300:*:*:-:*:*:*", matchCriteriaId: "7BA8CEA7-45C8-467C-9E84-ECA11697F09D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.4:build9400:*:*:-:*:*:*", matchCriteriaId: "15B7CE98-C0D0-47F6-93B5-FC711AA21E5E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.4:build9401:*:*:-:*:*:*", matchCriteriaId: "8D823ACF-6F24-445A-B479-7E483B96276B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.4:build9402:*:*:-:*:*:*", matchCriteriaId: "F3EA0FD7-3B6D-4C68-9D43-1AC16FED51DD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.5:build9500:*:*:-:*:*:*", matchCriteriaId: "BD6D4AED-62D9-4913-9C1C-39C02839CB2C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.5:build9501:*:*:-:*:*:*", matchCriteriaId: "42C7801B-DB30-4840-A165-3C39D22D60EE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.5:build9502:*:*:-:*:*:*", matchCriteriaId: "2945B423-933A-49C2-BC94-9BA03368D3FF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.6:build9600:*:*:-:*:*:*", matchCriteriaId: "E99050B1-4357-434A-89A8-2F8FAF8C4925", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.6:build9601:*:*:-:*:*:*", matchCriteriaId: "3BBAF19B-90A4-4DA0-8CB2-92881835D5B9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.7:build9700:*:*:-:*:*:*", matchCriteriaId: "2FBA0979-37EE-4A05-AE92-9DF76DF4D0EB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.7:build9701:*:*:-:*:*:*", matchCriteriaId: "6F3A51B2-17EF-40D2-9EF4-7853DA02BB1B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.7:build9702:*:*:-:*:*:*", matchCriteriaId: "A25F9FD5-FBAC-497F-B752-02396B24F6C0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9800:*:*:-:*:*:*", matchCriteriaId: "E2D04AFE-0F14-4AC4-829D-613FE9E6C4D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9801:*:*:-:*:*:*", matchCriteriaId: "16C3C705-57BF-46B3-81BE-0B0BEDB107DB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9802:*:*:-:*:*:*", matchCriteriaId: "2A16F6B4-81B2-4D07-8348-C8DA66E619AE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.8:build9803:*:*:-:*:*:*", matchCriteriaId: "914A12EA-CCF0-4199-B8B2-BBA5DF41C37B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.9:build9900:*:*:-:*:*:*", matchCriteriaId: "4E25C3C7-10D7-4653-B5EF-CA7A27DAF0BC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:9.9:build9901:*:*:-:*:*:*", matchCriteriaId: "46A8E6D7-2AD7-467E-885F-D072AF1889D2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:build10000:*:*:-:*:*:*", matchCriteriaId: "F5B2FC21-EBE1-49DC-9527-4AA628B5494B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:build10001:*:*:-:*:*:*", matchCriteriaId: "C5660E2F-042C-41FD-BF64-81DE43864382", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10100:*:*:-:*:*:*", matchCriteriaId: "106F5D0D-F89E-4B89-A7CD-87FBD103D3C8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10101:*:*:-:*:*:*", matchCriteriaId: "F8376C88-59C7-4C6B-B353-E0DD26614077", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10102:*:*:-:*:*:*", matchCriteriaId: "A3B098D3-0140-4F48-94E3-39D32A1D43AE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10103:*:*:-:*:*:*", matchCriteriaId: "7FBF4900-CC7B-438E-8126-B02A2C1105DB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10104:*:*:-:*:*:*", matchCriteriaId: "979EA5ED-56D4-4474-95BD-5E4EBB9E712C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.2:build10200:*:*:-:*:*:*", matchCriteriaId: "6659F2C9-491B-4C08-ACB7-C7420BB267D7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10300:*:*:-:*:*:*", matchCriteriaId: "378E4709-6C02-4126-9A13-2EA7604083B7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10301:*:*:-:*:*:*", matchCriteriaId: "A5F804ED-9883-4CA3-A358-9C0ED9F0305D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10302:*:*:-:*:*:*", matchCriteriaId: "AD1CED8A-6588-4D69-9C10-C4054782E051", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10400:*:*:-:*:*:*", matchCriteriaId: "5E69C4E3-5367-4124-82F5-B81B1FCCFEB8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10401:*:*:-:*:*:*", matchCriteriaId: "0B44EF34-A1AF-4734-9438-6C174BCF0756", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10402:*:*:-:*:*:*", matchCriteriaId: "0F415C15-43B6-4FCA-9328-CB4FE1CA0652", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10403:*:*:-:*:*:*", matchCriteriaId: "F988E96B-8DC3-4567-A22F-2A27C7792EE9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10404:*:*:-:*:*:*", matchCriteriaId: "86CCD873-8BEE-4520-994D-AAB952D431BD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10405:*:*:-:*:*:*", matchCriteriaId: "5CBC4F86-5267-4E4D-85B3-4A709D6F725C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10406:*:*:-:*:*:*", matchCriteriaId: "5F43A6EE-AFF4-4EA8-902B-B833C5DA74FA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.5:build10500:*:*:-:*:*:*", matchCriteriaId: "D43D6806-7362-4202-A4C0-0B641C76610E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.5:build10501:*:*:-:*:*:*", matchCriteriaId: "C24F7C8E-9944-41E9-A6ED-6F784787A5D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.0:build11000:*:*:-:*:*:*", matchCriteriaId: "7C1A304D-5A4A-4BC9-9893-3264AFAC915E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.0:build11001:*:*:-:*:*:*", matchCriteriaId: "E5E4FBCB-E210-4187-B842-A0F83E5BC9A3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.0:build11002:*:*:-:*:*:*", matchCriteriaId: "3C29B0D5-55E2-4F5D-BB30-156DF1FBF922", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.0:build11003:*:*:-:*:*:*", matchCriteriaId: "EBE41D7F-9AD9-47C0-B5AA-D28C7059A47C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.0:build11004:*:*:-:*:*:*", matchCriteriaId: "240EDDAB-C74D-41B9-9AF4-016EF2525465", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build11100:*:*:-:*:*:*", matchCriteriaId: "C6912033-8689-47D0-BD82-E7E44C42F745", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build11101:*:*:-:*:*:*", matchCriteriaId: "20CCB728-A300-4A9F-96C9-1550C7840896", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build11102:*:*:-:*:*:*", matchCriteriaId: "40ED753E-F19A-4AA5-A740-A3587787DE53", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build11103:*:*:-:*:*:*", matchCriteriaId: "1A2DA5C1-3D08-4E16-AADE-E593A721B4C7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build11104:*:*:-:*:*:*", matchCriteriaId: "F47E4552-B2DB-482D-ABF5-772D81DB41D0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:build11200:*:*:-:*:*:*", matchCriteriaId: "283CBA36-1CFB-4EF2-AEAA-9DFB08F8F74A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:build11201:*:*:-:*:*:*", matchCriteriaId: "68AB3EFF-1DA4-4BBC-A9D6-ABAD6BAC552E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.3:build11300:*:*:-:*:*:*", matchCriteriaId: "E7CF1900-3432-40AC-81E9-4E82C9A4684A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.3:build11301:*:*:-:*:*:*", matchCriteriaId: "78FC811D-FB6F-49B1-849F-6C856A1C374A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12000:*:*:-:*:*:*", matchCriteriaId: "F891289A-C6EB-4006-903F-12E7169EB82D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12001:*:*:-:*:*:*", matchCriteriaId: "543D7774-23CF-4F58-AF42-375CAC07B4E1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12002:*:*:-:*:*:*", matchCriteriaId: "7FA3F711-7337-4628-B512-DCAE9790630F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12003:*:*:-:*:*:*", matchCriteriaId: "EFE42E46-1655-4A2A-A414-584F93016E12", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12004:*:*:-:*:*:*", matchCriteriaId: "75550CBE-8AA0-4421-A409-DC76D9CB037A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12005:*:*:-:*:*:*", matchCriteriaId: "0F98942F-B445-4328-94F8-DF8C857FE233", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12006:*:*:-:*:*:*", matchCriteriaId: "C7E5A754-C2E8-4E0C-ACF0-3C481C658620", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12007:*:*:-:*:*:*", matchCriteriaId: "ED50233B-67DE-4E13-941F-48C7DE3743A5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12100:*:*:-:*:*:*", matchCriteriaId: "DDE344BF-040F-4382-AF1A-18B91C140D63", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12101:*:*:-:*:*:*", matchCriteriaId: "B6258F84-149E-486C-9917-3438C1ADCFD5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12110:*:*:-:*:*:*", matchCriteriaId: "23CBBB93-633D-4690-9271-3E204E894E8B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12120:*:*:-:*:*:*", matchCriteriaId: "FFEE320B-C599-457B-830B-A9941866AB72", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12121:*:*:-:*:*:*", matchCriteriaId: "E9580154-547E-4836-9FF2-E247E26DAF9B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12122:*:*:-:*:*:*", matchCriteriaId: "F2383FA4-CFBD-44F6-9281-034AFC2A1B89", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12123:*:*:-:*:*:*", matchCriteriaId: "AE0DD541-DE35-48ED-8AC6-D24CB85C2626", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.1:build12124:*:*:-:*:*:*", matchCriteriaId: "F8962B14-D830-423B-AE17-7F328FFD75F3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.2:build12200:*:*:-:*:*:*", matchCriteriaId: "D97B6DBC-C870-4C92-9DE7-6EE0E8D69DBC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.2:build12210:*:*:-:*:*:*", matchCriteriaId: "170A9AA0-A601-4556-98C2-03F172675836", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.2:build12211:*:*:-:*:*:*", matchCriteriaId: "D594D806-1E02-4594-98AC-56B33474AF75", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.2:build12220:*:*:-:*:*:*", matchCriteriaId: "D714B820-D1E7-49E7-9F31-8EEE21CEF8E6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.2:build12230:*:*:-:*:*:*", matchCriteriaId: "B86BC1D0-3E93-43B4-A31A-7A3FB6BDF983", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.3:build12300:*:*:-:*:*:*", matchCriteriaId: "D565A8FD-B2DE-4534-A24C-9A65708EE40B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.3:build12310:*:*:-:*:*:*", matchCriteriaId: "132C7BF9-A590-4F3E-84E7-FBAF547DC045", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.3:build12320:*:*:-:*:*:*", matchCriteriaId: "8A3C0CE0-10CA-43DB-8555-195C7406CACA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.3:build12330:*:*:-:*:*:*", matchCriteriaId: "45800005-710D-4759-92A8-29D34D673980", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.3:build12340:*:*:-:*:*:*", matchCriteriaId: "881BD414-E36A-4587-A303-C75919A59D25", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.3:build12350:*:*:-:*:*:*", matchCriteriaId: "93FE0E8E-FE7C-4B7A-A2C6-7EB68D9E619D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.4:build12400:*:*:-:*:*:*", matchCriteriaId: "7982F2AF-23B5-4D20-9A72-CE8872D6F493", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.4:build12401:*:*:-:*:*:*", matchCriteriaId: "1D860043-FB3B-4865-8735-7B43BF8ABE36", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.4:build12410:*:*:-:*:*:*", matchCriteriaId: "D5155048-BBAC-452E-9A7D-5B35223A1E51", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.4:build12420:*:*:-:*:*:*", matchCriteriaId: "F8BCA7B7-E454-4720-9827-996B96A9D906", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.4:build12430:*:*:-:*:*:*", matchCriteriaId: "42F54F11-31FC-4E2D-8781-61F87B86E08F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.4:build12431:*:*:-:*:*:*", matchCriteriaId: "8F6AF42B-5874-441C-81D8-537CBC87BFD4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Zohocorp ManageEngine Password Manager Pro versions before 12431 and ManageEngine PAM360 versions before 7001 are affected by authenticated SQL Injection vulnerability via a global search option.", }, { lang: "es", value: "Las versiones de Zohocorp ManageEngine Password Manager Pro anteriores a 12431 y las versiones de ManageEngine PAM360 anteriores a 7001 se ven afectadas por una vulnerabilidad de inyección SQL autenticada a través de una opción de búsqueda global.", }, ], id: "CVE-2024-5546", lastModified: "2024-09-19T14:39:09.437", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 8.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.5, source: "0fc0942c-577d-436f-ae8e-945763c79b02", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-28T09:15:11.103", references: [ { source: "0fc0942c-577d-436f-ae8e-945763c79b02", tags: [ "Vendor Advisory", ], url: "https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2024-5546.html", }, ], sourceIdentifier: "0fc0942c-577d-436f-ae8e-945763c79b02", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "0fc0942c-577d-436f-ae8e-945763c79b02", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-15 21:15
Modified
2025-02-13 18:16
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_analytics_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "725AEAF1-8E3C-4D33-B65D-C8304506A131", versionEndExcluding: "5.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_appcreator:*:*:*:*:*:*:*:*", matchCriteriaId: "8A753D74-F09F-4C42-A7C2-4D3A280FCACC", versionEndExcluding: "2.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_application_control_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "2AEDFE0E-9C9A-4DF6-9918-B5BD4DC67624", versionEndExcluding: "11.2.2328.01", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_browser_security_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "21C65599-8166-4066-BF0F-5C3CC55F544A", versionEndExcluding: "11.2.2328.01", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_device_control_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "C6CB1749-097D-4F9F-94DB-F35E72A42034", versionEndExcluding: "11.2.2328.01", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_endpoint_central:*:*:*:*:*:*:*:*", matchCriteriaId: "06579974-7085-42B3-9F9F-A733A1CA37D9", versionEndExcluding: "11.2.2322.01", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_endpoint_central_msp:*:*:*:*:*:*:*:*", matchCriteriaId: "F551AC16-6CBA-4460-A05D-D083967BDF07", versionEndExcluding: "11.2.2322.01", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_endpoint_dlp_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "DFE96B83-9684-4955-81C5-AD5B5BC817DF", versionEndExcluding: "11.2.2328.01", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "0FC58FEB-B8E4-4B1C-AE55-F4577D7BF505", versionEndExcluding: "10.1.2204.2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:10.1.2207.4:*:*:*:*:*:*:*", matchCriteriaId: "A5B65D12-7DAE-4815-993C-7C5903E990DD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_os_deployer:*:*:*:*:*:*:*:*", matchCriteriaId: "7C070B9E-FE09-4CFE-B489-DC9CED210CF1", versionEndExcluding: "1.2.2331.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "6B9C6675-2DDB-4FD6-8FA6-B3EE56F87F69", versionEndExcluding: "11.2.2328.01", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_remote_access_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "FA4B79F8-4D04-4EA4-8754-355DB6CA71B8", versionEndExcluding: "11.2.2328.01", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_remote_monitoring_and_management:*:*:*:*:*:*:*:*", matchCriteriaId: "DAA39630-6CE1-46E3-AF49-67DB09308C5D", versionEndExcluding: "10.2.11", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_vulnerability_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "A4D89B41-A239-4329-9BEA-6D52EE8644D8", versionEndExcluding: "11.2.2328.01", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD7707C-0FE5-475D-8FB2-CDB19363421A", versionEndExcluding: "6.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6300:*:*:*:*:*:*", matchCriteriaId: "F0C93DB0-3029-4D49-B180-6EFAEC4B712B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6301:*:*:*:*:*:*", matchCriteriaId: "F69BFD56-BA90-426C-9EF1-4BD925657BDF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6302:*:*:*:*:*:*", matchCriteriaId: "1171C259-086C-42CA-BE56-5B410677F72C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.3:6303:*:*:*:*:*:*", matchCriteriaId: "827B0C20-903F-48A5-8918-81F39202C21F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "7927FC8C-ED61-4E24-AF57-2D5C0E06AB2A", versionEndExcluding: "7.2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7200:*:*:*:*:*:*", matchCriteriaId: "1AE608DF-E02C-4A63-AD3E-7E3C1B921C3D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7201:*:*:*:*:*:*", matchCriteriaId: "72C14C6D-5C72-4A39-A8FF-93CD89C831C9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7202:*:*:*:*:*:*", matchCriteriaId: "D47DA377-0AF4-453E-9605-A5F87FA14E61", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.2:7203:*:*:*:*:*:*", matchCriteriaId: "BC919233-CE66-416C-8649-B94A23F131F5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "E802FD77-E67A-438C-82CE-9FC7536FB14E", versionEndExcluding: "7.2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7200:*:*:*:*:*:*", matchCriteriaId: "0FAF63F4-AED2-4EA4-BA5B-45961B2E29B2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7201:*:*:*:*:*:*", matchCriteriaId: "237AA2F5-B9A3-4C40-92AC-61FE47A017BC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7202:*:*:*:*:*:*", matchCriteriaId: "4C23A64C-65CB-447B-9B5F-4BB22F68FC79", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7203:*:*:*:*:*:*", matchCriteriaId: "3489D84B-5960-4FA7-A2DD-88AE35C34CE6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7210:*:*:*:*:*:*", matchCriteriaId: "D86AB1CC-0FDE-4CC1-BF64-E0C61EAF652F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7211:*:*:*:*:*:*", matchCriteriaId: "076FDAE7-9DB2-4A04-B09E-E53858D208C7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7212:*:*:*:*:*:*", matchCriteriaId: "07C08B57-FA76-4E24-BC10-B837597BC7E0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7213:*:*:*:*:*:*", matchCriteriaId: "0D734ACB-33E8-4315-8A79-2B97CE1D0509", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7215:*:*:*:*:*:*", matchCriteriaId: "9314CA98-7A69-4D2B-9928-40F55888C9FF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7220:*:*:*:*:*:*", matchCriteriaId: "BCE7999C-D6AE-4406-A563-A520A171381D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7250:*:*:*:*:*:*", matchCriteriaId: "D5716895-4553-4613-B774-0964D3E88AA0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "5618AEE3-0F6A-47CC-9783-DF9B5C8AC12F", versionEndExcluding: "4.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4100:*:*:*:*:*:*", matchCriteriaId: "BFD452AD-7053-4C13-97DA-326C3DC6E26C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4101:*:*:*:*:*:*", matchCriteriaId: "0B87956F-9C45-4A65-BEB2-77A247BD7A39", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4102:*:*:*:*:*:*", matchCriteriaId: "17BE6347-1605-47DB-8CFE-B587E3AB4223", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4103:*:*:*:*:*:*", matchCriteriaId: "C47F9F56-B1DE-426B-B5CF-A1BB5973D6E6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4104:*:*:*:*:*:*", matchCriteriaId: "E6A7C5C6-0137-4279-A7EA-3439BE477A3C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4105:*:*:*:*:*:*", matchCriteriaId: "C921F1B2-69B4-448F-AC7C-2F4474507FAB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4106:*:*:*:*:*:*", matchCriteriaId: "91DB9017-1BCF-48DB-97AE-4214150BAE77", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4107:*:*:*:*:*:*", matchCriteriaId: "D066B999-8554-49F0-92C3-1A4DDEA6E32D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4108:*:*:*:*:*:*", matchCriteriaId: "635F80E1-4A73-48DC-A128-D61716D70839", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4109:*:*:*:*:*:*", matchCriteriaId: "E74FE1C4-471A-4040-96A4-0BE46745199B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4110:*:*:*:*:*:*", matchCriteriaId: "C31E2485-2F3A-4BC1-92CC-F7DCB464B5D4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4111:*:*:*:*:*:*", matchCriteriaId: "99C928C2-4711-4765-BDF2-E7FB448F5771", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4112:*:*:*:*:*:*", matchCriteriaId: "EDF77387-21C7-45CA-B843-EBA956EE2BB7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4113:*:*:*:*:*:*", matchCriteriaId: "5C2C0067-538B-4102-8B4E-603BD4CE8F86", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4115:*:*:*:*:*:*", matchCriteriaId: "DAF47C10-AAE9-40CF-A033-44D54A81E69F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4116:*:*:*:*:*:*", matchCriteriaId: "36D0331C-58EA-4B68-88C4-7A193BE5C62E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4117:*:*:*:*:*:*", matchCriteriaId: "3CA59781-E48C-487E-B3AF-96560F3152EB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4118:*:*:*:*:*:*", matchCriteriaId: "E4812B9E-15CA-4700-9115-EAE0A97F0E3C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4119:*:*:*:*:*:*", matchCriteriaId: "CE513A2B-0371-4D3C-A502-CDA3DB474F3D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4120:*:*:*:*:*:*", matchCriteriaId: "5E498ACE-8332-4824-9AFE-73975D0AC9EF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4121:*:*:*:*:*:*", matchCriteriaId: "F070B928-CF57-4502-BE26-AD3F13A6ED4B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4122:*:*:*:*:*:*", matchCriteriaId: "635D24F2-9C60-4E1A-BD5F-E5312FA953A8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4130:*:*:*:*:*:*", matchCriteriaId: "5E983854-36F8-407F-95C8-E386E0F82366", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4131:*:*:*:*:*:*", matchCriteriaId: "29BFE206-CAB1-41CA-B5A5-E8CB67BCCA4A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4140:*:*:*:*:*:*", matchCriteriaId: "7820751F-E181-4BB7-8DAF-BF21129B24D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4141:*:*:*:*:*:*", matchCriteriaId: "14ADB666-EEB9-4C6D-93F4-5A45EBA55705", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4150:*:*:*:*:*:*", matchCriteriaId: "93C4B398-8F9A-44AC-8E43-C4C471DE9565", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4160:*:*:*:*:*:*", matchCriteriaId: "47FD0E59-3D75-4CF5-81A6-20C3B7FDE962", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4161:*:*:*:*:*:*", matchCriteriaId: "C7EF76FE-3FD9-4548-A372-22E280484ECB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:4162:*:*:*:*:*:*", matchCriteriaId: "0F95BCBE-399F-4CCC-A17B-C0C3A03A99AB", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "93C3ECBE-AE6A-4E5B-822B-2F905AA806DB", versionEndExcluding: "6.1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6100:*:*:*:*:*:*", matchCriteriaId: "DFEB1B4D-A7B2-464A-BEA7-5754D3BE1F50", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6101:*:*:*:*:*:*", matchCriteriaId: "C12C9470-3D3B-426E-93F9-79D8B9B25F69", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6110:*:*:*:*:*:*", matchCriteriaId: "227F1242-E0A9-45C5-9198-FD8D01F68ABF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6111:*:*:*:*:*:*", matchCriteriaId: "2FE57085-2085-4F62-9900-7B8DFC558418", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6120:*:*:*:*:*:*", matchCriteriaId: "CAB7FA92-DC12-4E8A-91CC-3C98ED74E47B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6121:*:*:*:*:*:*", matchCriteriaId: "D04530C2-E4D0-4717-95DB-B7C224348502", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:6.1:6125:*:*:*:*:*:*", matchCriteriaId: "9BBD018F-C1FD-4A0F-A145-253D86185F6E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "3DA0580F-8167-450E-A1E9-0F1F7FC7E2C9", versionEndExcluding: "5.7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5700:*:*:*:*:*:*", matchCriteriaId: "E913F3D6-9F94-4130-94FF-37F4D81BAEF4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5701:*:*:*:*:*:*", matchCriteriaId: "34D23B58-2BB8-40EE-952C-1595988335CC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5702:*:*:*:*:*:*", matchCriteriaId: "322920C4-4487-4E44-9C40-2959F478A4FA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5703:*:*:*:*:*:*", matchCriteriaId: "3AD735B9-2CE2-46BA-9A14-A22E3FE21C6D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5704:*:*:*:*:*:*", matchCriteriaId: "014DB85C-DB28-4EBB-971A-6F8F964CE6FE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5705:*:*:*:*:*:*", matchCriteriaId: "5E9B0013-ABF8-4616-BC92-15DF9F5CB359", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5706:*:*:*:*:*:*", matchCriteriaId: "5B744F32-FD43-47B8-875C-6777177677CD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5707:*:*:*:*:*:*", matchCriteriaId: "F1BB6EEA-2BAA-4C48-8DA8-1E87B3DE611F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5708:*:*:*:*:*:*", matchCriteriaId: "D3012C17-87F5-4FFD-B67B-BEFF2A390613", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5709:*:*:*:*:*:*", matchCriteriaId: "1E33D368-2D81-4C7E-9405-7C0A86E97217", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5710:*:*:*:*:*:*", matchCriteriaId: "7AA9384F-6401-4495-B558-23E5A7A7528C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5711:*:*:*:*:*:*", matchCriteriaId: "E492F955-0734-4AE4-A59F-572ADF0CFE75", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5712:*:*:*:*:*:*", matchCriteriaId: "11B71FFC-FD2E-4F84-BB1E-55BCA5B51099", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "A9BB59DF-8786-4DC0-9254-F88417CA7077", versionEndExcluding: "4.5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4500:*:*:*:*:*:*", matchCriteriaId: "6BA1E99E-789C-4FDD-AA89-4C5391B95320", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4502:*:*:*:*:*:*", matchCriteriaId: "7EA6EC34-6702-4D1A-8C63-5026416E01A6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4503:*:*:*:*:*:*", matchCriteriaId: "0720F912-A070-43E9-BD23-4FAD00026DCF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4504:*:*:*:*:*:*", matchCriteriaId: "161C81D2-7281-4F89-9944-1B468B06C264", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4505:*:*:*:*:*:*", matchCriteriaId: "718EEA01-B792-4B7E-946F-863F846E8132", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4507:*:*:*:*:*:*", matchCriteriaId: "DB72E7C9-FAC6-43E8-AC2A-5A7CBEAB919E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4508:*:*:*:*:*:*", matchCriteriaId: "47BBC46A-16C7-4E9B-A49A-8101F3039D0C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4509:*:*:*:*:*:*", matchCriteriaId: "D989FB08-624D-406B-8F53-A387900940F7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4510:*:*:*:*:*:*", matchCriteriaId: "8ADB6CFE-1915-488C-93FE-96E8DF3655F6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4511:*:*:*:*:*:*", matchCriteriaId: "EDCCB442-D0E4-47C7-A558-36657A70B3CF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4512:*:*:*:*:*:*", matchCriteriaId: "8794F807-1D50-44D4-8969-FD68EFF2F643", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4513:*:*:*:*:*:*", matchCriteriaId: "AFA2B4BA-1FBF-4C2E-872E-AD14084D1D56", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4514:*:*:*:*:*:*", matchCriteriaId: "6976DCDA-E27A-4367-8EFE-74DC6F63018F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4516:*:*:*:*:*:*", matchCriteriaId: "101908A5-CAEF-44F8-A6C8-FE01CA9FA836", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4517:*:*:*:*:*:*", matchCriteriaId: "F957BE56-474A-4593-8710-F86DB13C7407", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4518:*:*:*:*:*:*", matchCriteriaId: "B8479442-1A4A-4F27-9778-664C7693C815", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4519:*:*:*:*:*:*", matchCriteriaId: "EEF00ADC-105F-4B7E-857B-17565D67C7D0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4520:*:*:*:*:*:*", matchCriteriaId: "CA292949-6E99-49A5-94F7-23448494F5C4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4523:*:*:*:*:*:*", matchCriteriaId: "863CBE20-60A5-4A08-BF16-4E40E88B9AB1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4525:*:*:*:*:*:*", matchCriteriaId: "28A105B4-7BF0-4054-AAE7-8453E13E2B63", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4527:*:*:*:*:*:*", matchCriteriaId: "94C78301-44B7-45B2-836E-15E45FAC8625", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4528:*:*:*:*:*:*", matchCriteriaId: "F408067C-13C1-40BE-8488-9EB7FF0EDF9D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4529:*:*:*:*:*:*", matchCriteriaId: "A83FBC34-E024-47DA-AD8A-BF569F1F7EE9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4531:*:*:*:*:*:*", matchCriteriaId: "DC06E46F-441E-445B-A780-702B170901DC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4532:*:*:*:*:*:*", matchCriteriaId: "A8A98287-DB5D-44A3-B835-54BACFC12944", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4533:*:*:*:*:*:*", matchCriteriaId: "53F32DE7-F211-4BEF-99C1-CE38EFDBCCC2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4535:*:*:*:*:*:*", matchCriteriaId: "91C3EE55-B71B-432C-A68E-BB126A715375", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4536:*:*:*:*:*:*", matchCriteriaId: "FD48F21A-2D38-4EB8-B190-58CF176C1EEF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4537:*:*:*:*:*:*", matchCriteriaId: "76346162-0BF0-4B21-82D2-2548A989396A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_manager_plus:4.5:build4538:*:*:*:*:*:*", matchCriteriaId: "5313C4EF-A960-4BCA-AA97-EDC88402A175", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "E4282B6D-6C85-4F13-B789-E641FB5986FE", versionEndExcluding: "4.5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4500:*:*:*:*:*:*", matchCriteriaId: "A160274C-F07A-43D9-A4DB-8773F004B9B0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4502:*:*:*:*:*:*", matchCriteriaId: "341DF953-3DC7-476E-A79D-8CBD011C52A2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4503:*:*:*:*:*:*", matchCriteriaId: "AB6582AC-03DB-4905-BD03-EEDC314EB289", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4504:*:*:*:*:*:*", matchCriteriaId: "2C3F1FDE-41F7-4541-B0F7-00DB7994ACB7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4505:*:*:*:*:*:*", matchCriteriaId: "92ADF3D2-0051-46E9-BF7A-7D429ABEC09A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4507:*:*:*:*:*:*", matchCriteriaId: "1592B321-1D60-418D-9CD8-61AEA57D8D90", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4508:*:*:*:*:*:*", matchCriteriaId: "E582FA9F-A043-4193-961D-A49159F1C921", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4509:*:*:*:*:*:*", matchCriteriaId: "F3A22F3D-C45F-4FD5-8EEC-3BF2EDA807A6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4510:*:*:*:*:*:*", matchCriteriaId: "28EAB920-2F01-483E-9492-97DBFBD7535F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4511:*:*:*:*:*:*", matchCriteriaId: "92F1D0A8-8761-4876-92C1-EE9F6BF61C4F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4512:*:*:*:*:*:*", matchCriteriaId: "37976BE2-4233-46F7-B6BB-EFA778442AFE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4513:*:*:*:*:*:*", matchCriteriaId: "A0FF0731-4694-427A-8C9A-EBA7AEF6F1D3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4514:*:*:*:*:*:*", matchCriteriaId: "C069FF04-4061-4560-BA55-1784312047A1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4516:*:*:*:*:*:*", matchCriteriaId: "0D428FA6-08BA-4F7E-B1C7-4AFD17919899", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4517:*:*:*:*:*:*", matchCriteriaId: "C7AB124C-63E2-4CC2-B5C9-E7141E23D56C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4518:*:*:*:*:*:*", matchCriteriaId: "0E2D49D5-6F95-42F5-8EF0-DAD47C51D141", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4519:*:*:*:*:*:*", matchCriteriaId: "EF9477F5-C6FD-4589-917B-FD206371DB33", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4520:*:*:*:*:*:*", matchCriteriaId: "B51D61F5-7198-4B33-8AFD-A78E34F6B1AE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4523:*:*:*:*:*:*", matchCriteriaId: "8CB27467-3157-466A-B01C-461348BD95C9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4525:*:*:*:*:*:*", matchCriteriaId: "2D575B4D-D58A-4B92-9723-4AB54E29924A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4527:*:*:*:*:*:*", matchCriteriaId: "E76BB070-9BC9-4712-B021-156871C3B06A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4528:*:*:*:*:*:*", matchCriteriaId: "52D35850-9BE1-479A-B0AF-339E42BCA708", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4529:*:*:*:*:*:*", matchCriteriaId: "681A77B6-7E22-4132-803B-A0AD117CE7C1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4531:*:*:*:*:*:*", matchCriteriaId: "EF72A1BF-EE5D-4F43-B463-7E51285D4D5D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4532:*:*:*:*:*:*", matchCriteriaId: "2FDD429A-E938-483A-BCCF-50A2AD4096CB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4533:*:*:*:*:*:*", matchCriteriaId: "162D604A-7F0E-44CF-9E48-D8B54F8F3509", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4535:*:*:*:*:*:*", matchCriteriaId: "AD38FA0F-B94F-4731-A652-07702EE0B808", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4536:*:*:*:*:*:*", matchCriteriaId: "F2C3767E-A56B-4580-AF8C-9BF5852EE414", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4537:*:*:*:*:*:*", matchCriteriaId: "5434E8CB-8DD0-4245-AF61-CF3A69BD0C3B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_m365_security_plus:4.5:4538:*:*:*:*:*:*", matchCriteriaId: "C2403DA1-FBF8-495E-B996-4060F6BE6EE9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "30C9A012-AD39-45B2-BA3F-8D7180FC5390", versionEndExcluding: "4.4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4400:*:*:*:*:*:*", matchCriteriaId: "7C5E7CE6-F85E-49B2-9078-F661AA3723C4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4401:*:*:*:*:*:*", matchCriteriaId: "1194B4C2-FBF2-4015-B666-235897971DD0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4402:*:*:*:*:*:*", matchCriteriaId: "4F5F0CA5-CEC3-4342-A7D1-3616C482B965", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4403:*:*:*:*:*:*", matchCriteriaId: "B7B8A2F3-5F46-40B2-A4E7-118341443C53", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:4.4:4404:*:*:*:*:*:*", matchCriteriaId: "767BF16D-8CD8-4E8A-9A3B-CB11EB48FB9D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "658DC76D-E0FE-40FA-B966-6DA6ED531FCD", versionEndExcluding: "6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6001:*:*:*:*:*:*", matchCriteriaId: "948993BE-7B9E-4CCB-A97F-28B46DFE52A6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6003:*:*:*:*:*:*", matchCriteriaId: "9F8D6CDF-1BD5-4457-94AA-CFCC351F55A9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6005:*:*:*:*:*:*", matchCriteriaId: "E54CE38D-C9CA-4CC1-B3BC-83F593A576D1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6011:*:*:*:*:*:*", matchCriteriaId: "4C8B3F77-7886-4F80-B75A-59063C762307", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6016:*:*:*:*:*:*", matchCriteriaId: "ADCB6ADF-5B04-4682-B541-4BC8BB5762DC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6017:*:*:*:*:*:*", matchCriteriaId: "A708628C-31E8-4A52-AEF7-297E2DDFA0C8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6020:*:*:*:*:*:*", matchCriteriaId: "A8A01385-A493-42C0-ABBE-6A30C8594F8B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6025:*:*:*:*:*:*", matchCriteriaId: "E7A6CA95-9572-4FCA-ADD2-A5F4D8C2216B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6026:*:*:*:*:*:*", matchCriteriaId: "B6865936-A773-4353-8891-8269508B2180", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6030:*:*:*:*:*:*", matchCriteriaId: "9CAD778E-8FDB-4CE2-A593-75EEA75F6361", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6031:*:*:*:*:*:*", matchCriteriaId: "52A9BA64-A248-4490-BDA7-671D64C0B3CA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6032:*:*:*:*:*:*", matchCriteriaId: "DFF0A7E8-888B-4CBE-B799-16557244DDF3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6041:*:*:*:*:*:*", matchCriteriaId: "8B480202-7632-4CFA-A485-DDFF1D1DB757", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6042:*:*:*:*:*:*", matchCriteriaId: "AB9B0721-49FD-49E7-97E4-E4E3EBF64856", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6043:*:*:*:*:*:*", matchCriteriaId: "874F5DDD-EA8D-4C1E-824A-321C52959649", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6044:*:*:*:*:*:*", matchCriteriaId: "8CAA4713-DA95-46AC-AFA5-9D22F8819B06", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6047:*:*:*:*:*:*", matchCriteriaId: "C9D4BB2E-D0D0-4058-88C9-3E73A793A85B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6049:*:*:*:*:*:*", matchCriteriaId: "832AAAAF-5C34-4DDF-96A4-080002F9BC6A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6050:*:*:*:*:*:*", matchCriteriaId: "29ED63C4-FB06-41AC-ABCD-63B3233658A8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6051:*:*:*:*:*:*", matchCriteriaId: "6EEA1BA5-F6A7-4BE0-8E77-993FB9E5CC91", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6053:*:*:*:*:*:*", matchCriteriaId: "2C21AC8A-8358-46BE-A0C6-7CDEF1E73904", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6054:*:*:*:*:*:*", matchCriteriaId: "51400F37-6310-44A3-A683-068DF64D20F5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6056:*:*:*:*:*:*", matchCriteriaId: "F3F43DBF-CD65-47D0-8CEE-D5EE8337188B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6057:*:*:*:*:*:*", matchCriteriaId: "78CB8751-856A-41AC-904A-70FA1E15A946", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6058:*:*:*:*:*:*", matchCriteriaId: "72B7E27E-1443-46DC-8389-FBD337E612F4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6060:*:*:*:*:*:*", matchCriteriaId: "F9BB1077-C1F5-4368-9930-8E7424E7EB98", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6061:*:*:*:*:*:*", matchCriteriaId: "EE307CE4-574D-4FF7-BED6-5BBECF886578", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6062:*:*:*:*:*:*", matchCriteriaId: "49E40C74-7077-4366-82A7-52B454725B3A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6070:*:*:*:*:*:*", matchCriteriaId: "038D7936-C837-4E49-89BC-D11DF2C875D4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6071:*:*:*:*:*:*", matchCriteriaId: "D1DC87E8-3053-4823-BFDB-46BAF3FCEFF8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:6.0:build6072:*:*:*:*:*:*", matchCriteriaId: "E384B5D8-CF9A-4C6D-AB4A-5B1A66768ADB", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:*:*:*:*:*:*:*:*", matchCriteriaId: "DC606E6A-3523-41D5-94C9-A62E8630A687", versionEndExcluding: "4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4010:*:*:*:*:*:*", matchCriteriaId: "7001A0A7-159C-48A3-9800-DAFBA31D05BA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4011:*:*:*:*:*:*", matchCriteriaId: "583B46D4-529F-404F-9CF3-4D7526889682", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4015:*:*:*:*:*:*", matchCriteriaId: "0D89C2A2-CE20-4954-8821-C73F9E3EC767", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4016:*:*:*:*:*:*", matchCriteriaId: "A6B8B05F-0ECD-41C1-9FFD-0ADCF4046D39", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4020:*:*:*:*:*:*", matchCriteriaId: "233874F0-A19F-447C-ACE2-5DD06829C920", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4021:*:*:*:*:*:*", matchCriteriaId: "C4447E47-C6DB-440D-AF35-8130687E9BB2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4023:*:*:*:*:*:*", matchCriteriaId: "405ECB05-7E35-4927-A19A-92A4B7FE8B1A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4024:*:*:*:*:*:*", matchCriteriaId: "9F1EC2A5-7498-40F9-91A4-B004AEA1136C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4025:*:*:*:*:*:*", matchCriteriaId: "CEBB1CED-7B88-4E4B-89E8-E0E2B882E34C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4026:*:*:*:*:*:*", matchCriteriaId: "DD3B14B6-8329-43C4-AE42-13279E77275E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4027:*:*:*:*:*:*", matchCriteriaId: "7792B448-4D34-42F8-919C-344783D625E5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4028:*:*:*:*:*:*", matchCriteriaId: "E297C040-0523-4A50-97AB-349880D5B3A1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4030:*:*:*:*:*:*", matchCriteriaId: "F86FEB8D-8A75-4C92-947D-CA7EDF8E0F5C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4031:*:*:*:*:*:*", matchCriteriaId: "A238ED1B-6C11-44C9-BDBF-8A724AB7FE1C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4034:*:*:*:*:*:*", matchCriteriaId: "8ADCADB6-9764-4CA8-AB54-BCE6D0363E69", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4035:*:*:*:*:*:*", matchCriteriaId: "6E0C9493-EB87-4197-AF8B-BCA25488BCDA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4036:*:*:*:*:*:*", matchCriteriaId: "E4FD31D3-69EB-4699-B31B-C18A0EA9D9C9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4040:*:*:*:*:*:*", matchCriteriaId: "FBD7855F-4B66-4F43-960C-73E69C52E865", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4043:*:*:*:*:*:*", matchCriteriaId: "0C9C8B4D-CFFE-4CB4-8F11-FC778462CB10", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4045:*:*:*:*:*:*", matchCriteriaId: "36A68C2E-978A-4F82-AC61-E9E7CA9908A9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4046:*:*:*:*:*:*", matchCriteriaId: "6C8D7EA7-7CC3-48B0-B966-71A69FDE6A7E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4047:*:*:*:*:*:*", matchCriteriaId: "05D804B6-5990-42A7-A072-8F904A5262E6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_log360_ueba:4.0:build4048:*:*:*:*:*:*", matchCriteriaId: "0C720653-317E-4B1C-AFA8-90FAE97430C9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90001:*:*:*:*:*:*", matchCriteriaId: "A9C350FA-E483-4C06-A784-5679ED0471BC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90063:*:*:*:*:*:*", matchCriteriaId: "15A47AA7-8B49-41EC-AB57-5706989DF756", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90064:*:*:*:*:*:*", matchCriteriaId: "D1CCB7C8-86B9-4DA8-93D0-F96B81C82F32", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90065:*:*:*:*:*:*", matchCriteriaId: "397140D3-2424-42D9-9900-625EC4E95D22", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90066:*:*:*:*:*:*", matchCriteriaId: "BA8C9A27-572E-407F-826A-1206394044D0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90067:*:*:*:*:*:*", matchCriteriaId: "7601CC24-FC2D-4805-A975-2D307DECDF2D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90068:*:*:*:*:*:*", matchCriteriaId: "A513B136-7DC5-48DD-BDCB-1620A14849B9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90069:*:*:*:*:*:*", matchCriteriaId: "0858CFDE-7D76-4A63-BE21-A73310AD17BD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90070:*:*:*:*:*:*", matchCriteriaId: "1BD8F9F8-89EB-422E-A4B1-E715AFD72341", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90071:*:*:*:*:*:*", matchCriteriaId: "E0271D12-94E8-4345-9666-4A47A5AAB824", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90072:*:*:*:*:*:*", matchCriteriaId: "513337E6-D805-461B-812F-D6EEA0921883", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90073:*:*:*:*:*:*", matchCriteriaId: "8EB5C610-33AC-486C-AF48-4A889D429420", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90074:*:*:*:*:*:*", matchCriteriaId: "81FC1ED5-99FF-4C30-BCE0-5CDC7A5E4C03", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90075:*:*:*:*:*:*", matchCriteriaId: "EA473C80-4100-4170-9601-8C9EEB5F64CA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90076:*:*:*:*:*:*", matchCriteriaId: "5D2C41A7-1602-43CD-9E6D-A0178931C020", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90077:*:*:*:*:*:*", matchCriteriaId: "238E3508-0230-441E-8114-6EEB79E22632", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90078:*:*:*:*:*:*", matchCriteriaId: "2C85C7DB-BC46-4D0A-8353-C2DB51BFFD85", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90079:*:*:*:*:*:*", matchCriteriaId: "0BAAFCD6-5945-46BE-9380-5C2F79060B8E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90080:*:*:*:*:*:*", matchCriteriaId: "B6E108C0-075A-493D-B8AE-343D81BEC9C9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90081:*:*:*:*:*:*", matchCriteriaId: "CA614153-4E29-45AB-BBC2-9BA0CDAD4B8E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90082:*:*:*:*:*:*", matchCriteriaId: "F95B1920-005C-494C-A9A9-C72502E45723", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90083:*:*:*:*:*:*", matchCriteriaId: "DA3C51B7-B8A0-42F4-ADC9-C949B610EE2E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90084:*:*:*:*:*:*", matchCriteriaId: "180D4816-E5D0-406B-B289-4B1984250B50", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90085:*:*:*:*:*:*", matchCriteriaId: "57883D51-1188-4C14-B2EF-26FD4B156526", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90086:*:*:*:*:*:*", matchCriteriaId: "D5A59B7E-74CF-425F-B814-313D5F1F7670", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90087:*:*:*:*:*:*", matchCriteriaId: "327F6B11-9176-4791-96D0-FAD8EBE9D5E1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90088:*:*:*:*:*:*", matchCriteriaId: "5E057023-0175-4DB5-98A4-942FB81AF59A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90089:*:*:*:*:*:*", matchCriteriaId: "28E12A60-CEB6-46BD-A4E8-48651A651E5D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90090:*:*:*:*:*:*", matchCriteriaId: "25FA111C-01EA-49CA-BF67-A8C8C9A6E415", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90091:*:*:*:*:*:*", matchCriteriaId: "855DD295-DB63-4AF1-8C5A-0904BF049658", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90092:*:*:*:*:*:*", matchCriteriaId: "CDFE095C-C659-44BE-9740-C8B712165912", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90093:*:*:*:*:*:*", matchCriteriaId: "FFB28D66-83BF-4685-9015-0B30021C59C3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90094:*:*:*:*:*:*", matchCriteriaId: "9B82AA92-96B6-4841-BAC0-AA1487CBEB7D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90095:*:*:*:*:*:*", matchCriteriaId: "81A65567-42E6-416B-8FB0-2571FDF60207", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90096:*:*:*:*:*:*", matchCriteriaId: "2193F4C6-5679-487B-82B8-C55A874ED5A9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90097:*:*:*:*:*:*", matchCriteriaId: "124CB5EC-44C1-4136-B495-053F2299E59C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90098:*:*:*:*:*:*", matchCriteriaId: "A183735E-12AF-4692-A228-FE3B1169ABBC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90099:*:*:*:*:*:*", matchCriteriaId: "3C1C57BB-73A7-4B48-B99C-A18E1CE55553", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90100:*:*:*:*:*:*", matchCriteriaId: "020F4E45-45D2-4F1A-BAF8-8C61F45F5770", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90101:*:*:*:*:*:*", matchCriteriaId: "039F68D9-A36A-44BE-A457-790ECCB20FD5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90102:*:*:*:*:*:*", matchCriteriaId: "23BDB028-FCCE-4A9D-887B-6A6F8166CFCB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90103:*:*:*:*:*:*", matchCriteriaId: "5210BAA8-2ECC-49AA-8408-815433DC28D2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90104:*:*:*:*:*:*", matchCriteriaId: "C8DC19CC-3F95-4753-8037-FB627D1D6167", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90105:*:*:*:*:*:*", matchCriteriaId: "93F07AFE-4E9A-4001-A17A-606A7B5E83F7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90106:*:*:*:*:*:*", matchCriteriaId: "06B25C38-DE86-4F3E-918E-BC70FCC0054B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90107:*:*:*:*:*:*", matchCriteriaId: "E3F2E0E6-01D2-418D-872E-B117259E990F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90108:*:*:*:*:*:*", matchCriteriaId: "41D80E46-35FE-45E5-96D6-28691C0847DA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90109:*:*:*:*:*:*", matchCriteriaId: "4D7768DA-1111-4557-A0D6-D3A74AC7FA54", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90110:*:*:*:*:*:*", matchCriteriaId: "B3001463-3729-4216-B420-602A11C74244", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90111:*:*:*:*:*:*", matchCriteriaId: "9A68EC19-3A57-41C4-90FA-CB1BF20EB8DA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90112:*:*:*:*:*:*", matchCriteriaId: "193913B2-25D1-4779-B7E6-ACC5992AFC97", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90113:*:*:*:*:*:*", matchCriteriaId: "E7AA77AA-E00E-4125-A698-12B30434F632", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90114:*:*:*:*:*:*", matchCriteriaId: "229FBCFC-2810-44D1-9687-A7C060F6F9D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90115:*:*:*:*:*:*", matchCriteriaId: "99C3BBC2-F1D3-4873-A8FB-1B79A2163F74", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90116:*:*:*:*:*:*", matchCriteriaId: "4A06EF86-915C-4D09-965B-3A9D4DFC96B8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90117:*:*:*:*:*:*", matchCriteriaId: "3D67F80D-E999-4E46-8386-8122DC17DBCC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90118:*:*:*:*:*:*", matchCriteriaId: "2593B38A-1281-41C9-B065-E6EFDF6BD71C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90119:*:*:*:*:*:*", matchCriteriaId: "B61541E8-5818-475B-9E54-C45C71C14A9E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90120:*:*:*:*:*:*", matchCriteriaId: "84DE1BA0-8C36-44DF-91A0-96EA6EF736D2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90121:*:*:*:*:*:*", matchCriteriaId: "BB2F2DEA-5E03-442E-A46B-B6C218BF3273", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90122:*:*:*:*:*:*", matchCriteriaId: "CCEFA415-47D7-4DA2-B541-DD0B67AF30A7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_patch_connect_plus:9.0.0:build90123:*:*:*:*:*:*", matchCriteriaId: "B147B06A-969E-4541-A863-DF4045D39527", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:*:*:*:*:*:*:*:*", matchCriteriaId: "B20C46B3-C23E-42AF-BA81-117B8541171B", versionEndExcluding: "9.0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90012:*:*:*:*:*:*", matchCriteriaId: "A897E8C8-6058-4BEC-BF00-3E8614238E0B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90013:*:*:*:*:*:*", matchCriteriaId: "8B39A3B3-5B9E-4B31-9CE2-3625EA9C9AD6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90014:*:*:*:*:*:*", matchCriteriaId: "FBF5AF44-E30B-4948-B0E2-42EE062DC3A3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90015:*:*:*:*:*:*", matchCriteriaId: "356F078A-9887-423A-8BA7-74201DE109F4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90016:*:*:*:*:*:*", matchCriteriaId: "9B8887A3-14C6-4DFB-9EBF-35966B4E6158", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90017:*:*:*:*:*:*", matchCriteriaId: "3A0FE6B3-E037-45F4-A907-51CD99E7B8DD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90018:*:*:*:*:*:*", matchCriteriaId: "250CFA85-89C5-4F75-AF0F-BEA9C816E54E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90019:*:*:*:*:*:*", matchCriteriaId: "85B8B8F4-951D-446C-A8F8-EEBDC385D83E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90020:*:*:*:*:*:*", matchCriteriaId: "288C8246-7367-4D10-A0D4-5426B7EA17A7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90021:*:*:*:*:*:*", matchCriteriaId: "59326535-A08E-4588-BAB8-9DF094FB61F0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90022:*:*:*:*:*:*", matchCriteriaId: "077B9DBD-190C-4F20-BD3A-64D6887B7930", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90030:*:*:*:*:*:*", matchCriteriaId: "0587320F-C57E-41F7-B31F-1EA52ED234B2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90031:*:*:*:*:*:*", matchCriteriaId: "0911BEEC-A6E4-440C-8217-A7FAAC1D3972", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90032:*:*:*:*:*:*", matchCriteriaId: "A9D9805F-4F6B-4A15-A444-3B6538BCDDB0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90033:*:*:*:*:*:*", matchCriteriaId: "48901205-BDE9-4CBA-9E3B-779D949CBF58", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90034:*:*:*:*:*:*", matchCriteriaId: "69539391-6C6A-498A-B952-D4F12C2FEC4D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90035:*:*:*:*:*:*", matchCriteriaId: "4A36B8AA-987B-4112-8B67-5BC306F9CF86", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90036:*:*:*:*:*:*", matchCriteriaId: "96E9422A-CA9D-4BC8-90DB-3E3A1966E94C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90041:*:*:*:*:*:*", matchCriteriaId: "11A2E17D-3B33-4531-B78B-156BC2C7E53A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90042:*:*:*:*:*:*", matchCriteriaId: "4C34129B-5A15-4BE9-BB15-66101A5EAB65", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90043:*:*:*:*:*:*", matchCriteriaId: "DA9A87D7-0707-4321-B5D2-2B4CBC66E838", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90044:*:*:*:*:*:*", matchCriteriaId: "C2C06D73-9BEA-4604-BE73-3CE8A2DDD52A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90056:*:*:*:*:*:*", matchCriteriaId: "DAA7B941-6FE6-45CA-931D-6414DFEA9B50", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90057:*:*:*:*:*:*", matchCriteriaId: "F7EEEF6C-DD29-4E6F-BED7-AE10184C2F9C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90058:*:*:*:*:*:*", matchCriteriaId: "D36AD9EC-82D0-451B-ADD4-1EEC0FDC389B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90072:*:*:*:*:*:*", matchCriteriaId: "F68164FC-9A09-4145-97B8-99EE5532E6E8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90074:*:*:*:*:*:*", matchCriteriaId: "2FB5646D-11C7-4878-9471-4F6D483CE979", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90075:*:*:*:*:*:*", matchCriteriaId: "BBC0A0C3-C33E-46E9-A099-A5A66F576138", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90076:*:*:*:*:*:*", matchCriteriaId: "76584957-0388-4421-8336-75EE90D00349", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90077:*:*:*:*:*:*", matchCriteriaId: "05C542D5-7E3A-46E2-8CB6-A13159EFA4B9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90078:*:*:*:*:*:*", matchCriteriaId: "7E7BF415-29D3-4BD0-8613-317D7EC7C992", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90079:*:*:*:*:*:*", matchCriteriaId: "7F046602-4595-48C8-83F5-A43FD501003F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90080:*:*:*:*:*:*", matchCriteriaId: "FC5B464F-D327-4181-A911-2E3683B914B9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90081:*:*:*:*:*:*", matchCriteriaId: "025D8F22-968F-44B6-83E1-13DAB7A514A3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90082:*:*:*:*:*:*", matchCriteriaId: "F9F60549-59CE-47D0-BF2A-91B84A0B1984", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90083:*:*:*:*:*:*", matchCriteriaId: "6F982139-0EDC-411C-A074-A29963DCA328", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90084:*:*:*:*:*:*", matchCriteriaId: "FBED4ED7-E991-48D0-AE27-71F9DEA5EDA8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90085:*:*:*:*:*:*", matchCriteriaId: "8C6BE721-D851-406E-9AAF-01F9A9E15ADF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90086:*:*:*:*:*:*", matchCriteriaId: "F1D6E935-53D3-462D-9DD8-91BFEC90BB2F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90087:*:*:*:*:*:*", matchCriteriaId: "E580F0AB-B840-4293-8639-4B7DD7981EAB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90088:*:*:*:*:*:*", matchCriteriaId: "2CC8FE34-A5C9-4EF7-AA05-BEE403AB3B73", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_secure_gateway_server:9.0:90090:*:*:*:*:*:*", matchCriteriaId: "A80444F6-755F-4FE3-96B3-744A842D40AD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", matchCriteriaId: "0026FC79-6554-4B68-89EB-D7A8422C7406", versionEndExcluding: "12.5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", matchCriteriaId: "94F878CC-E691-41E9-A90D-72EA25038963", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", matchCriteriaId: "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", matchCriteriaId: "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", matchCriteriaId: "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", matchCriteriaId: "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", matchCriteriaId: "8FF84A5E-C43B-4637-B725-1087D2057EED", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", matchCriteriaId: "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", matchCriteriaId: "46E32091-F91D-4706-A4F9-DC658CF36A6D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", matchCriteriaId: "AC7D1106-6708-4A84-A077-286376C72AB7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", matchCriteriaId: "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", matchCriteriaId: "4E9D5882-91D6-4E9D-AD8B-F3861D987826", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", matchCriteriaId: "17931D40-369C-430F-B5ED-FAF69FAA0E3F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", matchCriteriaId: "02B4D022-BC43-4041-BA2B-60A6D42AD150", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", matchCriteriaId: "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", matchCriteriaId: "5ED17849-BC14-4996-9DF9-7645B1E17374", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", matchCriteriaId: "D91F6CC5-EDBE-420F-8871-03B8D10254B2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", matchCriteriaId: "E82C682C-9F61-45B7-B934-8D6DDBA792AC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", matchCriteriaId: "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", matchCriteriaId: "78BE6CCE-706E-436B-A6E6-26E7D044B209", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", matchCriteriaId: "8BD54A67-C531-4642-90D4-C6E402D55AC6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", matchCriteriaId: "9DF164BD-EF39-42E2-807D-F298D68A8D3D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", matchCriteriaId: "5D85766D-1BAC-4477-96D6-EA989D392128", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", matchCriteriaId: "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", matchCriteriaId: "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", matchCriteriaId: "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", matchCriteriaId: "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", matchCriteriaId: "02463016-7156-470F-8535-EF4C7E150546", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", matchCriteriaId: "8DEB616C-2DDC-4138-B6FC-8B2680D35485", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", matchCriteriaId: "D51E7B22-9293-4086-B143-2D279597A5CC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", matchCriteriaId: "BB4D8585-6109-45C0-94B4-667D11F0509F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", matchCriteriaId: "97CB62BA-09FA-446D-A8CF-958980B67F13", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", matchCriteriaId: "F871111C-4B61-4C50-ABDA-78D8D988DCD3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", matchCriteriaId: "9950CFB9-FCDE-4696-97AF-251467270375", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", matchCriteriaId: "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", matchCriteriaId: "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", matchCriteriaId: "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", matchCriteriaId: "CC052CBA-2B37-4E84-978D-36185EE1A3A2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", matchCriteriaId: "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", matchCriteriaId: "0C1691B0-FA38-4A29-8D49-D99A675C122A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", matchCriteriaId: "194ACE61-101D-40C3-9377-12039533AB45", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", matchCriteriaId: "86428D44-03BC-4528-ADB5-3AC05231759D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", matchCriteriaId: "B694D0FC-320A-44F9-9FFB-0706CDD3004C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", matchCriteriaId: "BE298317-10EE-4A34-B4D0-8D03B727A75B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", matchCriteriaId: "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", matchCriteriaId: "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", matchCriteriaId: "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", matchCriteriaId: "538BCF38-69B6-4686-B1F1-82B10175CCBD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", matchCriteriaId: "F29A6AE3-B864-4552-9BE9-074CB6935B07", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", matchCriteriaId: "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", matchCriteriaId: "76528168-A54D-4398-B558-6DC27ACCBFBF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", matchCriteriaId: "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", matchCriteriaId: "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", matchCriteriaId: "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", matchCriteriaId: "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", matchCriteriaId: "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", matchCriteriaId: "A2176672-0E34-4B46-9202-483F1D315836", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", matchCriteriaId: "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", matchCriteriaId: "94AF723B-F1B7-44A8-B654-7C10881A6AF8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*", matchCriteriaId: "0C65E8BE-968F-4AB8-BD3F-A123C66E576A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*", matchCriteriaId: "9A4C70B1-A902-4835-BFFC-692CA91C1317", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*", matchCriteriaId: "06FE113C-94B6-419B-8AA0-767EA74D11ED", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*", matchCriteriaId: "C30413D5-7F5B-47EE-825E-CEEF69DAC5B7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*", matchCriteriaId: "57DA6C66-3235-4923-89D0-EF093FF4126F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*", matchCriteriaId: "82307372-C2CF-4E19-9D1D-7D33FCCE8F5B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*", matchCriteriaId: "A5289D80-1C75-4819-B615-8259B25B1E9E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*", matchCriteriaId: "25CC8F8B-9072-41E3-8045-25D12EE22427", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*", matchCriteriaId: "6000E214-BF19-469C-A7CA-CC91465B2CDF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*", matchCriteriaId: "1AA9EA4B-DD82-46E7-9C44-77AC076F61CE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*", matchCriteriaId: "50E697EA-0A78-477D-B726-AC54EE868244", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*", matchCriteriaId: "E64AAB62-43C4-4284-B2AA-1DC55B972803", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*", matchCriteriaId: "E3A43E19-D06D-4856-AA55-02B8148EAB49", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*", matchCriteriaId: "310C491E-92CE-4EE8-9CDE-70640DE9CAB6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*", matchCriteriaId: "A82217B5-0A11-4BE6-ACEF-991B2DFE53D6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*", matchCriteriaId: "7C69DA1F-F0A3-4E9F-96E2-F7A4E9B876C5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*", matchCriteriaId: "033944E6-8A01-4566-81C4-2B76F10C2839", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*", matchCriteriaId: "3D969C61-1F9A-4B97-B6DA-04F84E3E2936", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*", matchCriteriaId: "9984754B-1FA5-4CDF-AFC3-BD97C6C6B177", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*", matchCriteriaId: "718427DB-57A7-4AB0-AA4C-7716E5A5F084", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*", matchCriteriaId: "CD43B869-6A7F-461D-A870-448C91FB7A02", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*", matchCriteriaId: "98DD8376-4B21-4024-878D-DB74D1FF7A2E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*", matchCriteriaId: "5E8B8FBA-39ED-4E7A-AA1C-A6C15E8C92B1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*", matchCriteriaId: "4742B198-8630-4A45-AE87-6731BF56081A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*", matchCriteriaId: "3782ABA4-5247-4349-8CD8-BCE85B98D44E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*", matchCriteriaId: "C39E5DB9-1B75-4204-9B24-70F6294F1F42", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*", matchCriteriaId: "F9459981-3E65-489C-9A70-B582EC9C8BC1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*", matchCriteriaId: "BF90B539-9180-4A96-9E2F-F35DCA6DD720", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*", matchCriteriaId: "2A6D1150-602E-4006-9F6B-10C6649AC05B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*", matchCriteriaId: "FB168E3D-63AB-45D7-AAC1-2D01CD6956F3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*", matchCriteriaId: "B8DCEAE6-AAE6-40B0-83B2-A579A6BF9854", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*", matchCriteriaId: "FCFEA624-968F-4A0F-969D-2190B1269EAC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*", matchCriteriaId: "64F9D21C-AC05-4629-864F-85AFA3789739", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*", matchCriteriaId: "07E47F97-63EC-4BF1-AE54-3B510B66202D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*", matchCriteriaId: "160765FF-9A56-4072-9580-C6DCB573B061", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*", matchCriteriaId: "F1EE56C3-5F42-4D2C-AEC0-035078DAE445", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*", matchCriteriaId: "16593100-F288-4013-BF48-48CA482FC62D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*", matchCriteriaId: "5BCA02F3-EF72-4F28-9ABB-D75EB6CE3338", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*", matchCriteriaId: "D8052948-7F5B-4E63-B1B7-B244D6A0AC39", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*", matchCriteriaId: "B6359934-CA70-4A8A-99E5-806555900EF6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*", matchCriteriaId: "83BAAE61-540D-4E36-8B63-2438EC3B1479", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*", matchCriteriaId: "008A2BF2-E18B-492F-9DFF-19618F998664", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*", matchCriteriaId: "5023E77A-908C-41AE-ADC7-580F44ADC376", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*", matchCriteriaId: "797D16E7-484D-4793-9040-74B815DC52B7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*", matchCriteriaId: "7D923373-B575-44C8-9B4D-DB824EC59B68", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*", matchCriteriaId: "B88917EC-3ABB-475E-B374-272CE5272D56", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*", matchCriteriaId: "BD457A1B-023A-42CF-ADED-648A061AAAE0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*", matchCriteriaId: "9B9E22A4-676A-4D75-850F-15E5EC9A2911", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*", matchCriteriaId: "4E6BA9C0-59DB-49E5-826E-1CA885FA28CE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*", matchCriteriaId: "95715B71-FA63-40A2-9EA6-56250318FC73", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*", matchCriteriaId: "2591F23D-DB1F-44B0-B67A-13483408DE4E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*", matchCriteriaId: "E4F035FB-54A9-47C0-8896-174A742E23B5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*", matchCriteriaId: "34B52052-FBFC-4803-B999-448A9385B613", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*", matchCriteriaId: "A1F97594-BF89-4B5D-B1CE-706708891450", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*", matchCriteriaId: "A436DAC3-05F7-48DE-A2E2-0084AE31D9A3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*", matchCriteriaId: "544961BA-03CA-49D6-AB7C-CFF597B3BB8E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*", matchCriteriaId: "9CDBD0CB-8495-44A1-BF9B-29A195D9F718", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*", matchCriteriaId: "73B5365C-92ED-41CC-9B05-8BB1FE21F3C5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125455:*:*:*:*:*:*", matchCriteriaId: "B652092E-570C-4D4E-A133-627426C50F6E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125456:*:*:*:*:*:*", matchCriteriaId: "DC13FB20-119C-47F9-870D-399811661896", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125457:*:*:*:*:*:*", matchCriteriaId: "BC457292-04FE-4643-8F1D-05DAEF3F70BC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125466:*:*:*:*:*:*", matchCriteriaId: "29CBDA2B-5A6A-4DB0-AC37-EAD8E05B55BE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125467:*:*:*:*:*:*", matchCriteriaId: "CD266A0D-E726-4BC7-B3B9-6E3176415188", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125468:*:*:*:*:*:*", matchCriteriaId: "046B7B6F-85DE-4BDB-8860-ECA208C4D697", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125469:*:*:*:*:*:*", matchCriteriaId: "C60E51D9-A842-49FF-8793-84C074DBE5EF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125470:*:*:*:*:*:*", matchCriteriaId: "753B2FC9-342B-4456-85D9-27734BE7C6FB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125476:*:*:*:*:*:*", matchCriteriaId: "BE930B14-4B22-4299-8DE8-7625342FC4E7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125482:*:*:*:*:*:*", matchCriteriaId: "45B93007-AD6A-4978-9752-41DF72D34A5F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125483:*:*:*:*:*:*", matchCriteriaId: "863CBACB-F9A3-44AC-B795-C2C0EB5C9E3F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125485:*:*:*:*:*:*", matchCriteriaId: "AB28B644-BFD0-4588-B544-A139B26DDDE4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125486:*:*:*:*:*:*", matchCriteriaId: "944F7C2F-53D4-4933-BD63-DF15C5A5CD65", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125487:*:*:*:*:*:*", matchCriteriaId: "F6D0F0D1-7DF5-4C8D-9B31-B347E5A567DD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125488:*:*:*:*:*:*", matchCriteriaId: "870A721F-2991-4041-AB1D-DE3D953B8669", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125489:*:*:*:*:*:*", matchCriteriaId: "4F7FC0E5-8D0D-45CF-AEFA-180B79BC8B0C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125567:*:*:*:*:*:*", matchCriteriaId: "7D394493-D690-44F0-B3F0-FD39E46F31C0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125568:*:*:*:*:*:*", matchCriteriaId: "AF8CBF57-EF1A-4C84-879B-1A4035F4236A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125587:*:*:*:*:*:*", matchCriteriaId: "2F1E924E-8896-41CE-82E2-F22943A02FCE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125588:*:*:*:*:*:*", matchCriteriaId: "FB058840-E3D0-45FA-B95F-3445A7719118", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125589:*:*:*:*:*:*", matchCriteriaId: "FD9B23C4-3458-4E6C-B1AB-D4A36BE8FFA2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125597:*:*:*:*:*:*", matchCriteriaId: "D2A7AA89-7233-4624-894A-B2B996D1D270", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125598:*:*:*:*:*:*", matchCriteriaId: "B6B402ED-8B64-4FB0-B9E7-76E499A4115F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125599:*:*:*:*:*:*", matchCriteriaId: "4E8B01F2-0A03-48CF-8BAE-556A9C3D88FC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125601:*:*:*:*:*:*", matchCriteriaId: "3C07E022-B75C-4491-8A30-9A1532D0472C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125603:*:*:*:*:*:*", matchCriteriaId: "00E92DB5-8D53-4129-92D0-AD1DA0F1FEB6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125604:*:*:*:*:*:*", matchCriteriaId: "913CD99C-8F47-47BD-BD7C-33762861BB08", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125605:*:*:*:*:*:*", matchCriteriaId: "67B7F52E-7D7A-4AA9-9241-FFCC3DD49BBB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125611:*:*:*:*:*:*", matchCriteriaId: "D02650C3-1A7F-4889-B6CB-11994054B5F6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125612:*:*:*:*:*:*", matchCriteriaId: "01FEA1CA-351B-4E2B-A78E-60338682F97F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125613:*:*:*:*:*:*", matchCriteriaId: "04C9E097-FE04-42BD-96C8-2A3A9FD50B25", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125614:*:*:*:*:*:*", matchCriteriaId: "94F895DB-C865-4AED-A1D9-CE69C0EF52FB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125615:*:*:*:*:*:*", matchCriteriaId: "8B565B12-283F-4323-9C88-FD3CF5646DD6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125616:*:*:*:*:*:*", matchCriteriaId: "9FDC3394-293E-44CF-A83F-FE047A4E4DE0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125617:*:*:*:*:*:*", matchCriteriaId: "01846F8F-D7D6-4CD9-B83E-41B70C691761", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125628:*:*:*:*:*:*", matchCriteriaId: "CAE013FC-357D-42DA-B223-D40B3C813089", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125629:*:*:*:*:*:*", matchCriteriaId: "E4BA87E9-5E37-41EE-835C-13F68ABC9C06", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125630:*:*:*:*:*:*", matchCriteriaId: "D2034E17-2DB9-4229-B7D4-D14761CEE699", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125631:*:*:*:*:*:*", matchCriteriaId: "39FBAFB9-5703-4EEA-BFF3-45B958E0805F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", matchCriteriaId: "93A02A7E-02A8-4B74-AA9F-3DA0492748EF", versionEndExcluding: "12.7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127000:*:*:*:*:*:*", matchCriteriaId: "24B04D73-0C55-49A8-B599-27C8C04948C5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127001:*:*:*:*:*:*", matchCriteriaId: "97E74846-1666-4773-910D-77E0E19A7FCD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127002:*:*:*:*:*:*", matchCriteriaId: "BB90B809-9D97-469F-B8F6-41B4AEAA2D3E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127003:*:*:*:*:*:*", matchCriteriaId: "423C8618-9F3B-4B83-902C-FF01027EC54A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127004:*:*:*:*:*:*", matchCriteriaId: "7E974B56-7A00-4582-AF8B-0D09B94477BF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127100:*:*:*:*:*:*", matchCriteriaId: "7B6F8404-F624-41AA-BE8D-170D843EC290", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127101:*:*:*:*:*:*", matchCriteriaId: "D0FF81E5-2134-4F45-9B39-2E3D5208BB80", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127102:*:*:*:*:*:*", matchCriteriaId: "0D5DA95F-7C0F-4D05-BD35-DED356D01692", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127103:*:*:*:*:*:*", matchCriteriaId: "2B3A3EC3-DF7C-41A6-884C-C7C13D41B61E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127104:*:*:*:*:*:*", matchCriteriaId: "89EE3E31-8F55-4E44-8522-A32D6887AE97", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127109:*:*:*:*:*:*", matchCriteriaId: "979ED7B4-FAE3-4E98-A303-290E498FFD81", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127116:*:*:*:*:*:*", matchCriteriaId: "EDC62E2F-AB97-4008-A52B-9CDC341A06BD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127117:*:*:*:*:*:*", matchCriteriaId: "93DF7023-22AE-4A84-8734-06239013C10C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127118:*:*:*:*:*:*", matchCriteriaId: "2A128BED-75FA-42F1-9171-CBAEAA2366A6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127119:*:*:*:*:*:*", matchCriteriaId: "5298BB50-8E22-490A-87C7-7F40B7F8F7C1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127120:*:*:*:*:*:*", matchCriteriaId: "39C34F02-E413-4067-B958-86ADF89FA3AA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127122:*:*:*:*:*:*", matchCriteriaId: "A0673E69-A2DB-424C-BBF0-79D729230F1E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127123:*:*:*:*:*:*", matchCriteriaId: "4F062A20-6FFE-479B-9E64-E4771490B041", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127131:*:*:*:*:*:*", matchCriteriaId: "C598244E-7483-4762-AC27-BD8036FEFE5E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127133:*:*:*:*:*:*", matchCriteriaId: "B188A792-EF1A-4292-BD91-47635706C430", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127134:*:*:*:*:*:*", matchCriteriaId: "BEFACD7A-D81B-4EDC-9E38-FD93FA0DE456", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127136:*:*:*:*:*:*", matchCriteriaId: "DF818138-079A-43BE-A8B5-5DA47FA443AA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127138:*:*:*:*:*:*", matchCriteriaId: "27066A8F-75C4-42BF-A54B-543114B92995", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127140:*:*:*:*:*:*", matchCriteriaId: "A239C6F8-3FC0-4510-B33F-14B25908E68F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127141:*:*:*:*:*:*", matchCriteriaId: "E8399E84-1344-4472-91F3-F63255911876", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127185:*:*:*:*:*:*", matchCriteriaId: "8888C77E-04A7-4C34-B497-504F6217E07B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127186:*:*:*:*:*:*", matchCriteriaId: "7502D92A-3B51-4A76-88D6-E2D76A584075", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127187:*:*:*:*:*:*", matchCriteriaId: "7E465A5F-C8B0-4AD0-8D6D-4823C5F8153D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127188:*:*:*:*:*:*", matchCriteriaId: "DBA622D6-CD85-4F0F-8CC3-39FE29754039", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127189:*:*:*:*:*:*", matchCriteriaId: "A0D2828B-B897-4F1D-B657-436DB3CAC2FD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127191:*:*:*:*:*:*", matchCriteriaId: "98279B6E-8361-45CA-8912-F06972F4BD1B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127240:*:*:*:*:*:*", matchCriteriaId: "A7D879C8-E89F-45C1-9609-80B737080AFE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127241:*:*:*:*:*:*", matchCriteriaId: "3D8FD2DE-18D9-4F50-9256-672435059876", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_opmanager:12.7:build127242:*:*:*:*:*:*", matchCriteriaId: "F01FEA58-BE5B-4CEC-831D-3BF05A20688D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:*:*:*:*:*:*:*:*", matchCriteriaId: "039C6DE6-DEA2-42E9-AE55-322E8E6B048C", versionEndExcluding: "12.5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125000:*:*:*:*:*:*", matchCriteriaId: "55EA00B6-DE5D-4DE4-85AC-38A1216B4923", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125108:*:*:*:*:*:*", matchCriteriaId: "BC4DF055-45CD-4B83-A7BA-59D6E46BD4D8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125119:*:*:*:*:*:*", matchCriteriaId: "F9B51EF5-800F-446B-9F2D-47D45445E73E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125120:*:*:*:*:*:*", matchCriteriaId: "C4C2087D-1B7B-4DA4-8288-D5366BC9735F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125125:*:*:*:*:*:*", matchCriteriaId: "B8FE0307-3CA7-445E-BA42-27D65C298E3D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125129:*:*:*:*:*:*", matchCriteriaId: "F6F9CB58-3B55-4E6F-AE24-D16552EE3614", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125138:*:*:*:*:*:*", matchCriteriaId: "006DB16B-34C4-4359-96A1-381F7C66BF18", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125149:*:*:*:*:*:*", matchCriteriaId: "7EFE37CC-58F5-4B08-95C2-D9DAFC8D9C31", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125162:*:*:*:*:*:*", matchCriteriaId: "4F102286-1D21-48AB-A1B4-ADB5A4D3EEA7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125180:*:*:*:*:*:*", matchCriteriaId: "7DDD3297-57ED-40D4-AC54-4484A3E9C633", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125194:*:*:*:*:*:*", matchCriteriaId: "8F467A89-13F7-47E9-8285-041DB3F33603", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125212:*:*:*:*:*:*", matchCriteriaId: "E8C93717-4E5A-4686-A83F-A7D4AC732144", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125213:*:*:*:*:*:*", matchCriteriaId: "5A15AF17-8500-4102-AF1C-897360BB985C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125233:*:*:*:*:*:*", matchCriteriaId: "D9B364E3-45C1-4C71-BB6D-9D831449CF4F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125329:*:*:*:*:*:*", matchCriteriaId: "4CCB49B2-4AA1-4223-98F0-1E0872566BC7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125357:*:*:*:*:*:*", matchCriteriaId: "5D0A19E8-F0B3-446D-B991-C63657BC2A61", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125362:*:*:*:*:*:*", matchCriteriaId: "1C7CD9C4-861D-42C0-9209-0843613F94B4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125363:*:*:*:*:*:*", matchCriteriaId: "AD44F42F-709B-4FBE-B9C7-9944A874D489", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125381:*:*:*:*:*:*", matchCriteriaId: "23C53DA5-F50F-4FA5-AF8B-4EA174BB4E57", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125395:*:*:*:*:*:*", matchCriteriaId: "199EE3C2-2D58-4777-8592-D000D135E2A2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125399:*:*:*:*:*:*", matchCriteriaId: "0CE514D6-6C6A-4DAD-8DB2-FA1F12FFAFBB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125412:*:*:*:*:*:*", matchCriteriaId: "461FD5FC-2D14-44FC-88F0-783EDDD63483", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125429:*:*:*:*:*:*", matchCriteriaId: "65FD6158-1B99-4C17-A167-41D6B1CD62F7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125449:*:*:*:*:*:*", matchCriteriaId: "188123C8-7E72-4690-A322-888BED90FB7A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125450:*:*:*:*:*:*", matchCriteriaId: "2BF85206-863D-493C-88F4-15B0BA5276A1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125451:*:*:*:*:*:*", matchCriteriaId: "3C9DE996-1DEC-4AF0-89FD-1E3DA3967BC6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125452:*:*:*:*:*:*", matchCriteriaId: "75FF4D85-97C8-4DF4-ADE6-EDE8EC2DD5BE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125453:*:*:*:*:*:*", matchCriteriaId: "9CAC6467-19F7-4CB2-A5FC-B57A14F4636C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125455:*:*:*:*:*:*", matchCriteriaId: "60EB56E2-7367-4488-A00D-41464E86B06D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125456:*:*:*:*:*:*", matchCriteriaId: "3E315636-0897-4421-882D-E8196F7ACAD1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125459:*:*:*:*:*:*", matchCriteriaId: "EE609902-17AF-491B-8749-C8AF4E0A8241", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125467:*:*:*:*:*:*", matchCriteriaId: "6EFF6295-3F73-448D-8109-453E0DFD2002", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125471:*:*:*:*:*:*", matchCriteriaId: "35A535BC-644B-4B10-8F66-779FAF503683", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125475:*:*:*:*:*:*", matchCriteriaId: "DDD4AA74-4B07-44A1-A32F-88B0B1E90ACA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125483:*:*:*:*:*:*", matchCriteriaId: "52203983-0CC9-49DB-B100-49CD9F5CE688", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125485:*:*:*:*:*:*", matchCriteriaId: "095362BF-69CD-458F-8A44-E3D6AFC8C41F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125490:*:*:*:*:*:*", matchCriteriaId: "65F6F508-F0BF-4821-8B50-24A9B652522E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125564:*:*:*:*:*:*", matchCriteriaId: "4044EE7F-268B-4CC7-9982-80766BE5790E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125568:*:*:*:*:*:*", matchCriteriaId: "6F87A77C-E40F-4DDE-9260-FCF12B237FA8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125581:*:*:*:*:*:*", matchCriteriaId: "51CF193E-D5A6-423A-A5E2-B0ACF4B002E3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125596:*:*:*:*:*:*", matchCriteriaId: "7C10F5A0-6FFE-4907-8A61-61CF11FC7A69", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125606:*:*:*:*:*:*", matchCriteriaId: "6B3F637D-3724-4314-BCC7-A6A06040DF00", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125617:*:*:*:*:*:*", matchCriteriaId: "18598449-D0EE-445F-BA6A-2CD658DAF4D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125657:*:*:*:*:*:*", matchCriteriaId: "6DC52F3E-EC5F-404B-ABD7-615B8AB522A8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.5:build125664:*:*:*:*:*:*", matchCriteriaId: "E3552F71-C708-41A4-9168-5673C086F507", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:*:*:*:*:*:*:*:*", matchCriteriaId: "6A1DA3A9-36FB-4BCA-AEEC-231A2C3127D0", versionEndExcluding: "12.7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127101:*:*:*:*:*:*", matchCriteriaId: "0BA30C26-D3D8-447C-BD7A-9BC166C8BF3E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127117:*:*:*:*:*:*", matchCriteriaId: "162E0203-17E1-427E-A351-33F75E8FE5A1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127134:*:*:*:*:*:*", matchCriteriaId: "61FB54BF-7A8F-4EE5-AF42-15E2B69E9DE9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127241:*:*:*:*:*:*", matchCriteriaId: "764139C9-FF6A-4BE0-BAF3-52F403C41393", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_oputils:12.7:build127242:*:*:*:*:*:*", matchCriteriaId: "3D9805F6-1A56-4FBF-8F47-DAA80E4DE9FC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*", matchCriteriaId: "E9FF3515-61C7-4A7A-9781-6D4A0340B2EC", versionEndExcluding: "12.5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125000:*:*:*:*:*:*", matchCriteriaId: "77AA96FD-5AF0-4F80-8402-BAB460FF8B75", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125003:*:*:*:*:*:*", matchCriteriaId: "3095B4D1-170A-48B0-8C4A-7A7A54E42149", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125108:*:*:*:*:*:*", matchCriteriaId: "8CE4267C-DAAE-4CEC-A6E3-D2213AA5EE57", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125109:*:*:*:*:*:*", matchCriteriaId: "92EB7DC6-F227-40B3-A093-4D9495BBE272", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125115:*:*:*:*:*:*", matchCriteriaId: "40C478D3-7C1C-4FCE-99FA-976EE2754680", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125120:*:*:*:*:*:*", matchCriteriaId: "DE6C88E4-D382-4729-AF5D-5697DCE26A67", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125122:*:*:*:*:*:*", matchCriteriaId: "6447F4D8-0943-4C8C-BBA7-42BECC181D80", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125125:*:*:*:*:*:*", matchCriteriaId: "422B8CB6-3A14-4452-9192-F4CD5BF5D030", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125141:*:*:*:*:*:*", matchCriteriaId: "41AB6C1A-CBEC-4DC1-94A4-9D14E82BA542", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125142:*:*:*:*:*:*", matchCriteriaId: "6A2C060F-770B-4245-8490-5D2EB970FCA0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125149:*:*:*:*:*:*", matchCriteriaId: "16E635CC-1591-4535-89EA-B8470BD885F0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125150:*:*:*:*:*:*", matchCriteriaId: "D5F9E623-A42D-446D-ADDD-5F3C8F7BD9B8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125160:*:*:*:*:*:*", matchCriteriaId: "1E235AF0-4453-4439-A25D-FF78A89BB117", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125179:*:*:*:*:*:*", matchCriteriaId: "620E40E9-9D83-4E14-8898-10C0718B1A1C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125180:*:*:*:*:*:*", matchCriteriaId: "1D72F651-BD8C-4564-AC1A-84A91F21EADA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125194:*:*:*:*:*:*", matchCriteriaId: "19DD9FF2-583B-4079-9375-E1643FF9A54B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125200:*:*:*:*:*:*", matchCriteriaId: "69EDC39C-68EE-488D-B740-9E45229BDF2E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125212:*:*:*:*:*:*", matchCriteriaId: "EC374820-208A-40EF-965C-50C19467BD82", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125213:*:*:*:*:*:*", matchCriteriaId: "397B1FAC-EB6E-4F17-B5D7-CBD47D581DF5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125217:*:*:*:*:*:*", matchCriteriaId: "E771BCA5-9E65-4C8B-BF36-E90F641D2015", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125221:*:*:*:*:*:*", matchCriteriaId: "A658460A-FAE0-4487-8CD6-FB3384664F9D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125232:*:*:*:*:*:*", matchCriteriaId: "6F104D17-7D08-42A5-BAF3-DEA475308FC6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125323:*:*:*:*:*:*", matchCriteriaId: "9F875BFA-18C2-42BF-8BC4-D02E15B395E6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125329:*:*:*:*:*:*", matchCriteriaId: "3BBD9D22-7E92-4648-972E-E17D9472E08D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125357:*:*:*:*:*:*", matchCriteriaId: "7219F9A0-CD1D-4BB4-A5E1-FA0495B49114", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125361:*:*:*:*:*:*", matchCriteriaId: "0CBB0F67-9C81-44BC-9836-DE5FE40DDBBF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125362:*:*:*:*:*:*", matchCriteriaId: "6D7C0250-52DA-423D-B061-0CDF39D15068", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125376:*:*:*:*:*:*", matchCriteriaId: "6FC34D3F-FED3-4266-AB29-98FFC2002507", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125381:*:*:*:*:*:*", matchCriteriaId: "DD1460AC-A719-4B75-B28B-748B6C262A87", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125399:*:*:*:*:*:*", matchCriteriaId: "B9024FE1-536C-4180-8115-6D97E7C324D1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125410:*:*:*:*:*:*", matchCriteriaId: "8CD6EB21-3DC6-47A7-939A-AA3C8EFE278F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125429:*:*:*:*:*:*", matchCriteriaId: "3A5911F7-7A45-499D-B345-D9C082932BBA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125447:*:*:*:*:*:*", matchCriteriaId: "CBBD7A90-4F97-4DFD-B8E6-F24A9B72A1C0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125459:*:*:*:*:*:*", matchCriteriaId: "87C6DCE0-5F40-4F50-8538-29CFF2DCC9EA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125464:*:*:*:*:*:*", matchCriteriaId: "BECA9FA7-887B-4ECC-AA23-F75F96E42CB3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125467:*:*:*:*:*:*", matchCriteriaId: "CFD6D448-337E-4A63-8BE2-4DFC50AE7413", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125475:*:*:*:*:*:*", matchCriteriaId: "33F2625D-0750-4ED1-8BA7-8141D8B7FB01", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125482:*:*:*:*:*:*", matchCriteriaId: "A7D6DD58-62F3-4727-9AC1-E6B5EA71BB89", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125483:*:*:*:*:*:*", matchCriteriaId: "33991587-174F-48D9-821D-BF44CF24924D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125484:*:*:*:*:*:*", matchCriteriaId: "18B8D15F-0286-4D64-96F8-D213E241813E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125485:*:*:*:*:*:*", matchCriteriaId: "EB8483C1-6586-4936-8BF8-ECE3F0F4D5F5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125488:*:*:*:*:*:*", matchCriteriaId: "A9318551-C41F-46E9-A196-5C01EAE276F4", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125490:*:*:*:*:*:*", matchCriteriaId: "5030E129-0401-457B-B4FB-974AD5A0A948", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125557:*:*:*:*:*:*", matchCriteriaId: "74DAFF5A-7090-427F-A69E-2E90456485C1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125568:*:*:*:*:*:*", matchCriteriaId: "8EB26A23-108E-4F39-84E3-2F1C197C8CE2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125582:*:*:*:*:*:*", matchCriteriaId: "DF57D557-B1B9-4B2E-81A5-B23C1A8521E1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125605:*:*:*:*:*:*", matchCriteriaId: "E37E20B2-B678-45C1-9EF9-7D65172B485F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125606:*:*:*:*:*:*", matchCriteriaId: "722042FB-CFE5-4DE8-A196-65D2E035378F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125615:*:*:*:*:*:*", matchCriteriaId: "17CC4F0C-E69E-4FA5-8119-D71AD9C13E63", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.5:build125621:*:*:*:*:*:*", matchCriteriaId: "B8DA03F6-8EF8-48E1-B4CF-A2B0CB6F1DEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:*", matchCriteriaId: "50FB7952-0CED-4A64-A435-D588CA661630", versionEndExcluding: "12.7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127000:*:*:*:*:*:*", matchCriteriaId: "8343B084-2009-44F2-B36C-C66719BBB1FB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127101:*:*:*:*:*:*", matchCriteriaId: "2574DD71-36A4-47AE-ABC3-D05D36FF8F02", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127130:*:*:*:*:*:*", matchCriteriaId: "B9D787C9-F37B-4193-A34F-080F7410BFA7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127131:*:*:*:*:*:*", matchCriteriaId: "55FB4705-D709-42F0-A562-6C5A05E00EAE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.7:build127187:*:*:*:*:*:*", matchCriteriaId: "4503E624-DC7F-4C5E-B715-0EC4676CA1ED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*", matchCriteriaId: "340D8561-6110-49D8-BCDC-78A762FCD3E6", versionEndExcluding: "12.5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125000:*:*:*:*:*:*", matchCriteriaId: "C61E9B3D-A39D-428E-A82F-5C4C225906C9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125108:*:*:*:*:*:*", matchCriteriaId: "423D3372-F910-4006-9FE8-49A6B730AEBE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125109:*:*:*:*:*:*", matchCriteriaId: "02B0ED3C-4729-4C70-8F06-6B507ED75BEC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125115:*:*:*:*:*:*", matchCriteriaId: "3CE0B4B2-CC4C-4F0F-B97E-A90C84377989", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125120:*:*:*:*:*:*", matchCriteriaId: "DC2E4C62-9867-4D14-85B3-95F359BD0551", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125122:*:*:*:*:*:*", matchCriteriaId: "5042AD90-4DF1-4A5A-9317-017102515284", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125125:*:*:*:*:*:*", matchCriteriaId: "356A4F91-FA5B-4A09-841E-A380F580BA88", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125129:*:*:*:*:*:*", matchCriteriaId: "CBBDC611-498B-4175-9A88-5914ED6D3A9E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125141:*:*:*:*:*:*", matchCriteriaId: "10F3C9AD-9C1B-4FBD-8325-B56FCF96FFE8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125149:*:*:*:*:*:*", matchCriteriaId: "F4EE5C24-C4AE-4F9D-B808-8930102A1389", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125160:*:*:*:*:*:*", matchCriteriaId: "E0F45A48-5006-4748-B683-6C7CB469286A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125179:*:*:*:*:*:*", matchCriteriaId: "9796C62A-8FCA-4E1E-855E-7D67F77C9AD7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125180:*:*:*:*:*:*", matchCriteriaId: "1A1AC2FD-91BA-4B78-BB14-B9F2CEB09071", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125200:*:*:*:*:*:*", matchCriteriaId: "A4B99FDC-EC68-4006-B359-E845AEF72FA1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125212:*:*:*:*:*:*", matchCriteriaId: "240A8575-F963-4DB4-B9C6-BE584A2F8271", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125213:*:*:*:*:*:*", matchCriteriaId: "B97F1BEE-F3C0-4DDD-B767-23C4BE9054AA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125217:*:*:*:*:*:*", matchCriteriaId: "3B3482FA-9483-4EC7-9B09-E1BB63F02790", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125232:*:*:*:*:*:*", matchCriteriaId: "2600FBC5-8358-4126-88F2-00F3BEE9B537", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125323:*:*:*:*:*:*", matchCriteriaId: "FDD47CB0-3680-4ED9-821C-B673EACB953D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125329:*:*:*:*:*:*", matchCriteriaId: "D27B76C3-B8C8-48A6-AEF3-E9145B57EDA5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125357:*:*:*:*:*:*", matchCriteriaId: "6D77C576-035E-403B-A2B3-992496FAD202", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125362:*:*:*:*:*:*", matchCriteriaId: "70608921-F02A-4121-BE90-919DD68DD0D0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125376:*:*:*:*:*:*", matchCriteriaId: "93C50660-6ECF-4353-A15A-4F7B0F06D33A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125381:*:*:*:*:*:*", matchCriteriaId: "06D8864A-E6CC-4742-A2CF-B060E8DFA740", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125393:*:*:*:*:*:*", matchCriteriaId: "D2572B3B-3BC4-4A83-92D5-8D7579821F4B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125399:*:*:*:*:*:*", matchCriteriaId: "0DD78F90-5231-4848-8971-9AB5ABBD2C33", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125412:*:*:*:*:*:*", matchCriteriaId: "7C94C142-168F-421C-B00B-3F42AA1CC9D3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125429:*:*:*:*:*:*", matchCriteriaId: "77CE4835-6540-4CF6-A31C-255DA52BB073", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125447:*:*:*:*:*:*", matchCriteriaId: "E0544AE8-92B3-43A7-8F42-299AED1A40CC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125450:*:*:*:*:*:*", matchCriteriaId: "BEC805D2-CFDC-40DE-AA70-42A91461BEE6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125451:*:*:*:*:*:*", matchCriteriaId: "4767BF5A-B867-44BB-B152-E2AFA63B06D2", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125452:*:*:*:*:*:*", matchCriteriaId: "5855C471-07AB-4A96-9631-26C6C8B01F67", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125453:*:*:*:*:*:*", matchCriteriaId: "5075910F-3676-439A-879A-5CBE2C734347", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125455:*:*:*:*:*:*", matchCriteriaId: "20808F91-7F08-4BA9-9075-C54337EC68E5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125456:*:*:*:*:*:*", matchCriteriaId: "C700CE3B-31B5-4B4D-A378-70EC26D6F88B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125459:*:*:*:*:*:*", matchCriteriaId: "A05AFF4D-4EF9-4939-81CC-0AB55DA596F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125464:*:*:*:*:*:*", matchCriteriaId: "86C3E31F-87E2-459F-8D1B-C6D1A237960D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125467:*:*:*:*:*:*", matchCriteriaId: "A3E7FC26-0000-4D4B-B489-DF0E2CD2B13C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125469:*:*:*:*:*:*", matchCriteriaId: "13E6E0F9-9D03-4665-9C89-6BE62ADCB39C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125471:*:*:*:*:*:*", matchCriteriaId: "0DE52003-E959-420F-89A1-C86D8FB12DBF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125476:*:*:*:*:*:*", matchCriteriaId: "6E9C9051-7FDE-4DEE-85DC-0798524DC17A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125482:*:*:*:*:*:*", matchCriteriaId: "5BE3598F-CEB4-4553-BB50-AA778BBF8BDF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125483:*:*:*:*:*:*", matchCriteriaId: "4C71852D-D529-469A-9111-6D4DB8381BD9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125484:*:*:*:*:*:*", matchCriteriaId: "EC3F7DA9-3FBF-4D67-8BA5-2643E706F64F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125485:*:*:*:*:*:*", matchCriteriaId: "53E2DF01-9A39-4E50-BEDE-D49988CE5CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125488:*:*:*:*:*:*", matchCriteriaId: "0015664D-11BC-4DEE-BC5B-DB3D1FE8DF82", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125490:*:*:*:*:*:*", matchCriteriaId: "8B49F887-4574-4B3C-A8A7-57F75B27447F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125557:*:*:*:*:*:*", matchCriteriaId: "C1E93E4D-0E54-41DF-843A-E8AE94EAD0BB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125566:*:*:*:*:*:*", matchCriteriaId: "1617ADAD-2E13-4910-B600-3EC7E59B087C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125568:*:*:*:*:*:*", matchCriteriaId: "4E7B4955-F688-47DE-B1FF-D417EBDFF9C5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125582:*:*:*:*:*:*", matchCriteriaId: "5F982932-5513-411A-9CBF-3082C7ECEF0A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125584:*:*:*:*:*:*", matchCriteriaId: "0B5378E9-D011-4B12-8DEE-442F22789C08", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125585:*:*:*:*:*:*", matchCriteriaId: "8232CBA1-55DA-4F3C-A9E5-A204A25231C5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125606:*:*:*:*:*:*", matchCriteriaId: "253569A5-4A2E-4163-88DC-C0FE6B79E06E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.5:build125615:*:*:*:*:*:*", matchCriteriaId: "A30281F3-4DE2-4ED3-91A7-AE7A091C31E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*", matchCriteriaId: "9222E54C-0A7C-4828-9917-7CFD7EE8BC59", versionEndExcluding: "12.7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127000:*:*:*:*:*:*", matchCriteriaId: "85778DB3-87D9-4C6A-9149-C58C45913268", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127003:*:*:*:*:*:*", matchCriteriaId: "3973EC75-A70A-475A-82BB-409992F09392", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127101:*:*:*:*:*:*", matchCriteriaId: "14537D55-3ABE-423C-B320-6811292620AE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127130:*:*:*:*:*:*", matchCriteriaId: "FCB0BDE0-5BD3-4315-A74B-D7065ABC91BA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127131:*:*:*:*:*:*", matchCriteriaId: "3E850CF4-9078-4E43-A87C-8323536E8CD6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:12.7:build127187:*:*:*:*:*:*", matchCriteriaId: "EC407852-45B1-47F4-A886-AF8B473A86D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "DCB0C7A9-5511-4AC9-B5E4-74AAE6973E34", versionEndExcluding: "12.5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125000:*:*:*:*:*:*", matchCriteriaId: "BDA5DDA4-A67C-4370-B41D-02755FCF1F6C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125108:*:*:*:*:*:*", matchCriteriaId: "3D99CD97-1D6B-4C67-A909-E1CE28A78E10", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125112:*:*:*:*:*:*", matchCriteriaId: "70FEC14F-A53C-437C-981A-214B867142E8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125115:*:*:*:*:*:*", matchCriteriaId: "895E57EA-A8F6-425B-9D08-654E03B92B30", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125116:*:*:*:*:*:*", matchCriteriaId: "9EE0C771-B2F6-4766-82FD-203967CE37D7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125120:*:*:*:*:*:*", matchCriteriaId: "0DCD6102-19F7-42D2-A81B-C85824CA351D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125121:*:*:*:*:*:*", matchCriteriaId: "3C2C0A08-66BF-4FDC-A209-769234438844", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125125:*:*:*:*:*:*", matchCriteriaId: "8DDC3649-12A9-41F3-A27D-646B5DF05E93", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125129:*:*:*:*:*:*", matchCriteriaId: "4F037A2A-4B9A-4EBC-94E2-87502960FF20", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125136:*:*:*:*:*:*", matchCriteriaId: "B15E99A3-989F-4EFD-BA26-DEC6992BD1CD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125142:*:*:*:*:*:*", matchCriteriaId: "B85BF117-503B-435F-8667-481D9AC7A788", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125149:*:*:*:*:*:*", matchCriteriaId: "3AC2A038-F59B-4137-B02F-4C26E2EB9152", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125180:*:*:*:*:*:*", matchCriteriaId: "F605C78F-8BE4-4E02-A7FB-CA9D24AFE7E5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125195:*:*:*:*:*:*", matchCriteriaId: "15557A07-E0E9-40DB-B013-0F4AD9556BD6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125199:*:*:*:*:*:*", matchCriteriaId: "79082C84-9F25-4A63-86AF-18CC4ADF71CE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125212:*:*:*:*:*:*", matchCriteriaId: "A88678CE-DB64-4D66-8F2A-3C60058DC5CF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125213:*:*:*:*:*:*", matchCriteriaId: "88009BAC-1ECF-4BA3-855F-96C8789E476E", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125216:*:*:*:*:*:*", matchCriteriaId: "E64F7B54-6B09-4B7E-B2AB-5EA73FD8E0AF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125228:*:*:*:*:*:*", matchCriteriaId: "2B94DFD2-374C-47A9-9D54-3FDB63197FFA", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125232:*:*:*:*:*:*", matchCriteriaId: "9B0330D9-1276-4228-BA7E-B9E3B828E5AE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125233:*:*:*:*:*:*", matchCriteriaId: "89736956-D05D-437B-BC7A-850AA459C123", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125234:*:*:*:*:*:*", matchCriteriaId: "63B26424-7292-4F37-B86F-2A4E0AD32B85", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125323:*:*:*:*:*:*", matchCriteriaId: "2D2629FB-0A83-43CC-8C83-444036D05F7D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125325:*:*:*:*:*:*", matchCriteriaId: "4CFD99D1-CB43-437B-8E7D-6712DA5C9835", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125327:*:*:*:*:*:*", matchCriteriaId: "6FEBA58F-E5B4-4B91-B78F-620C6EB9D3BB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125329:*:*:*:*:*:*", matchCriteriaId: "F9F9D406-FE99-45C0-B1C0-4DEB5E843FE5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125343:*:*:*:*:*:*", matchCriteriaId: "F4B86974-C598-4E1A-9FF0-5AF9638C1AD0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125345:*:*:*:*:*:*", matchCriteriaId: "C2838623-6F3F-417A-A644-FA226CCD8BB5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125358:*:*:*:*:*:*", matchCriteriaId: "454EDD2A-E79A-4D46-B841-BE5EC12C63D5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125362:*:*:*:*:*:*", matchCriteriaId: "1557A740-D19D-4220-9B3E-395EFCB86F9D", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125363:*:*:*:*:*:*", matchCriteriaId: "9C7DB404-A5C7-4EDB-BCB2-079A41E31428", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125378:*:*:*:*:*:*", matchCriteriaId: "B738952C-DE7B-4C3D-85B9-ADBEDF007AFD", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125392:*:*:*:*:*:*", matchCriteriaId: "897D140C-20FF-454D-8928-B11FFC84C016", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125399:*:*:*:*:*:*", matchCriteriaId: "18F93D7C-E8FC-4D4C-AEA0-C1187FB6D9D3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125417:*:*:*:*:*:*", matchCriteriaId: "2E799367-7DC7-478D-948A-17D717507DC0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125445:*:*:*:*:*:*", matchCriteriaId: "74A5591E-75A4-4ACA-9C34-4907D645AA88", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125459:*:*:*:*:*:*", matchCriteriaId: "0C67D5FC-5965-4AC1-80A5-931BE60B5E86", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125465:*:*:*:*:*:*", matchCriteriaId: "139E25D9-A4C8-4041-ADF7-4618DFEEE8C7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125469:*:*:*:*:*:*", matchCriteriaId: "6A65F3F7-45D3-49EB-9784-1F13FA2CBB0C", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125471:*:*:*:*:*:*", matchCriteriaId: "3795D2DE-622F-4C82-B133-0993A01AC1FB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125475:*:*:*:*:*:*", matchCriteriaId: "C0DB9896-BC25-46E3-AA6F-496A442BE525", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125482:*:*:*:*:*:*", matchCriteriaId: "CE56A949-74AC-4138-8AD3-31F5763860EF", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125483:*:*:*:*:*:*", matchCriteriaId: "4A3DB867-FD46-46EB-AEF0-2B6E79371AF6", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125485:*:*:*:*:*:*", matchCriteriaId: "7881FBB4-AC09-4EB9-B02F-3EA19237E095", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125488:*:*:*:*:*:*", matchCriteriaId: "F391E432-98B8-4D97-8AD4-FB1A84FAF774", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125490:*:*:*:*:*:*", matchCriteriaId: "61D908B2-446E-48EC-9F6B-91E8BF0F6A38", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125565:*:*:*:*:*:*", matchCriteriaId: "FD5F28B0-580E-4CD4-917A-496D35AD271A", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125568:*:*:*:*:*:*", matchCriteriaId: "F0FC96AA-F2F4-4C35-8BF7-6318A2F624A0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125583:*:*:*:*:*:*", matchCriteriaId: "6EA008F1-4E47-4753-8506-769B29AB5BA5", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125584:*:*:*:*:*:*", matchCriteriaId: "7ED68CDE-1096-4490-8E6B-78F4AC2BB729", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125598:*:*:*:*:*:*", matchCriteriaId: "34F8D9B7-3BD7-44C0-A292-162928729F36", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125606:*:*:*:*:*:*", matchCriteriaId: "ADFB3155-72F3-4DFA-BAE1-5725A40E6C8B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125612:*:*:*:*:*:*", matchCriteriaId: "7446678C-E2DB-4EA2-BC9B-430C8EC7804B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125615:*:*:*:*:*:*", matchCriteriaId: "33C57314-5503-48BD-9ED2-D76517C9C0F0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125617:*:*:*:*:*:*", matchCriteriaId: "AC201C68-2C1D-4E75-9443-C5F853A37AB0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "D6628EB7-96F6-48E3-8018-8F569972B811", versionEndExcluding: "12.7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127000:*:*:*:*:*:*", matchCriteriaId: "B64ADEEB-502D-4588-BD80-156124437AEB", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127102:*:*:*:*:*:*", matchCriteriaId: "2306C5F3-5413-4240-BAB6-E55849063A72", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127105:*:*:*:*:*:*", matchCriteriaId: "87F97A9E-2AB3-4121-B5A7-0AA25780D336", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.7:build127132:*:*:*:*:*:*", matchCriteriaId: "AD049643-9546-4D39-BD26-79661205C110", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "B8AEEB49-1C45-4B88-81C1-A1425B7E99A2", versionEndExcluding: "14.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14300:*:*:*:*:*:*", matchCriteriaId: "E73FEA45-5AA3-4C49-91D3-E07A53E34515", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14301:*:*:*:*:*:*", matchCriteriaId: "8CA65161-0C0B-45E7-BBEA-FA214DBF964B", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14302:*:*:*:*:*:*", matchCriteriaId: "9097C0CA-001B-4604-BCDB-ED28AB292CC7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:14.3:14303:*:*:*:*:*:*", matchCriteriaId: "C7F15A64-F15C-43E4-890A-7FEB0614C6DF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:*:*:*:*:*:*:*:*", matchCriteriaId: "378A2C19-6176-4E95-AB9C-B60A1F1A1E87", versionEndExcluding: "7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7000:*:*:*:*:*:*", matchCriteriaId: "1E01D48C-A95F-421E-A6FA-D299D6BE02B8", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7001:*:*:*:*:*:*", matchCriteriaId: "727BD3A4-F0E1-4656-A640-B32406324707", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7002:*:*:*:*:*:*", matchCriteriaId: "AC812003-B383-4E52-B9D3-90F4B0633C90", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7003:*:*:*:*:*:*", matchCriteriaId: "E6BE678E-EC68-478F-A4E0-73E032C88167", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_assetexplorer:7.0:7004:*:*:*:*:*:*", matchCriteriaId: "A5E373E7-9BB3-480F-A685-BAA7A9CD1BC7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:*:*:*:*:*:*:*:*", matchCriteriaId: "CE99DDEC-EA8D-4E15-A227-30B242611078", versionEndExcluding: "14.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14300:*:*:*:*:*:*", matchCriteriaId: "52843587-34AD-4992-8E68-25CD02E247A3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14301:*:*:*:*:*:*", matchCriteriaId: "BC2FC98F-84FF-4C90-BD7C-20A4910BED44", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14302:*:*:*:*:*:*", matchCriteriaId: "9794CB33-4932-4AA6-AC8C-B9FB6AE233FC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14303:*:*:*:*:*:*", matchCriteriaId: "3CC0A1C9-2F24-422A-8478-95BDCE1EBE77", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:14.3:14304:*:*:*:*:*:*", matchCriteriaId: "4E541BD1-3BB8-4807-BDF8-45B0916416D4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "5FDF15FF-2561-4139-AC5E-4812584B1B03", versionEndExcluding: "4.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*", matchCriteriaId: "D5DEC045-6A7E-4041-88F8-5ABC4AB51C29", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*", matchCriteriaId: "52DDE5D9-28DE-446F-A402-7BE3C33A4B35", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4302:*:*:*:*:*:*", matchCriteriaId: "F6E1E4D8-B7F0-4BDB-B5A2-55436BEC85F1", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4303:*:*:*:*:*:*", matchCriteriaId: "59675CC4-8A5C-4668-908C-0886B4B310DC", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4304:*:*:*:*:*:*", matchCriteriaId: "45084336-F1DC-4E5B-A45E-506A779985D9", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4305:*:*:*:*:*:*", matchCriteriaId: "1B2CC071-5BB3-4A25-88F2-DBC56B94D895", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4306:*:*:*:*:*:*", matchCriteriaId: "E6FDF373-4711-4B72-A14E-CEB19301C40F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4307:*:*:*:*:*:*", matchCriteriaId: "0E0F346C-0445-4D38-8583-3379962B540F", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4308:*:*:*:*:*:*", matchCriteriaId: "18B78BDC-0EAA-4781-8D62-01E47AA3BF40", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4309:*:*:*:*:*:*", matchCriteriaId: "A9EE7E99-B428-41EF-A693-7A316F695160", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:*:*:*:*:*:*:*:*", matchCriteriaId: "4707D700-23C4-4BBD-9683-4E6D59989127", versionEndExcluding: "14.3", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14300:*:*:*:*:*:*", matchCriteriaId: "39E8C9FE-3C1C-4E32-8BD4-14A88C49F587", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14301:*:*:*:*:*:*", matchCriteriaId: "13A9F940-083E-451E-A330-877D67F617BE", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14302:*:*:*:*:*:*", matchCriteriaId: "9FE925DF-55E6-4E7F-B5CD-F5ED097BBBC0", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:14.3:14303:*:*:*:*:*:*", matchCriteriaId: "0031CF5C-78FE-4CB0-97CE-087C10A77EB0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zohocorp:manageengine_pam360:*:*:*:*:*:*:*:*", matchCriteriaId: "1478BFC3-A0B2-415B-BA1C-AA09D9451C93", versionEndExcluding: "5.7", vulnerable: true, }, { criteria: "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*", matchCriteriaId: "41B34AA8-294A-48A9-8579-44EB7EE192F3", versionEndExcluding: "12.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.", }, { lang: "es", value: "Existe una vulnerabilidad de divulgación de información en varios productos ManageEngine que puede provocar la exposición de claves de cifrado. Un usuario de sistema operativo con pocos privilegios y acceso al host donde está instalado un producto ManageEngine afectado puede ver y utilizar la clave expuesta para descifrar las contraseñas de la base de datos del producto. Esto permite al usuario acceder a la base de datos del producto ManageEngine.", }, ], id: "CVE-2023-6105", lastModified: "2025-02-13T18:16:03.270", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "vulnreport@tenable.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-15T21:15:08.490", references: [ { source: "vulnreport@tenable.com", url: "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html", }, { source: "vulnreport@tenable.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.tenable.com/security/research/tra-2023-35", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.tenable.com/security/research/tra-2023-35", }, ], sourceIdentifier: "vulnreport@tenable.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "vulnreport@tenable.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }