Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-22477

Summary
Assigner-ibm
Assigner Org ID-9a959283-ebb5-44b6-b705-dcc2bbced522
Published At-14 Jul, 2022 | 16:25
Updated At-16 Sep, 2024 | 16:32
Rejected At-
Credits

IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 225605.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:ibm
Assigner Org ID:9a959283-ebb5-44b6-b705-dcc2bbced522
Published At:14 Jul, 2022 | 16:25
Updated At:16 Sep, 2024 | 16:32
Rejected At:
▼CVE Numbering Authority (CNA)

IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 225605.

Affected Products
Vendor
IBM CorporationIBM
Product
WebSphere Application Server
Versions
Affected
  • 8.5
  • 9.0
Problem Types
TypeCWE IDDescription
textN/ACross-Site Scripting
Type: text
CWE ID: N/A
Description: Cross-Site Scripting
Metrics
VersionBase scoreBase severityVector
3.06.1MEDIUM
CVSS:3.0/C:L/AV:N/S:C/PR:N/AC:L/A:N/I:L/UI:R/RL:O/RC:C/E:U
Version: 3.0
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.0/C:L/AV:N/S:C/PR:N/AC:L/A:N/I:L/UI:R/RL:O/RC:C/E:U
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.ibm.com/support/pages/node/6603417
x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/225605
vdb-entry
x_refsource_XF
Hyperlink: https://www.ibm.com/support/pages/node/6603417
Resource:
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/225605
Resource:
vdb-entry
x_refsource_XF
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.ibm.com/support/pages/node/6603417
x_refsource_CONFIRM
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/225605
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: https://www.ibm.com/support/pages/node/6603417
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/225605
Resource:
vdb-entry
x_refsource_XF
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@us.ibm.com
Published At:14 Jul, 2022 | 17:15
Updated At:20 Jul, 2022 | 10:38

IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 225605.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Secondary3.06.1MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 3.0
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CPE Matches

IBM Corporation
ibm
>>websphere_application_server>>8.5
cpe:2.3:a:ibm:websphere_application_server:8.5:*:*:*:*:*:*:*
IBM Corporation
ibm
>>websphere_application_server>>9.0
cpe:2.3:a:ibm:websphere_application_server:9.0:*:*:*:*:*:*:*
HP Inc.
hp
>>hp-ux>>-
cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*
IBM Corporation
ibm
>>aix>>-
cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*
IBM Corporation
ibm
>>i>>-
cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*
IBM Corporation
ibm
>>z\/os>>-
cpe:2.3:o:ibm:z\/os:-:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>-
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows>>-
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>solaris>>-
cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE ID: CWE-79
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/225605psirt@us.ibm.com
VDB Entry
Vendor Advisory
https://www.ibm.com/support/pages/node/6603417psirt@us.ibm.com
Patch
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/225605
Source: psirt@us.ibm.com
Resource:
VDB Entry
Vendor Advisory
Hyperlink: https://www.ibm.com/support/pages/node/6603417
Source: psirt@us.ibm.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

14428Records found

CVE-2023-5113
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 60.03%
||
7 Day CHG~0.00%
Published-04 Oct, 2023 | 14:20
Updated-19 Sep, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certain HP Enterprise LaserJet, LaserJet Managed printers - Potential denial of service, potential Cross Site Scripting (XSS)

Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI.

Action-Not Available
Vendor-HP Inc.
Product-color_laserjet_managed_mfp_e78625_5qj90alaserjet_managed_e60155_3gy10acolor_laserjet_managed_mfp_e87640_x3a92alaserjet_managed_flow_mfp_e82540_x3a82acolor_laserjet_managed_flow_mfp_e87660_z8z16acolor_laserjet_enterprise_m751_t3u44alaserjet_managed_mfp_e73140_6bs57alaserjet_managed_mfp_e62665_3gy15acolor_laserjet_managed_mfp_e78223-e78228_8gs14acolor_laserjet_managed_flow_e87750_5qk20acolor_laserjet_managed_flow_mfp_e77822_z8z0alaserjet_managed_mfp_e62555_j8j74acolor_laserjet_managed_flow_mfp_e87650_x3a89acolor_laserjet_managed_flow_mfp_e78630_3sj12alaserjet_managed_e60075_m0p33acolor_laserjet_managed_mfp_e87650_z8z12acolor_laserjet_managed_mfp_e78330_8gs28acolor_laserjet_enterprise_m653_j8a06alaserjet_managed_mfp_e826dn_5qk13acolor_laserjet_managed_flow_mfp_e77830_x3a78acolor_laserjet_managed_e55040dw_3gx98acolor_laserjet_managed_mfp_e87740_3sj38acolor_laserjet_managed_flow_mfp_e77825_x3a83alaserjet_managed_flow_mfp_e72525_x3a62acolor_laserjet_enterprise_flow_mfp_m577_b5l54alaserjet_managed_mfp_e42540_3pz75acolor_laserjet_managed_mfp_e77825_z8z04acolor_laserjet_managed_flow_mfp_e87660_x3a87acolor_laserjet_managed_mfp_e78625_3sj32apagewide_managed_color_mfp_p77940_5zp00acolor_laserjet_enterprise_flow_mfp_m577_b5l47alaserjet_managed_flow_mfp_e82540_z8z23alaserjet_enterprise_m506_f2a70apagewide_managed_color_flow_mfp_e77650z_j7z13alaserjet_managed_mfp_e72525_z8z08acolor_laserjet_enterprise_6700_4y280alaserjet_managed_flow_mfp_e826z_5qk09alaserjet_managed_mfp_e62555_j8j67alaserjet_managed_flow_mfp_e62565_j8j80acolor_laserjet_managed_flow_e87760_3sj20alaserjet_enterprise_flow_mfp_m631_j8j63acolor_laserjet_managed_mfp_e78625_3sj12alaserjet_managed_mfp_e72530_z8z08acolor_laserjet_managed_mfp_e77825_x3a78alaserjet_managed_mfp_e82540_z8z19laserjet_managed_mfp_e82550_x3a68acolor_laserjet_managed_mfp_e78223-e78228_8gs50acolor_laserjet_managed_mfp_e87750_3sj36acolor_laserjet_managed_mfp_e87650_z8z17apagewide_managed_color_flow_mfp_e77660z_j7z07acolor_laserjet_managed_flow_e87750_5qk03acolor_laserjet_managed_flow_mfp_e57540_3gy26acolor_laserjet_managed_flow_e87740_3sj36acolor_laserjet_managed_mfp_e67550_l3u67alaserjet_managed_flow_mfp_e73135_5qj98apagewide_managed_color_mfp_p77960_5zp00acolor_laserjet_managed_mfp_e87770_5qk20apagewide_managed_color_mfp_p77940_y3z68acolor_laserjet_enterprise_mfp_m578_7zu85alaserjet_enterprise_mfp_m632_j8j72acolor_laserjet_managed_flow_mfp_e77830_x3a84alaserjet_enterprise_flow_mfp_m636_7pt00acolor_laserjet_managed_mfp_e87760_3sj37alaserjet_managed_flow_mfp_e82550_z8z23alaserjet_managed_flow_mfp_e72535_z8z06alaserjet_managed_mfp_e72530_x3a60alaserjet_enterprise_mfp_m631_j8j65alaserjet_enterprise_m612_7ps87alaserjet_managed_mfp_e82540du_5cm58acolor_laserjet_managed_mfp_e67560_l3u70alaserjet_managed_mfp_e826dn_3sj29acolor_laserjet_enterprise_mfp_m681_j8a10apagewide_managed_color_mfp_p77950_5zp01acolor_laserjet_managed_mfp_e77822_z8z00alaserjet_managed_flow_mfp_e82540_x3a72alaserjet_enterprise_m611_7ps83apagewide_enterprise_color_flow_mfp_780f_j7z09acolor_laserjet_managed_mfp_e87640du-e87660du_5rc88alaserjet_managed_mfp_e82560_az8z20apagewide_managed_color_flow_mfp_e77660z_j7z08apagewide_managed_color_mfp_p77950_y3z66acolor_laserjet_managed_mfp_e78330_8gs29alaserjet_managed_flow_mfp_e82560_x3a79acolor_laserjet_managed_flow_mfp_e77830_z8z04acolor_laserjet_managed_mfp_e78323_8gs29apagewide_managed_color_mfp_p77960_y3z68acolor_laserjet_managed_mfp_e877_3sj22acolor_laserjet_managed_flow_mfp_e77830_z8z02acolor_laserjet_managed_flow_e87770_3sj21acolor_laserjet_enterprise_m555_7zu78acolor_laserjet_managed_mfp_e87640du-e87660du_5fm80alaserjet_managed_flow_mfp_e62575_j8j74acolor_laserjet_enterprise_mfp_m776_t3u56alaserjet_managed_flow_mfp_e62675_3gy15alaserjet_managed_mfp_e82560_x3a74alaserjet_managed_mfp_e62565_j8j74alaserjet_enterprise_m506_f2a71apagewide_color_mfp_779_4pz46alaserjet_managed_mfp_e72535_z8z08acolor_laserjet_enterprise_mfp_m577_b5l48alaserjet_managed_mfp_e82560_x3a79alaserjet_managed_flow_mfp_e62575_j8j67apagewide_managed_color_mfp_e77650_j7z07acolor_laserjet_managed_flow_e87750_3sj20apagewide_managed_color_mfp_p77950_y3z61acolor_laserjet_enterprise_m554_7zu81alaserjet_managed_flow_mfp_e62675_3gy18acolor_laserjet_managed_flow_e87740_3sj22acolor_laserjet_enterprise_mfp_6800_4y279acolor_laserjet_managed_mfp_e78330_8gr94acolor_laserjet_managed_mfp_e77422-e77428_5rc91alaserjet_managed_flow_mfp_e62575_j8j66acolor_laserjet_managed_mfp_e87660_x3a87acolor_laserjet_enterprise_flow_mfp_5800_6qn29alaserjet_managed_mfp_e82540du_5rc85acolor_laserjet_managed_mfp_e77422-e77428_5cm77acolor_laserjet_managed_mfp_e78323_8gs25acolor_laserjet_managed_mfp_e78625_3sj33alaserjet_managed_e82650_3sj08acolor_laserjet_managed_mfp_e57540_3gy26alaserjet_managed_e82660_5qk13acolor_laserjet_managed_mfp_e78323_9rt92alaserjet_managed_flow_mfp_e82560_x3a82acolor_laserjet_managed_mfp_e87650_x3a90alaserjet_managed_flow_mfp_e82550_x3a71acolor_laserjet_managed_flow_mfp_e78635_3sj12alaserjet_managed_mfp_e82540_x3a82alaserjet_managed_mfp_e73135_3sj02acolor_laserjet_managed_mfp_e87660_x3a90alaserjet_enterprise_mfp_m634_7ps95alaserjet_managed_mfp_e73030_3sj03acolor_laserjet_managed_mfp_e78523_5qj83alaserjet_enterprise_m507_1pv87acolor_laserjet_managed_mfp_e87650_x3a93acolor_laserjet_enterprise_flow_mfp_x57945_49k97avlaserjet_managed_mfp_e72535_x3a60apagewide_managed_color_mfp_p77960_2gp25alaserjet_managed_flow_mfp_e731_6bs58acolor_laserjet_managed_flow_mfp_e77825_x3a78acolor_laserjet_managed_mfp_e87650_z8z16alaserjet_enterprise_mfp_m528_1pv49acolor_laserjet_enterprise_flow_mfp_6800_6qn35alaserjet_managed_mfp_e82550du_5cm61acolor_laserjet_managed_mfp_e78625_3sj13alaserjet_managed_flow_e82650_3sj28acolor_laserjet_managed_flow_mfp_e77830_x3a83acolor_laserjet_managed_flow_mfp_e78635_5qk18alaserjet_enterprise_flow_mfp_m632_j8j72alaserjet_managed_mfp_e82540_x3a72alaserjet_managed_e82670_3sj29acolor_laserjet_managed_e65050_l3u55alaserjet_managed_mfp_e82560_x3a68alaserjet_enterprise_m611_7ps84acolor_laserjet_managed_flow_mfp_e67560_l3u66acolor_laserjet_managed_mfp_e78635_3sj13alaserjet_managed_e60075_m0p39apagewide_managed_color_flow_mfp_e77660z_z5g77alaserjet_managed_e60155_3gy12acolor_laserjet_managed_mfp_e78523_5qj81apagewide_managed_color_mfp_p77950_2gp22acolor_laserjet_managed_e65160_3gy04acolor_laserjet_managed_mfp_e87740_3sj35alaserjet_managed_flow_mfp_e72530_z8z010alaserjet_managed_mfp_e62665_3gy17alaserjet_managed_flow_mfp_e73135_3sj00alaserjet_managed_mfp_e73130_3sj01acolor_laserjet_managed_flow_mfp_e78625_3sj11alaserjet_managed_e60155_3gy09alaserjet_enterprise_mfp_m636_7pt01alaserjet_managed_mfp_e730_3sj03alaserjet_managed_flow_mfp_e73135_6bs59acolor_laserjet_managed_flow_mfp_e78625_5qj94acolor_laserjet_managed_flow_mfp_e786_5qj94acolor_laserjet_managed_mfp_e77422-e77428_5rc92alaserjet_managed_flow_mfp_e72530_z8z011alaserjet_managed_e60055_m0p40acolor_laserjet_managed_flow_e87770_3sj36acolor_laserjet_enterprise_flow_mfp_m681_j8a10acolor_laserjet_managed_flow_e87770_3sj20alaserjet_managed_flow_e82670_3sj28apagewide_enterprise_color_flow_mfp_780f_j7z10alaserjet_enterprise_flow_mfp_m635_7ps97alaserjet_managed_mfp_e82560_z8z23alaserjet_managed_flow_mfp_e82560_z8z23acolor_laserjet_managed_mfp_e877_3sj20alaserjet_managed_flow_mfp_e72535_x3a60acolor_laserjet_managed_mfp_e67650_3gy32alaserjet_managed_flow_mfp_e72525_x3a59alaserjet_managed_mfp_e72525_z8z010acolor_laserjet_managed_mfp_e87750_3sj38acolor_laserjet_enterprise_mfp_5800_49k96avlaserjet_managed_flow_mfp_e82550_az8z20acolor_laserjet_managed_mfp_e78330_8gs00acolor_laserjet_managed_mfp_e87640du-e87660du_5cm66acolor_laserjet_managed_mfp_e87640_z8z12alaserjet_managed_mfp_e73135_3sj00apagewide_managed_color_flow_mfp_e77650z_z5g77apagewide_managed_color_mfp_p77960_5zn98alaserjet_managed_e50145_1pu51alaserjet_managed_mfp_e72425_5cm72alaserjet_managed_flow_mfp_e82560_x3a69alaserjet_enterprise_flow_mfp_m527z_f2a78acolor_laserjet_managed_flow_e87770_5qk20alaserjet_managed_flow_mfp_e82540_x3a74acolor_laserjet_managed_m553_bl27alaserjet_enterprise_flow_mfp_m631_j8j64acolor_laserjet_managed_flow_mfp_e87640_z8z16acolor_laserjet_managed_flow_mfp_e77830_z8z00acolor_laserjet_managed_flow_mfp_e87650_x3a93acolor_laserjet_managed_flow_mfp_e87650_z8z16acolor_laserjet_managed_mfp_e78323_8gr94acolor_laserjet_managed_mfp_e77830_x3a83acolor_laserjet_managed_flow_mfp_e77822_z8z02acolor_laserjet_managed_mfp_e877_3sj19acolor_laserjet_managed_flow_mfp_e786_3sj13acolor_laserjet_managed_flow_mfp_e78635_3sj11alaserjet_managed_mfp_e72525_x3a59alaserjet_managed_flow_mfp_e826z_3sj08alaserjet_managed_mfp_e826dn_3sj07acolor_laserjet_enterprise_mfp_x57945_6qp99alaserjet_managed_e60065_m0p36alaserjet_enterprise_mfp_m527_f2a76alaserjet_managed_mfp_e82540du_5fm78alaserjet_managed_flow_mfp_e72535_x3a63alaserjet_managed_flow_mfp_e82550_x3a82alaserjet_managed_mfp_e72530_x3a59acolor_laserjet_managed_mfp_e77830_z8z05apagewide_managed_color_flow_mfp_e77650z_z5g79alaserjet_managed_mfp_e82550du_5fm78alaserjet_managed_flow_mfp_e73140_3sj02alaserjet_enterprise_m610_7ps82alaserjet_managed_mfp_m527_f2a80acolor_laserjet_managed_flow_mfp_e87650_z8z13alaserjet_managed_mfp_e62655_3gy17apagewide_managed_color_e55650_l3u44acolor_laserjet_enterprise_flow_mfp_m578_7zu85alaserjet_managed_mfp_e73130_6bs59alaserjet_managed_mfp_e72525_x3a65acolor_laserjet_managed_mfp_e77422-e77428_5cm76acolor_laserjet_enterprise_mfp_m578_7zu86apagewide_managed_color_mfp_p77940_2gp23acolor_laserjet_managed_flow_e87760_3sj36acolor_laserjet_managed_e65060_l3u57acolor_laserjet_managed_mfp_e77822_z8z04acolor_laserjet_managed_flow_e87760_5qk03acolor_laserjet_managed_flow_mfp_e67560_l3u67alaserjet_managed_flow_mfp_e73130_5qj98alaserjet_managed_flow_mfp_e731_5qj98acolor_laserjet_enterprise_x55745_49k99acolor_laserjet_managed_flow_e87750_3sj22acolor_laserjet_managed_flow_mfp_e78625_5qk18acolor_laserjet_managed_flow_mfp_e77830_x3a81alaserjet_managed_flow_mfp_e62675_3gy16acolor_laserjet_enterprise_flow_mfp_m577_b5l48alaserjet_managed_flow_mfp_e73140_3sj00acolor_laserjet_managed_mfp_e785dn_5qj81alaserjet_enterprise_flow_mfp_m527z_f2a77alaserjet_managed_flow_e82650_3sj09alaserjet_managed_flow_e82670_3sj07alaserjet_managed_mfp_e72535_z8z011acolor_laserjet_enterprise_flow_mfp_m578_7zu88alaserjet_managed_flow_mfp_e72525_x3a60acolor_laserjet_managed_mfp_e87750_3sj19alaserjet_managed_e82650_5qk13alaserjet_managed_mfp_e82540du_5fm77acolor_laserjet_managed_mfp_e78635_5qj94alaserjet_managed_mfp_e72535_z8z06alaserjet_managed_flow_mfp_e72525_x3a65alaserjet_managed_flow_mfp_e82550_x3a79acolor_laserjet_managed_mfp_e877_3sj37acolor_laserjet_managed_flow_mfp_e78625_3sj13acolor_laserjet_managed_mfp_e78323_8gs28alaserjet_enterprise_flow_mfp_m635_7ps99alaserjet_managed_mfp_e72535_x3a62acolor_laserjet_managed_mfp_m577_b5l50alaserjet_managed_mfp_e82550_x3a69alaserjet_managed_mfp_e82560_x3a71alaserjet_managed_mfp_e72425_5cm70acolor_laserjet_managed_flow_e87760_5qk08acolor_laserjet_enterprise_flow_mfp_m578_7zu86alaserjet_enterprise_mfp_m631_j8j64alaserjet_managed_mfp_e73030_5qj87acolor_laserjet_enterprise_mfp_5800_6qn31acolor_laserjet_managed_mfp_e786_3sj13acolor_laserjet_managed_m553_b5l39acolor_laserjet_managed_mfp_e87640_z8z14alaserjet_managed_flow_mfp_e72525_x3a63alaserjet_managed_mfp_e82560du_5fm78acolor_laserjet_managed_flow_mfp_e67560_l3u69acolor_laserjet_managed_flow_mfp_e78625_5qj90apagewide_managed_color_mfp_e77650_z5g77alaserjet_managed_mfp_e72525_x3a63alaserjet_enterprise_m608_k0q18alaserjet_managed_mfp_e62665_3gy16acolor_laserjet_managed_flow_mfp_e77822_x3a81acolor_laserjet_managed_mfp_e78323_8pe97acolor_laserjet_managed_mfp_e78630_5qj90acolor_laserjet_managed_mfp_e77822_x3a81apagewide_managed_color_mfp_e77650_z5g79acolor_laserjet_managed_mfp_e87640_z8z16alaserjet_managed_flow_mfp_e62555_j8j79apagewide_managed_color_mfp_p77960_y3z64alaserjet_managed_mfp_e72535_x3a59acolor_laserjet_managed_mfp_e77825_x3a80alaserjet_managed_mfp_e72530_x3a63alaserjet_managed_flow_mfp_e82560_z8z22alaserjet_managed_flow_mfp_e826z_3sj29alaserjet_managed_mfp_e73140_3sj00acolor_laserjet_managed_mfp_e77830_x3a81acolor_laserjet_managed_flow_mfp_e77830_z8z0acolor_laserjet_managed_flow_e87770_5qk03alaserjet_managed_mfp_e73135_6bs58acolor_laserjet_managed_flow_e87760_3sj38alaserjet_enterprise_m607_k0q15acolor_laserjet_managed_flow_mfp_e87640_x3a93acolor_laserjet_managed_mfp_e77422-e77428_5cm79alaserjet_managed_mfp_e62555_j8j79alaserjet_managed_flow_mfp_e62565_j8j66alaserjet_enterprise_m607_k0q14apagewide_enterprise_color_mfp_780_j7z10acolor_laserjet_managed_mfp_e87650_x3a92alaserjet_managed_mfp_e72530_z8z010alaserjet_managed_e82670_3sj28alaserjet_managed_e60075_m0p40acolor_laserjet_enterprise_flow_mfp_6800_4y279alaserjet_enterprise_mfp_m633_j8j76alaserjet_managed_mfp_e82560du_5rc84acolor_laserjet_managed_mfp_e87750_3sj21alaserjet_managed_flow_mfp_e62555_j8j67alaserjet_managed_m506_f2a71acolor_laserjet_managed_flow_mfp_e87650_x3a87apagewide_enterprise_color_mfp_586_g1w39apagewide_managed_color_mfp_p77940_5zn99alaserjet_enterprise_flow_mfp_m634_7ps96acolor_laserjet_managed_mfp_e78528_5qj81alaserjet_managed_mfp_e72430_5cm68acolor_laserjet_managed_mfp_e87770_3sj21acolor_laserjet_enterprise_6701_4y280acolor_laserjet_managed_mfp_e78323_9rt91acolor_laserjet_managed_mfp_e78330_8gs27alaserjet_enterprise_mfp_m527_f2a81alaserjet_managed_mfp_e731_3sj02alaserjet_enterprise_m506_f2a68alaserjet_managed_e60075_m0p35alaserjet_enterprise_m608_m0p32acolor_laserjet_managed_mfp_e87660_x3a93acolor_laserjet_managed_m553_b5l25apagewide_managed_color_mfp_p77950_5zn98acolor_laserjet_managed_mfp_e78323_8pe95acolor_laserjet_enterprise_flow_mfp_m681_j8a12alaserjet_managed_mfp_e72525_x3a60alaserjet_managed_mfp_e731_3sj01acolor_laserjet_managed_mfp_e786_5qj90acolor_laserjet_managed_flow_mfp_e67550_l3u67apagewide_enterprise_color_556_g1w46acolor_laserjet_enterprise_flow_mfp_x57945_6qp99acolor_laserjet_managed_flow_e87760_3sj37acolor_laserjet_enterprise_mfp_5800_6qn29acolor_laserjet_managed_flow_e87740_3sj35acolor_laserjet_managed_mfp_e78330_8pe97alaserjet_managed_mfp_e72535_z8z07alaserjet_enterprise_flow_mfp_m631_j8j65acolor_laserjet_managed_mfp_e78323_8gr98acolor_laserjet_managed_mfp_e78625_3sj34acolor_laserjet_managed_mfp_e877_3sj21alaserjet_managed_e50045_3gn19acolor_laserjet_managed_mfp_e78323_8gs00acolor_laserjet_managed_flow_mfp_e786_3sj32acolor_laserjet_managed_mfp_e78330_8gr98acolor_laserjet_managed_mfp_e87770_3sj36acolor_laserjet_managed_flow_e87750_3sj36acolor_laserjet_managed_mfp_e78323_8pe96acolor_laserjet_managed_mfp_e78330_8gs30acolor_laserjet_managed_mfp_e78635_5qk18alaserjet_managed_mfp_e73135_3sj01alaserjet_managed_mfp_e82540_x3a69acolor_laserjet_managed_flow_mfp_e87660_z8z15acolor_laserjet_managed_mfp_e67550_l3u70acolor_laserjet_managed_flow_mfp_e786_3sj11alaserjet_managed_flow_mfp_e82540_z8z22alaserjet_managed_mfp_e72425_5cm71alaserjet_managed_flow_mfp_e82560_z8z18apagewide_managed_color_mfp_p77950_5zp00acolor_laserjet_managed_mfp_e87650_x3a89alaserjet_enterprise_mfp_m631_j8j63acolor_laserjet_managed_flow_mfp_e87650_z8z17acolor_laserjet_managed_flow_mfp_e87660_x3a93alaserjet_managed_flow_mfp_e72530_x3a63apagewide_managed_color_mfp_p77960_y3z63alaserjet_managed_mfp_e62655_3gy16acolor_laserjet_managed_flow_mfp_e78625_3sj12alaserjet_managed_e82660_3sj29alaserjet_enterprise_mfp_m632_j8j70acolor_laserjet_managed_mfp_e78330_8pe94acolor_laserjet_enterprise_mfp_m681_j8a13acolor_laserjet_managed_flow_mfp_e87640_x3a89alaserjet_managed_e82670_3sj08alaserjet_managed_mfp_e73140_5qj98acolor_laserjet_managed_flow_mfp_e87650_z8z14acolor_laserjet_managed_flow_mfp_e87660_z8z17acolor_laserjet_managed_mfp_e87640_x3a89alaserjet_managed_flow_mfp_e73135_3sj01alaserjet_managed_flow_mfp_e82560_x3a71alaserjet_managed_flow_e82670_5qk13apagewide_managed_color_flow_mfp_e77660z_j7z05acolor_laserjet_managed_mfp_e78323_8pe94alaserjet_managed_flow_e82660_3sj09acolor_laserjet_managed_flow_e87740_3sj38acolor_laserjet_enterprise_m856_t3u51acolor_laserjet_managed_mfp_e77822_x3a83acolor_laserjet_enterprise_flow_mfp_m776_t3u56alaserjet_managed_flow_mfp_e82540_z8z19color_laserjet_enterprise_mfp_m577_b5l46alaserjet_managed_e60065_m0p40acolor_laserjet_managed_mfp_e87740_3sj22alaserjet_managed_mfp_e73135_5qj98alaserjet_managed_mfp_e82540_z8z23apagewide_color_mfp_774_4pa44acolor_laserjet_managed_flow_mfp_e78635_3sj32alaserjet_managed_flow_mfp_e62675_3gy17alaserjet_managed_mfp_e82550du_5cm58acolor_laserjet_managed_flow_mfp_e67550_l3u66acolor_laserjet_managed_flow_mfp_e78635_3sj13acolor_laserjet_enterprise_mfp_6800_6qn38acolor_laserjet_managed_mfp_e78223-e78228_8gs37alaserjet_managed_e60055_m0p35alaserjet_managed_mfp_e72430_5rc90alaserjet_managed_flow_mfp_e731_6bs59acolor_laserjet_enterprise_m653_j8a05alaserjet_managed_flow_e82670_3sj09alaserjet_managed_mfp_e62565_j8j67acolor_laserjet_managed_mfp_e77825_z8z00alaserjet_managed_e82650_3sj30alaserjet_managed_mfp_e82550_x3a75acolor_laserjet_managed_mfp_e77825_z8z01apagewide_color_mfp_774_4pz43acolor_laserjet_enterprise_m553_b5l25alaserjet_managed_mfp_e82550_z8z22acolor_laserjet_managed_flow_mfp_e77822_x3a84acolor_laserjet_managed_mfp_e77422-e77428_5cm75alaserjet_enterprise_m609_k0q21alaserjet_managed_mfp_e72525_z8z09acolor_laserjet_managed_mfp_e78330_8gr99acolor_laserjet_managed_mfp_e78330_8gs25alaserjet_managed_mfp_e82550du_5rc84acolor_laserjet_managed_mfp_e786_3sj32alaserjet_enterprise_m608_k0q19acolor_laserjet_enterprise_flow_mfp_5800_6qn31acolor_laserjet_managed_flow_mfp_e87640_z8z17alaserjet_managed_mfp_e82560du_5rc85acolor_laserjet_enterprise_mfp_m682_j8a17acolor_laserjet_managed_mfp_e78523_5qk15alaserjet_managed_flow_mfp_e62565_j8j73acolor_laserjet_enterprise_flow_mfp_m578_7zu87acolor_laserjet_enterprise_flow_mfp_m682_j8a16alaserjet_enterprise_flow_mfp_m634_7ps95apagewide_enterprise_color_765_j7z04alaserjet_managed_mfp_e72525_z8z06alaserjet_managed_flow_mfp_e62565_j8j67acolor_laserjet_managed_mfp_e87750_5qk20alaserjet_managed_e60165_3gy12alaserjet_managed_flow_mfp_e82550_x3a68alaserjet_managed_mfp_e82540du_5cm61alaserjet_enterprise_flow_mfp_m527z_f2a76alaserjet_managed_flow_mfp_e73130_3sj00apagewide_managed_color_mfp_e77650_j7z05alaserjet_managed_mfp_e82550du_5rc85alaserjet_managed_flow_mfp_e82540_x3a75acolor_laserjet_managed_mfp_e78323_8gr97acolor_laserjet_managed_mfp_e78630_3sj13alaserjet_managed_mfp_e72530_x3a62apagewide_managed_color_mfp_e58650dn_l3u42acolor_laserjet_managed_flow_mfp_e77830_z8z01apagewide_enterprise_color_flow_mfp_785_j7z11alaserjet_managed_flow_mfp_e72530_x3a60acolor_laserjet_managed_e65050_l3u56acolor_laserjet_managed_flow_e87760_3sj22acolor_laserjet_managed_mfp_e87660_z8z17alaserjet_managed_mfp_e73135_6bs57apagewide_managed_color_mfp_p77950_2gp25alaserjet_managed_flow_mfp_e72535_z8z010apagewide_managed_color_mfp_p77940_y3z62acolor_laserjet_managed_mfp_e785dn_5qk15acolor_laserjet_managed_flow_mfp_e87640_z8z13acolor_laserjet_managed_flow_mfp_e77825_x3a80acolor_laserjet_managed_mfp_e78630_5qj94acolor_laserjet_enterprise_m455_3pz95alaserjet_managed_mfp_e82540_x3a68alaserjet_managed_mfp_e72430_5cm69acolor_laserjet_managed_mfp_e78223-e78228_8gs13acolor_laserjet_managed_flow_mfp_e77825_z8z04acolor_laserjet_managed_flow_mfp_m577_b5l50alaserjet_enterprise_m406_3pz15alaserjet_managed_mfp_e73130_3sj02acolor_laserjet_managed_flow_mfp_e87660_x3a89acolor_laserjet_managed_flow_mfp_e78630_5qj94alaserjet_managed_mfp_e82540_x3a75alaserjet_managed_e60055_m0p36acolor_laserjet_enterprise_m856_t3u52acolor_laserjet_enterprise_flow_mfp_m681_j8a13apagewide_managed_color_mfp_p77940_5zp01acolor_laserjet_enterprise_mfp_m577_b5l47acolor_laserjet_managed_mfp_e87660_z8z15acolor_laserjet_managed_flow_mfp_e78625_3sj33acolor_laserjet_managed_flow_mfp_e78635_3sj33alaserjet_managed_e60175_3gy10alaserjet_managed_mfp_e73025_5qj87acolor_laserjet_managed_mfp_e786_3sj11acolor_laserjet_managed_flow_mfp_m577_b5l49acolor_laserjet_managed_mfp_e78330_8gs26acolor_laserjet_enterprise_mfp_5800_58r10alaserjet_managed_mfp_e73025_3sj04alaserjet_managed_mfp_e72430_5cm70alaserjet_managed_mfp_e72535_z8z09alaserjet_managed_mfp_e730_3sj04acolor_laserjet_managed_mfp_e78635_3sj12acolor_laserjet_managed_mfp_e67560_l3u69alaserjet_managed_flow_mfp_e73140_5qk02alaserjet_managed_mfp_e82540du_5rc83apagewide_managed_color_mfp_p77940_2gp22acolor_laserjet_managed_mfp_e78635_3sj34alaserjet_managed_flow_mfp_e826z_3sj28alaserjet_managed_e82650_3sj07alaserjet_managed_flow_mfp_e72535_x3a66acolor_laserjet_managed_mfp_e77822_z8z05acolor_laserjet_managed_mfp_e87760_5qk08alaserjet_managed_mfp_e73140_6bs58acolor_laserjet_managed_flow_e87750_3sj19acolor_laserjet_managed_mfp_e87640du-e87660du_5cm65alaserjet_enterprise_m610_7ps81alaserjet_managed_mfp_e72425_5rc89acolor_laserjet_managed_mfp_e77830_x3a84acolor_laserjet_managed_mfp_e877_5qk20acolor_laserjet_managed_mfp_e87760_3sj36acolor_laserjet_managed_mfp_e78630_3sj12acolor_laserjet_managed_mfp_e87660_x3a86apagewide_managed_color_flow_mfp_e77660z_j7z03alaserjet_managed_flow_mfp_e82550_x3a75alaserjet_managed_mfp_e82560du_5cm58acolor_laserjet_managed_mfp_e77822_z8z01acolor_laserjet_enterprise_m653_j8a04alaserjet_enterprise_mfp_m636_7pt00alaserjet_managed_flow_mfp_e72530_z8z09acolor_laserjet_enterprise_flow_mfp_m776_t3u55acolor_laserjet_managed_flow_mfp_e77825_z8z02acolor_laserjet_managed_mfp_e78330_8pe96alaserjet_managed_m506_f2a66acolor_laserjet_managed_mfp_e77825_x3a84acolor_laserjet_managed_mfp_e87640_z8z17alaserjet_managed_mfp_e73140_3sj02alaserjet_managed_mfp_e52645_1ps54alaserjet_managed_e82670_5qk09acolor_laserjet_managed_mfp_e78630_3sj34alaserjet_managed_e82660_3sj07alaserjet_managed_mfp_e72535_x3a66alaserjet_managed_mfp_e82560_x3a82alaserjet_managed_m506_f2a68acolor_laserjet_managed_mfp_e77422-e77428_5cm78acolor_laserjet_managed_mfp_e67550_l3u66acolor_laserjet_enterprise_mfp_m681_j8a11acolor_laserjet_managed_mfp_e786_3sj34acolor_laserjet_managed_mfp_e78323_8gs01alaserjet_managed_e82670_3sj07acolor_laserjet_managed_flow_e87750_5qk08acolor_laserjet_managed_mfp_e77822_x3a77acolor_laserjet_managed_mfp_e67650_3gy31alaserjet_managed_flow_e82650_3sj29alaserjet_managed_mfp_e72530_z8z09apagewide_managed_color_mfp_p77960_2gp22apagewide_managed_color_flow_mfp_e77650z_j7z05acolor_laserjet_managed_mfp_e87660_z8z16acolor_laserjet_enterprise_6700_49l00alaserjet_managed_mfp_e82540_z8z22apagewide_managed_color_mfp_p77960_y3z66apagewide_managed_color_mfp_e77650_j7z03alaserjet_managed_mfp_e731_6bs58alaserjet_managed_flow_mfp_e72525_z8z08acolor_laserjet_managed_flow_mfp_e67550_l3u69alaserjet_managed_flow_mfp_e82560_x3a74acolor_laserjet_managed_mfp_e77822_x3a84apagewide_managed_color_flow_mfp_e77660z_j7z14acolor_laserjet_managed_flow_e87740_3sj19alaserjet_managed_mfp_e731_6bs57alaserjet_enterprise_m609_k0q22alaserjet_managed_e60175_3gy09acolor_laserjet_managed_mfp_e78323_8gs30acolor_laserjet_managed_mfp_e57540_3gy25acolor_laserjet_managed_mfp_e67660_3gy31acolor_laserjet_managed_mfp_e77830_z8z01alaserjet_managed_flow_mfp_e62565_j8j79alaserjet_enterprise_m506_f2a66acolor_laserjet_managed_e65060_l3u56alaserjet_enterprise_m507_1pv88alaserjet_managed_mfp_e72525_x3a66acolor_laserjet_enterprise_mfp_m578_7zu88acolor_laserjet_enterprise_flow_mfp_6800_6qn37apagewide_managed_color_mfp_e77650_j7z08alaserjet_managed_flow_mfp_e62555_j8j74alaserjet_managed_mfp_e72530_x3a65alaserjet_managed_e82650_3sj09alaserjet_enterprise_mfp_m633_j8j78alaserjet_managed_mfp_e82550_az8z20alaserjet_managed_mfp_e82560du_5cm61acolor_laserjet_enterprise_5700_6qn28alaserjet_enterprise_mfp_m431_3pz56acolor_laserjet_managed_mfp_e67660_3gy32alaserjet_managed_e60055_m0p39alaserjet_enterprise_flow_mfp_m634_7ps94acolor_laserjet_managed_mfp_e78323_8gs27acolor_laserjet_managed_flow_e87760_3sj21acolor_laserjet_managed_mfp_e87760_5qk20alaserjet_managed_flow_mfp_e73130_3sj02alaserjet_managed_m506_f2a69acolor_laserjet_managed_mfp_e78635_3sj32alaserjet_managed_flow_mfp_e72535_z8z08alaserjet_managed_mfp_e82560_z8z22alaserjet_managed_mfp_e52545_3gy19acolor_laserjet_enterprise_mfp_6800_6qn36acolor_laserjet_managed_flow_mfp_e77825_z8z01acolor_laserjet_managed_flow_e87760_3sj35acolor_laserjet_managed_flow_mfp_e77825_x3a81acolor_laserjet_managed_flow_mfp_e87640_x3a90acolor_laserjet_managed_flow_mfp_e87640_z8z12alaserjet_managed_flow_mfp_e82540_x3a69acolor_laserjet_managed_flow_mfp_e78630_3sj34acolor_laserjet_managed_e65050_l3u57apagewide_managed_color_mfp_p77960_y3z62acolor_laserjet_enterprise_m553_b5l26alaserjet_managed_flow_mfp_e82540_x3a79alaserjet_managed_mfp_e72430_5rc89alaserjet_enterprise_mfp_m634_7ps94acolor_laserjet_managed_mfp_e78630_3sj33acolor_laserjet_managed_mfp_e87660_z8z14alaserjet_managed_mfp_e82560_x3a69acolor_laserjet_managed_flow_mfp_e786_5qj90apagewide_managed_color_mfp_p77950_y3z64acolor_laserjet_managed_mfp_e87740_5qk03acolor_laserjet_managed_mfp_e78625_5qk18acolor_laserjet_managed_flow_mfp_e67560_l3u70acolor_laserjet_managed_flow_mfp_e786_3sj12alaserjet_managed_flow_e82660_3sj08acolor_laserjet_managed_e75245_t3u64alaserjet_managed_flow_e82660_5qk09acolor_laserjet_enterprise_6700_6qn33alaserjet_managed_flow_mfp_e82550_z8z18acolor_laserjet_managed_flow_mfp_e87650_x3a86acolor_laserjet_managed_flow_mfp_e77830_x3a77alaserjet_enterprise_mfp_m634_7ps96alaserjet_managed_mfp_e82540du_5cm59acolor_laserjet_managed_mfp_e87760_3sj20alaserjet_managed_e82670_5qk13acolor_laserjet_managed_flow_mfp_e77825_z8z00acolor_laserjet_managed_mfp_e77825_z8z0acolor_laserjet_managed_mfp_e87650_z8z14acolor_laserjet_managed_flow_mfp_e786_5qk18alaserjet_managed_flow_mfp_m527z_f2a79acolor_laserjet_managed_mfp_e877_3sj36acolor_laserjet_enterprise_mfp_m682_j8a16alaserjet_managed_mfp_e731_5qk02acolor_laserjet_managed_flow_e87770_3sj35alaserjet_managed_flow_mfp_e62555_j8j73acolor_laserjet_managed_mfp_e78630_3sj11alaserjet_managed_e60065_m0p39alaserjet_managed_e60055_m0p33acolor_laserjet_managed_flow_mfp_e77822_z8z01alaserjet_managed_flow_mfp_e72525_x3a66alaserjet_managed_flow_mfp_e72535_z8z09acolor_laserjet_managed_flow_e87740_5qk20alaserjet_enterprise_mfp_m635_7ps99alaserjet_managed_flow_mfp_e82550_z8z22alaserjet_managed_flow_mfp_e72535_x3a65alaserjet_managed_mfp_e82540du_5rc84apagewide_managed_color_mfp_p77940_y3z63alaserjet_managed_flow_mfp_e72530_x3a62acolor_laserjet_managed_flow_mfp_e87650_z8z12alaserjet_managed_mfp_e73130_5qj98acolor_laserjet_managed_mfp_e77830_z8z02alaserjet_managed_flow_mfp_e731_3sj01acolor_laserjet_enterprise_flow_mfp_5800_6qn30alaserjet_managed_flow_mfp_e73140_6bs59alaserjet_enterprise_flow_mfp_m633_j8j76alaserjet_managed_mfp_e826dn_3sj08acolor_laserjet_managed_mfp_e87640_z8z13alaserjet_managed_flow_e82660_3sj28acolor_laserjet_managed_mfp_e78528_5qk15alaserjet_managed_e82650_3sj28acolor_laserjet_enterprise_m553_bl27acolor_laserjet_managed_mfp_e77825_x3a81apagewide_managed_color_mfp_p77950_y3z62acolor_laserjet_managed_flow_e87740_3sj37alaserjet_managed_mfp_e72525_z8z011acolor_laserjet_enterprise_flow_mfp_5800_58r10acolor_laserjet_managed_flow_mfp_e77830_x3a80apagewide_managed_color_mfp_p77960_y3z65acolor_laserjet_managed_flow_mfp_e87650_x3a92acolor_laserjet_managed_mfp_e77830_z8z00acolor_laserjet_managed_flow_mfp_e87640_x3a87acolor_laserjet_managed_mfp_e786_5qj94alaserjet_managed_flow_mfp_e82550_x3a69acolor_laserjet_managed_mfp_e78323_8gs26acolor_laserjet_managed_mfp_e87740_3sj36acolor_laserjet_managed_flow_mfp_e78635_5qj90acolor_laserjet_managed_flow_mfp_e87660_x3a86acolor_laserjet_managed_mfp_e786_3sj33acolor_laserjet_managed_mfp_e78330_8pe95acolor_laserjet_managed_mfp_e78630_5qk18apagewide_managed_color_flow_mfp_e77650z_j7z08alaserjet_enterprise_m407_3pz16apagewide_enterprise_color_flow_mfp_586z_g1w40acolor_laserjet_managed_flow_mfp_e87640_z8z14alaserjet_managed_flow_mfp_e73130_6bs59alaserjet_managed_flow_mfp_e73130_6bs57alaserjet_managed_e82670_3sj09acolor_laserjet_managed_e65150_3gy03acolor_laserjet_managed_mfp_e87760_3sj35alaserjet_managed_mfp_e82550_z8z23alaserjet_managed_mfp_e82540_z8z18acolor_laserjet_managed_mfp_e78330_9rt92acolor_laserjet_managed_flow_mfp_e77822_x3a78apagewide_managed_color_flow_mfp_e77650z_j7z14acolor_laserjet_managed_flow_e87770_3sj19apagewide_enterprise_color_556_g1w47acolor_laserjet_enterprise_mfp_m577_b5l54alaserjet_managed_flow_mfp_e72530_z8z07acolor_laserjet_enterprise_flow_mfp_m682_j8a17acolor_laserjet_managed_flow_mfp_e77825_x3a77alaserjet_managed_flow_mfp_e73140_6bs57acolor_laserjet_managed_mfp_e78223-e78228_8gs43alaserjet_managed_flow_mfp_e82560_z8z19laserjet_managed_mfp_e72525_z8z07acolor_laserjet_enterprise_6701_49l00acolor_laserjet_managed_mfp_e78223-e78228_8gs44alaserjet_managed_mfp_e73140_3sj01apagewide_color_755_4pz47apagewide_enterprise_color_mfp_780_j7z09acolor_laserjet_enterprise_flow_mfp_6800_6qn38acolor_laserjet_managed_mfp_e87740_3sj19acolor_laserjet_managed_flow_e87740_3sj21acolor_laserjet_managed_mfp_e78323_8gr96acolor_laserjet_managed_mfp_e87640du-e87660du_5fm81acolor_laserjet_managed_flow_mfp_e87640_x3a86apagewide_enterprise_color_flow_mfp_785_j7z12alaserjet_managed_mfp_e826dn_3sj30acolor_laserjet_managed_flow_e87740_5qk03apagewide_managed_color_e75160_j7z06alaserjet_managed_flow_e82670_3sj08acolor_laserjet_managed_mfp_e87740_5qk08acolor_laserjet_managed_mfp_e78330_8gr97alaserjet_managed_flow_mfp_e73135_6bs58afuturesmart_5laserjet_managed_mfp_e82540_az8z20alaserjet_managed_flow_e82660_3sj07apagewide_managed_color_mfp_p77950_y3z68acolor_laserjet_enterprise_m652_j7z99alaserjet_managed_e60065_m0p35alaserjet_managed_flow_mfp_e731_3sj02acolor_laserjet_managed_flow_e87760_5qk20apagewide_managed_color_flow_mfp_e58650z_l3u42acolor_laserjet_managed_mfp_e87640du-e87660du_5rc87alaserjet_managed_mfp_e62565_j8j79acolor_laserjet_managed_mfp_e87760_3sj19apagewide_managed_color_flow_mfp_e77660z_z5g79apagewide_managed_color_mfp_p77960_5zn99alaserjet_managed_flow_mfp_e72525_z8z010alaserjet_managed_flow_mfp_e73130_3sj01alaserjet_managed_e60165_3gy09acolor_laserjet_managed_mfp_e78223-e78228_17f27awcolor_laserjet_managed_mfp_e87770_3sj22alaserjet_managed_flow_mfp_e72525_z8z07alaserjet_managed_flow_mfp_e826z_5qk13alaserjet_managed_mfp_e82540_x3a79apagewide_managed_color_mfp_p77950_y3z65apagewide_managed_color_flow_mfp_e77650z_j7z03acolor_laserjet_managed_mfp_e785dn_5qj83acolor_laserjet_managed_mfp_e78323_8gr99acolor_laserjet_managed_mfp_e77825_x3a77acolor_laserjet_managed_mfp_e77830_x3a80alaserjet_managed_mfp_e72530_z8z06alaserjet_managed_flow_mfp_e82550_x3a72acolor_laserjet_managed_mfp_e87760_3sj38alaserjet_managed_flow_mfp_e731_6bs57alaserjet_managed_flow_mfp_e72535_z8z011alaserjet_managed_flow_mfp_e72530_z8z06alaserjet_managed_flow_e82660_5qk13apagewide_enterprise_color_556_g1w47vcolor_laserjet_managed_mfp_e87640_x3a86alaserjet_managed_mfp_e82550du_5rc83alaserjet_managed_mfp_e82560_x3a72acolor_laserjet_managed_mfp_e78330_9rt91acolor_laserjet_managed_e45028_3qa35acolor_laserjet_managed_flow_mfp_e77822_x3a80alaserjet_managed_e82660_5qk09acolor_laserjet_enterprise_mfp_6800_49k84acolor_laserjet_managed_mfp_e87640_x3a90acolor_laserjet_managed_flow_mfp_e786_3sj33apagewide_enterprise_color_flow_mfp_586z_g1w39alaserjet_managed_flow_mfp_e82560_x3a68acolor_laserjet_managed_mfp_e78528_5qj83alaserjet_managed_flow_mfp_e73140_5qj98acolor_laserjet_managed_flow_mfp_e78625_3sj34acolor_laserjet_managed_flow_mfp_e78630_3sj13acolor_laserjet_managed_flow_mfp_e78630_3sj11alaserjet_managed_e60175_3gy12apagewide_managed_color_p75250_y3z49apagewide_managed_color_mfp_p77960_y3z61alaserjet_managed_flow_e82650_3sj08apagewide_managed_color_mfp_e58650dn_l3u43alaserjet_enterprise_m608_k0q17alaserjet_enterprise_m506_f2a67acolor_laserjet_managed_flow_mfp_e78635_3sj34alaserjet_enterprise_flow_mfp_m527z_f2a81acolor_laserjet_managed_flow_mfp_e77822_z8z05alaserjet_managed_mfp_m527_f2a79acolor_laserjet_managed_mfp_e67560_l3u66acolor_laserjet_managed_mfp_e77822_x3a80alaserjet_enterprise_mfp_m528_1pv65alaserjet_managed_flow_e82670_3sj29acolor_laserjet_managed_flow_mfp_e87640_z8z15apagewide_color_mfp_779_4pz45apagewide_managed_color_mfp_p77950_y3z63acolor_laserjet_managed_mfp_e78223-e78228_8gs12alaserjet_managed_mfp_e82560_x3a75alaserjet_enterprise_m612_7ps86acolor_laserjet_managed_mfp_e47528_3qa75alaserjet_managed_mfp_e72430_5cm71alaserjet_managed_mfp_e73140_5qk02acolor_laserjet_managed_mfp_e77825_x3a83alaserjet_managed_mfp_e826dn_3sj28alaserjet_managed_mfp_e731_3sj00alaserjet_managed_mfp_e72430_5cm72acolor_laserjet_managed_mfp_e87770_5qk03acolor_laserjet_managed_mfp_e87760_5qk03alaserjet_managed_mfp_e62655_3gy14acolor_laserjet_managed_flow_mfp_e67550_l3u70acolor_laserjet_managed_flow_e87770_5qk08alaserjet_managed_mfp_e82550_x3a79alaserjet_managed_flow_mfp_e73140_3sj01alaserjet_managed_mfp_e72535_x3a63alaserjet_managed_flow_mfp_e52545c_3gy20acolor_laserjet_enterprise_mfp_6800_6qn37alaserjet_managed_flow_mfp_e62555_j8j80alaserjet_managed_flow_mfp_e72530_x3a66acolor_laserjet_managed_mfp_e78323_8gr95adigital_sender_flow_8500_fn2_l2762alaserjet_managed_mfp_e82560_z8z19scanjet_enterprise_flow_n9120_fn2_l2763alaserjet_managed_mfp_e73130_6bs58alaserjet_managed_flow_e82670_3sj30alaserjet_managed_flow_mfp_e73140_6bs58alaserjet_managed_mfp_e62655_3gy15apagewide_managed_color_mfp_p77950_2gp23apagewide_managed_color_mfp_p77940_y3z64alaserjet_managed_mfp_e82550du_5fm76apagewide_managed_color_mfp_e77650_j7z13acolor_laserjet_managed_flow_mfp_e77830_z8z05alaserjet_managed_mfp_e62555_j8j66alaserjet_managed_flow_e82650_3sj07alaserjet_managed_flow_mfp_e73130_5qk02acolor_laserjet_managed_flow_e87750_3sj37acolor_laserjet_managed_flow_mfp_e77822_z8z04apagewide_managed_color_mfp_p77940_2gp26alaserjet_enterprise_mfp_m430_3pz55acolor_laserjet_managed_mfp_e87760_3sj22alaserjet_enterprise_m609_k0q20acolor_laserjet_managed_flow_mfp_e87660_z8z14alaserjet_managed_mfp_e82560du_5rc83alaserjet_managed_mfp_e82550_x3a72acolor_laserjet_managed_flow_mfp_e87660_x3a90alaserjet_managed_mfp_e62555_j8j73alaserjet_managed_mfp_e62665_3gy14alaserjet_managed_e60165_3gy10acolor_laserjet_managed_mfp_e77822_z8z0acolor_laserjet_enterprise_mfp_m681_j8a12alaserjet_managed_e40040_3pz35apagewide_managed_color_mfp_p77940_y3z65acolor_laserjet_managed_flow_e87760_3sj19alaserjet_managed_flow_mfp_e82540_az8z20acolor_laserjet_managed_mfp_e87750_3sj22acolor_laserjet_managed_flow_mfp_e77822_x3a83alaserjet_managed_flow_mfp_e82540_x3a71alaserjet_managed_flow_mfp_e72525_z8z06acolor_laserjet_managed_mfp_e87740_3sj21alaserjet_managed_flow_mfp_e62575_j8j73acolor_laserjet_managed_flow_mfp_e78630_5qk18acolor_laserjet_managed_flow_mfp_e87650_x3a90acolor_laserjet_managed_mfp_e77822_z8z02apagewide_enterprise_color_mfp_586_g1w41alaserjet_managed_flow_e82650_3sj30alaserjet_enterprise_m506_f2a69alaserjet_managed_mfp_e82540_x3a71acolor_laserjet_managed_mfp_e87750_5qk03acolor_laserjet_managed_flow_e87770_3sj38alaserjet_managed_mfp_e82550_z8z19color_laserjet_managed_mfp_e78330_8gr96alaserjet_enterprise_flow_mfp_m633_j8j78alaserjet_managed_mfp_e826dn_3sj09acolor_laserjet_enterprise_mfp_6800_6qn35alaserjet_managed_e82660_3sj09alaserjet_managed_mfp_e73130_6bs57acolor_laserjet_managed_mfp_e67550_l3u69alaserjet_managed_mfp_e82560du_5fm76acolor_laserjet_enterprise_x55745_6qp97acolor_laserjet_enterprise_mfp_x57945_6qp98acolor_laserjet_managed_mfp_e877_5qk03alaserjet_managed_flow_mfp_e826z_3sj09alaserjet_managed_e50145_1pu52acolor_laserjet_managed_mfp_e78625_5qj94acolor_laserjet_managed_mfp_e786_3sj12alaserjet_managed_flow_mfp_e72525_z8z09acolor_laserjet_managed_mfp_e87740_3sj37acolor_laserjet_managed_mfp_e78223-e78228_8gs36alaserjet_managed_flow_mfp_e82540_z8z18alaserjet_enterprise_m612_7ps88acolor_laserjet_managed_m553_b5l24acolor_laserjet_managed_mfp_e87770_3sj19alaserjet_enterprise_m507_1pv86alaserjet_managed_mfp_e72425_5cm68acolor_laserjet_enterprise_m555_7zu81acolor_laserjet_managed_mfp_e877_3sj35acolor_laserjet_managed_mfp_e78223-e78228_8gs15acolor_laserjet_managed_mfp_e78635_5qj90acolor_laserjet_managed_mfp_m577_b5l49apagewide_managed_color_mfp_p77940_y3z66alaserjet_managed_mfp_e730_5qj87acolor_laserjet_managed_e65060_l3u55alaserjet_managed_mfp_e82550_x3a82apagewide_enterprise_color_flow_mfp_586z_g1w41acolor_laserjet_managed_mfp_e87650_x3a87apagewide_enterprise_color_556_g1w46vlaserjet_managed_flow_mfp_e82540_x3a68alaserjet_managed_m506_f2a70alaserjet_managed_mfp_e73025_3sj03acolor_laserjet_managed_mfp_e77830_x3a78acolor_laserjet_managed_flow_mfp_e87660_z8z12acolor_laserjet_managed_mfp_e87640_x3a87acolor_laserjet_enterprise_mfp_x57945_49k97avlaserjet_managed_mfp_e73030_3sj04acolor_laserjet_managed_mfp_e78330_8pe98acolor_laserjet_managed_mfp_e78625_3sj11alaserjet_managed_mfp_e73130_5qk02acolor_laserjet_managed_mfp_e78635_3sj33apagewide_managed_color_flow_mfp_e58650z_l3u43alaserjet_enterprise_m507_1pv89alaserjet_managed_flow_mfp_e62675_3gy14acolor_laserjet_managed_flow_mfp_e77825_z8z0alaserjet_managed_mfp_e82550du_5cm59alaserjet_managed_mfp_e82550du_5fm77alaserjet_managed_mfp_e82550_x3a71alaserjet_managed_flow_mfp_e731_3sj00alaserjet_managed_mfp_e72530_x3a66acolor_laserjet_managed_flow_mfp_e78625_3sj32acolor_laserjet_managed_mfp_e87660_z8z13apagewide_managed_color_mfp_p77960_2gp26acolor_laserjet_managed_flow_mfp_e77825_z8z05acolor_laserjet_managed_mfp_e87760_3sj21alaserjet_managed_mfp_e72425_5cm69alaserjet_enterprise_flow_mfp_m632_j8j71alaserjet_managed_mfp_e62555_j8j80acolor_laserjet_managed_mfp_e87640du-e87660du_5rc86acolor_laserjet_managed_e85055_t3u66acolor_laserjet_managed_mfp_e87770_3sj38alaserjet_enterprise_mfp_m632_j8j71acolor_laserjet_enterprise_m751_t3u43alaserjet_managed_flow_mfp_e826z_3sj07alaserjet_managed_flow_e82650_5qk13alaserjet_managed_flow_mfp_e826z_3sj30acolor_laserjet_managed_flow_mfp_e77822_z8z00acolor_laserjet_managed_flow_mfp_e78630_3sj32alaserjet_enterprise_mfp_m528_1pv66alaserjet_managed_flow_mfp_e52545c_3gy19alaserjet_managed_flow_mfp_e62575_j8j79alaserjet_managed_e60075_m0p36alaserjet_managed_flow_e82660_3sj29acolor_laserjet_managed_flow_e87770_3sj22apagewide_managed_color_mfp_p77440_y3z60acolor_laserjet_managed_mfp_e77825_z8z02apagewide_managed_color_mfp_p77960_2gp23acolor_laserjet_managed_flow_e87750_3sj21alaserjet_managed_mfp_e73140_6bs59acolor_laserjet_managed_e65160_3gy03alaserjet_managed_mfp_e73135_5qk02acolor_laserjet_managed_mfp_e87770_3sj37acolor_laserjet_managed_flow_mfp_e87660_x3a92acolor_laserjet_managed_mfp_e78223-e78228_19gsawlaserjet_managed_flow_mfp_e72535_x3a59alaserjet_managed_flow_mfp_e82560_x3a75acolor_laserjet_enterprise_mfp_m776_t3u55alaserjet_managed_flow_mfp_e82550_x3a74acolor_laserjet_enterprise_flow_mfp_x57945_6qp98acolor_laserjet_managed_mfp_e87640du-e87660du_5fm82acolor_laserjet_enterprise_6701_6qn33acolor_laserjet_enterprise_mfp_5800_6qn30acolor_laserjet_enterprise_flow_mfp_6800_6qn36acolor_laserjet_managed_mfp_e877_5qk08alaserjet_managed_flow_mfp_e73135_3sj02acolor_laserjet_managed_mfp_e77830_x3a77alaserjet_managed_flow_mfp_e73135_5qk02alaserjet_managed_mfp_e62565_j8j73apagewide_managed_color_mfp_p77950_2gp26acolor_laserjet_enterprise_flow_mfp_m577_b5l46alaserjet_managed_mfp_e52545_3gy20alaserjet_managed_e82660_3sj28alaserjet_managed_mfp_e731_5qj98apagewide_managed_color_mfp_p77940_y3z61alaserjet_managed_e82650_5qk09alaserjet_managed_mfp_e62565_j8j80alaserjet_managed_e82660_3sj08acolor_laserjet_managed_flow_mfp_e78635_5qj94acolor_laserjet_managed_mfp_e87750_3sj35acolor_laserjet_managed_mfp_e87750_3sj37acolor_laserjet_managed_flow_e87770_3sj37acolor_laserjet_managed_mfp_e78635_3sj11alaserjet_enterprise_mfp_m527_f2a77alaserjet_managed_flow_e82650_5qk09acolor_laserjet_managed_mfp_e87650_x3a86alaserjet_enterprise_mfp_m635_7ps97alaserjet_managed_mfp_e826dn_5qk09acolor_laserjet_managed_flow_mfp_e87650_z8z15acolor_laserjet_managed_mfp_e87750_5qk08apagewide_managed_color_mfp_p77940_5zn98acolor_laserjet_enterprise_5700_49k98alaserjet_enterprise_flow_mfp_m636_7pt01alaserjet_managed_mfp_e82560du_5fm77alaserjet_managed_flow_e82670_5qk09alaserjet_managed_flow_mfp_e72535_x3a62alaserjet_enterprise_m611_7ps85acolor_laserjet_enterprise_6701_58m42alaserjet_enterprise_mfp_m527_f2a78acolor_laserjet_managed_mfp_e78323_8pe98alaserjet_managed_flow_mfp_e731_5qk02alaserjet_managed_mfp_e72535_z8z010alaserjet_managed_flow_mfp_e72530_x3a59apagewide_managed_color_mfp_p77950_5zn99apagewide_managed_color_mfp_p77960_5zp01acolor_laserjet_managed_mfp_e67560_l3u67alaserjet_managed_flow_mfp_e82560_az8z20acolor_laserjet_managed_flow_mfp_e78630_3sj33acolor_laserjet_managed_mfp_e87640du-e87660du_5cm64alaserjet_enterprise_flow_mfp_m632_j8j70alaserjet_managed_flow_e82660_3sj30alaserjet_managed_mfp_e62655_3gy18alaserjet_managed_mfp_e72530_z8z011apagewide_managed_color_mfp_p77940_2gp25acolor_laserjet_managed_mfp_e786_5qk18acolor_laserjet_managed_mfp_e87770_3sj35apagewide_enterprise_color_mfp_586_g1w40alaserjet_managed_mfp_e82560_z8z18acolor_laserjet_enterprise_mfp_m480_3qa55acolor_laserjet_managed_flow_mfp_e87660_z8z13acolor_laserjet_enterprise_flow_mfp_6800_49k84acolor_laserjet_managed_m553_b5l38alaserjet_managed_mfp_e72525_x3a62alaserjet_managed_e82660_3sj30alaserjet_managed_mfp_e52645_1ps55acolor_laserjet_managed_mfp_e78630_3sj32acolor_laserjet_managed_mfp_e87650_z8z15acolor_laserjet_managed_mfp_e77830_z8z0alaserjet_managed_mfp_e82550_x3a74acolor_laserjet_managed_mfp_e87640du-e87660du_5cm63acolor_laserjet_managed_mfp_e877_3sj38alaserjet_managed_flow_mfp_e62565_j8j74alaserjet_managed_flow_mfp_e72530_x3a65acolor_laserjet_enterprise_m554_7zu79acolor_laserjet_enterprise_m555_7zu79acolor_laserjet_enterprise_mfp_m578_7zu87alaserjet_managed_flow_mfp_e72535_z8z07alaserjet_managed_flow_mfp_m527z_f2a80alaserjet_managed_mfp_e72425_5rc90alaserjet_enterprise_flow_mfp_m635_7ps98acolor_laserjet_enterprise_m553_b5l38alaserjet_managed_flow_mfp_e73130_6bs58alaserjet_enterprise_mfp_m635_7ps98apagewide_managed_color_mfp_e77650_j7z14acolor_laserjet_managed_mfp_e77822_x3a78alaserjet_managed_flow_mfp_e62555_j8j66acolor_laserjet_managed_mfp_e87650_z8z13alaserjet_managed_mfp_e62565_j8j66alaserjet_managed_mfp_e73130_3sj00alaserjet_managed_mfp_e82540_x3a74alaserjet_managed_e82670_3sj30apagewide_managed_color_flow_mfp_e77650z_j7z07acolor_laserjet_managed_flow_mfp_e77825_x3a84alaserjet_enterprise_mfp_m528_1pv64acolor_laserjet_managed_flow_mfp_e87640_x3a92acolor_laserjet_managed_mfp_e78330_8gs01acolor_laserjet_managed_flow_e87740_3sj20acolor_laserjet_managed_mfp_e77830_z8z04alaserjet_managed_mfp_e82540du_5fm76alaserjet_managed_mfp_e72535_x3a65acolor_laserjet_enterprise_m652_j7z98acolor_laserjet_managed_mfp_e87660_x3a92acolor_laserjet_managed_flow_e87750_3sj38acolor_laserjet_managed_m553_b5l26alaserjet_managed_mfp_e731_6bs59acolor_laserjet_managed_flow_e87740_5qk08alaserjet_managed_e82650_3sj29acolor_laserjet_managed_mfp_e87770_3sj20acolor_laserjet_managed_flow_e87750_3sj35acolor_laserjet_managed_e65150_3gy04alaserjet_managed_flow_mfp_e62575_j8j80alaserjet_managed_mfp_e72530_z8z07acolor_laserjet_managed_mfp_e87770_5qk08alaserjet_managed_flow_mfp_e73135_6bs57acolor_laserjet_managed_flow_mfp_e77822_x3a77alaserjet_managed_mfp_e62665_3gy18acolor_laserjet_managed_flow_mfp_e786_3sj34acolor_laserjet_managed_mfp_e87740_5qk20alaserjet_enterprise_mfp_m528_1pv67apagewide_managed_color_flow_mfp_e77660z_j7z13alaserjet_managed_m506_f2a67acolor_laserjet_managed_mfp_e87660_z8z12acolor_laserjet_managed_mfp_e78330_8gr95acolor_laserjet_enterprise_m554_7zu78acolor_laserjet_managed_mfp_e87750_3sj20acolor_laserjet_managed_mfp_e87640_z8z15alaserjet_managed_mfp_e82550_z8z18acolor_laserjet_enterprise_m553_b5l39acolor_laserjet_managed_mfp_e77825_z8z05alaserjet_managed_mfp_e82560du_5cm59acolor_laserjet_managed_flow_mfp_e57540_3gy25alaserjet_managed_flow_mfp_e72525_z8z011alaserjet_managed_flow_mfp_e72530_z8z08acolor_laserjet_enterprise_m553_b5l24acolor_laserjet_managed_flow_mfp_e78630_5qj90alaserjet_managed_flow_mfp_e82550_z8z19laserjet_managed_e60065_m0p33alaserjet_managed_flow_mfp_e82560_x3a72acolor_laserjet_managed_mfp_e87660_x3a89alaserjet_managed_mfp_e73135_6bs59acolor_laserjet_enterprise_flow_mfp_m681_j8a11acolor_laserjet_enterprise_6700_58m42acolor_laserjet_managed_mfp_e87740_3sj20acolor_laserjet_managed_mfp_e87640_x3a93aCertain HP Enterprise LaserJet, LaserJet Managed printers
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-50933
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.05% / 13.53%
||
7 Day CHG~0.00%
Published-02 Feb, 2024 | 00:05
Updated-03 Jun, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM PowerSC HTML injection

IBM PowerSC 1.3, 2.0, and 2.1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 275113.

Action-Not Available
Vendor-IBM Corporation
Product-powerscPowerSC
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CVE-2017-8758
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.79% / 72.95%
||
7 Day CHG~0.00%
Published-13 Sep, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Exchange Server 2016 allows an elevation of privilege vulnerability when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests, aka "Microsoft Exchange Cross-Site Scripting Vulnerability."

Action-Not Available
Vendor-Microsoft Corporation
Product-exchange_serverMicrosoft Exchange Server 2016
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-8551
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.76% / 72.31%
||
7 Day CHG~0.00%
Published-15 Jun, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability exists when Microsoft SharePoint software fails to properly sanitize a specially crafted requests, aka "Microsoft SharePoint XSS vulnerability".

Action-Not Available
Vendor-Microsoft Corporation
Product-project_serverMicrosoft SharePoint
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-8559
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.79% / 72.95%
||
7 Day CHG~0.00%
Published-11 Jul, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an elevation of privilege vulnerability due to the way that Exchange Outlook Web Access (OWA) handles web requests, aka "Microsoft Exchange Cross-Site Scripting Vulnerability". This CVE ID is unique from CVE-2017-8560.

Action-Not Available
Vendor-Microsoft Corporation
Product-exchange_serverMicrosoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5.
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-8560
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.79% / 72.95%
||
7 Day CHG~0.00%
Published-11 Jul, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an elevation of privilege vulnerability due to the way that Exchange Outlook Web Access (OWA) handles web requests, aka "Microsoft Exchange Cross-Site Scripting Vulnerability". This CVE ID is unique from CVE-2017-8559.

Action-Not Available
Vendor-Microsoft Corporation
Product-exchange_serverMicrosoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5.
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-4973
Matching Score-10
Assigner-VulDB
ShareView Details
Matching Score-10
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-3.55% / 87.23%
||
7 Day CHG~0.00%
Published-15 Sep, 2023 | 02:00
Updated-02 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Academy LMS GET Parameter filter cross site scripting

A vulnerability was found in Academy LMS 6.2 on Windows. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument searched_word/searched_tution_class_type[]/searched_price_type[]/searched_duration[] leads to cross site scripting. The attack can be launched remotely. The identifier VDB-239749 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-CreativeitemMicrosoft Corporation
Product-academy_lmswindowsLMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-48681
Matching Score-10
Assigner-Acronis International GmbH
ShareView Details
Matching Score-10
Assigner-Acronis International GmbH
CVSS Score-1.9||LOW
EPSS-0.57% / 67.76%
||
7 Day CHG~0.00%
Published-27 Feb, 2024 | 16:52
Updated-06 Feb, 2025 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Self cross-site scripting (XSS) vulnerability in storage nodes search field. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.

Action-Not Available
Vendor-Acronis (Acronis International GmbH)Microsoft CorporationLinux Kernel Organization, Inc
Product-windowslinux_kernelcyber_protectAcronis Cyber Protect 16
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-1486
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.18% / 40.20%
||
7 Day CHG~0.00%
Published-23 Apr, 2018 | 13:00
Updated-17 Sep, 2024 | 03:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Cognos Business Intelligence 10.2, 10.2.1, 10.2.1.1, and 10.2.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128624.

Action-Not Available
Vendor-IBM Corporation
Product-cognos_business_intelligenceCognos Business Intelligence
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-5512
Matching Score-10
Assigner-Oracle
ShareView Details
Matching Score-10
Assigner-Oracle
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 44.57%
||
7 Day CHG~0.00%
Published-25 Oct, 2016 | 14:00
Updated-08 May, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote attackers to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2016-5521.

Action-Not Available
Vendor-n/aOracle Corporation
Product-agile_product_lifecycle_managementn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-7109
Matching Score-10
Assigner-Apple Inc.
ShareView Details
Matching Score-10
Assigner-Apple Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.72% / 71.63%
||
7 Day CHG~0.00%
Published-23 Oct, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via crafted web content that incorrectly interacts with the Application Cache policy.

Action-Not Available
Vendor-n/aApple Inc.Microsoft Corporation
Product-itunestvosiphone_osicloudsafariwindowsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-47699
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.15% / 36.40%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 15:11
Updated-02 Aug, 2024 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Secure Proxy cross-site scripting

IBM Sterling Secure Proxy 6.0.3 and 6.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 270974.

Action-Not Available
Vendor-IBM Corporation
Product-sterling_secure_proxySecure Proxy
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-47162
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.15% / 36.40%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 15:06
Updated-02 Aug, 2024 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Secure Proxy cross-site scripting

IBM Sterling Secure Proxy 6.0.3 and 6.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 270973.

Action-Not Available
Vendor-IBM Corporation
Product-sterling_secure_proxySecure Proxy
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-47144
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.15% / 36.40%
||
7 Day CHG~0.00%
Published-02 Feb, 2024 | 13:04
Updated-02 Aug, 2024 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Tivoli Application Dependency Discovery Manager cross-site scripting

IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 270271.

Action-Not Available
Vendor-IBM Corporation
Product-tivoli_application_dependency_discovery_managerTivoli Application Dependency Discovery Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-3591
Matching Score-10
Assigner-Trellix
ShareView Details
Matching Score-10
Assigner-Trellix
CVSS Score-3.9||LOW
EPSS-0.31% / 53.79%
||
7 Day CHG~0.00%
Published-24 Jul, 2019 | 14:30
Updated-04 Aug, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLP Endpoint ePO extension vulnerable to XSS

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ePO extension in McAfee Data Loss Prevention (DLPe) for Windows 11.x prior to 11.3.0 allows unauthenticated remote user to trigger specially crafted JavaScript to render in the ePO UI via a carefully crafted upload to a remote website which is correctly blocked by DLPe Web Protection. This would then render as an XSS when the DLP Admin viewed the event in the ePO UI.

Action-Not Available
Vendor-McAfee, LLCMicrosoft Corporation
Product-windowsdata_loss_prevention_endpointData Loss Prevention ePO extension
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-4594
Matching Score-10
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-10
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-6.1||MEDIUM
EPSS-0.08% / 23.82%
||
7 Day CHG~0.00%
Published-23 Nov, 2023 | 12:35
Updated-21 Nov, 2024 | 19:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-site Scripting in BVRP Software SLmail

Stored XSS vulnerability. This vulnerability could allow an attacker to store a malicious JavaScript payload via GET and POST methods on multiple parameters in the MailAdmin_dll.htm file.

Action-Not Available
Vendor-seattlelabBVRP SoftwareMicrosoft Corporation
Product-windowsslmailSLmail
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-45181
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.05% / 15.29%
||
7 Day CHG~0.00%
Published-25 Nov, 2024 | 15:48
Updated-14 Jan, 2025 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Jazz Foundation cross-site scripting

IBM Jazz Foundation 7.0.2 and below are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

Action-Not Available
Vendor-IBM Corporation
Product-jazz_foundationJazz Foundation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-1327
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.28% / 51.12%
||
7 Day CHG~0.00%
Published-03 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM iNotes 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126062.

Action-Not Available
Vendor-IBM Corporation
Product-inotesiNotes
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-43039
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 7.37%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 18:25
Updated-17 Aug, 2025 | 00:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM OpenPages with Watson cross-site scripting

IBM OpenPages with Watson 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session

Action-Not Available
Vendor-IBM CorporationMicrosoft CorporationLinux Kernel Organization, Inc
Product-linux_kernelwindowsopenpages_with_watsonOpenPages with Watson
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-1941
Matching Score-10
Assigner-Apache Software Foundation
ShareView Details
Matching Score-10
Assigner-Apache Software Foundation
CVSS Score-6.1||MEDIUM
EPSS-4.42% / 88.61%
||
7 Day CHG~0.00%
Published-14 May, 2020 | 16:29
Updated-04 Aug, 2024 | 06:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue.

Action-Not Available
Vendor-n/aThe Apache Software FoundationOracle Corporation
Product-communications_diameter_signaling_routerenterprise_repositorycommunications_session_route_manageractivemqflexcube_private_bankingcommunications_session_report_managercommunications_element_managerApache ActiveMQ
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-2938
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.28% / 51.12%
||
7 Day CHG~0.00%
Published-01 Feb, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

Action-Not Available
Vendor-n/aIBM Corporation
Product-dominoinotesIBM Domino 8.5.3.5, 8.5.3.6, 9.0.1, 8.5, 9.0, 8.5.1, 8.5.2, 8.5.3, 9.0.1.1, 8.0.2, 8.0, 8.0.1, 8.5.1.5, 8.5.2.4, 9.0.1.2, 8.5.0.1, 9.0.1.3, 8.5.1.4, 9.0.1.4, 9.0.1.5, 8.5.1.1, 9.0.1.6, 9.0.1.7
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-3057
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.26% / 49.66%
||
7 Day CHG~0.00%
Published-30 Nov, 2016 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in IBM Sterling B2B Integrator 5.2 before 5020500_14 and 5.2 06 before 5020602_1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aIBM Corporation
Product-sterling_b2b_integratorn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-3212
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-5.22% / 89.57%
||
7 Day CHG~0.00%
Published-16 Jun, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The XSS Filter in Microsoft Internet Explorer 9 through 11 does not properly identify JavaScript, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, aka "Internet Explorer XSS Filter Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-internet_explorern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-4136
Matching Score-10
Assigner-Crafter CMS
ShareView Details
Matching Score-10
Assigner-Crafter CMS
CVSS Score-7.4||HIGH
EPSS-14.17% / 94.11%
||
7 Day CHG~0.00%
Published-03 Aug, 2023 | 13:33
Updated-13 Feb, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crafter Engine

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CrafterCMS Engine on Windows, MacOS, Linux, x86, ARM, 64 bit allows Reflected XSS.This issue affects CrafterCMS: from 4.0.0 through 4.0.2, from 3.1.0 through 3.1.27.

Action-Not Available
Vendor-craftercmsCrafterCMSLinux Kernel Organization, IncApple Inc.Microsoft Corporation
Product-windowslinux_kernelmacoscraftercmsCrafterCMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-1951
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-1.78% / 81.95%
||
7 Day CHG~0.00%
Published-31 Oct, 2019 | 19:33
Updated-06 Aug, 2024 | 15:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.5 and 1.20.x before 1.20.4 and allows remote attackers to inject arbitrary web script or HTML via Lua function names.

Action-Not Available
Vendor-Linux Kernel Organization, IncWikimedia FoundationDebian GNU/Linux
Product-mediawikidebian_linuxlinux_kernelMediaWiki
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-38359
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.09% / 25.96%
||
7 Day CHG~0.00%
Published-24 Feb, 2024 | 15:27
Updated-13 Feb, 2025 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Cognos Analytics cross-site scripting

IBM Cognos Analytics 11.1.7, 11.2.4, and 12.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 260744.

Action-Not Available
Vendor-NetApp, Inc.IBM Corporation
Product-cognos_analyticsoncommand_insightCognos Analyticscognos_analytics
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-38364
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.07% / 21.21%
||
7 Day CHG~0.00%
Published-13 Nov, 2023 | 01:47
Updated-30 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM CICS TX Advanced cross-site scripting

IBM CICS TX Advanced 10.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 260821.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-linux_kernelcics_txCICS TX Advanced
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-14862
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.55% / 66.94%
||
7 Day CHG~0.00%
Published-02 Jan, 2020 | 14:18
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.

Action-Not Available
Vendor-knockoutjsOracle CorporationRed Hat, Inc.
Product-knockoutprocess_automationbusiness_intelligencegoldengatedecision_managerknockout
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-38360
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.07% / 23.17%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 18:05
Updated-07 Jan, 2025 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM CICS TX cross-site scripting

IBM CICS TX Advanced 10.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 260769.

Action-Not Available
Vendor-IBM Corporation
Product-cics_txCICS TX Advanced
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-36030
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.23% / 45.50%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 17:57
Updated-29 Apr, 2025 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Dynamics 365 Sales Spoofing Vulnerability

Microsoft Dynamics 365 Sales Spoofing Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-dynamics_365Microsoft Dynamics 365 (on-premises) version 9.0Microsoft Dynamics 365 (on-premises) version 9.1
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-36416
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.29% / 51.45%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 17:08
Updated-14 Apr, 2025 | 22:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-dynamics_365Microsoft Dynamics 365 (on-premises) version 9.0Microsoft Dynamics 365 (on-premises) version 9.1
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-33171
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-8.2||HIGH
EPSS-0.25% / 48.45%
||
7 Day CHG~0.00%
Published-11 Jul, 2023 | 17:03
Updated-28 Feb, 2025 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-dynamics_365Microsoft Dynamics 365 (on-premises) version 9.0Microsoft Dynamics 365 (on-premises) version 9.1
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-32516
Matching Score-10
Assigner-Patchstack
ShareView Details
Matching Score-10
Assigner-Patchstack
CVSS Score-7.1||HIGH
EPSS-0.10% / 28.97%
||
7 Day CHG~0.00%
Published-24 Aug, 2023 | 11:21
Updated-24 Sep, 2024 | 19:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Restaurant Menu – Food Ordering System – Table Reservation Plugin <= 2.3.6 is vulnerable to Cross Site Scripting (XSS)

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GloriaFood Restaurant Menu – Food Ordering System – Table Reservation plugin <= 2.3.6 versions.

Action-Not Available
Vendor-GloriaFoodOracle Corporation
Product-restaurant_menu_-_food_ordering_system_-_table_reservationRestaurant Menu – Food Ordering System – Table Reservation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-28313
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.39% / 58.97%
||
7 Day CHG~0.00%
Published-11 Apr, 2023 | 19:13
Updated-28 Feb, 2025 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Dynamics 365 Customer Voice Cross-Site Scripting Vulnerability

Microsoft Dynamics 365 Customer Voice Cross-Site Scripting Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-send_customer_voice_survey_from_dynamics_365Send Customer Voice survey from Dynamics 365
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-0255
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.21% / 43.90%
||
7 Day CHG~0.00%
Published-05 May, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Marketing Platform 9.1 and 10.0 is vulnerable to stored cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. IBM X-Force ID: 110564.

Action-Not Available
Vendor-IBM Corporation
Product-marketing_platformMarketing Platform
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-0223
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.19% / 40.69%
||
7 Day CHG~0.00%
Published-15 Mar, 2018 | 22:00
Updated-05 Aug, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the Webform Framework API in IBM Forms Server 4.0.x, 8.0.x, 8.1, and 8.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. IBM X-Force ID: 110006.

Action-Not Available
Vendor-n/aIBM Corporation
Product-forms_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-0032
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.47% / 80.11%
||
7 Day CHG~0.00%
Published-13 Jan, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2013 PS1, 2013 Cumulative Update 10, 2013 Cumulative Update 11, and 2016 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Exchange Spoofing Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-exchange_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-0029
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.47% / 80.11%
||
7 Day CHG~0.00%
Published-13 Jan, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2016 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Exchange Spoofing Vulnerability," a different vulnerability than CVE-2016-0031.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-exchange_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-33138
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 12.37%
||
7 Day CHG~0.00%
Published-22 May, 2025 | 16:37
Updated-26 Aug, 2025 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Aspera Faspex HTML injection

IBM Aspera Faspex 5.0.0 through 5.0.12 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-linux_kernelaspera_faspexAspera Faspex
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-0246
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 45.11%
||
7 Day CHG~0.00%
Published-22 Oct, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in IBM Security Guardium 8.2 before p310, 9.x through 9.5 before p700, and 10.x through 10.1 before p100 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

Action-Not Available
Vendor-n/aIBM Corporation
Product-security_guardiumn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-0293
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 45.11%
||
7 Day CHG~0.00%
Published-01 Sep, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in IBM BigFix Platform (formerly Tivoli Endpoint Manager) 9.x before 9.1.8 and 9.2.x before 9.2.8 allows remote attackers to inject arbitrary web script or HTML via a modified .beswrpt file.

Action-Not Available
Vendor-n/aIBM Corporation
Product-bigfix_platformn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-2999
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.21% / 43.81%
||
7 Day CHG~0.00%
Published-09 Jul, 2018 | 18:00
Updated-06 Aug, 2024 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in IBM InfoSphere Data Replication Dashboard 9.7 and 10.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. IBM X-Force ID: 84115.

Action-Not Available
Vendor-n/aIBM Corporation
Product-infosphere_data_replication_dashboardn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-41735
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.07% / 22.34%
||
7 Day CHG~0.00%
Published-07 Dec, 2022 | 16:40
Updated-22 Apr, 2025 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Business Process Manager cross-site scripting

IBM Business Process Manager 21.0.1 through 21.0.3.1, 20.0.0.1 through 20.0.0.2 19.0.0.1 through 19.0.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 65687.

Action-Not Available
Vendor-IBM Corporation
Product-business_automation_workflowBusiness Process Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-3314
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.21% / 43.62%
||
7 Day CHG~0.00%
Published-25 Jun, 2021 | 15:16
Updated-03 Aug, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Oracle GlassFish Server 3.1.2.18 and below allows /common/logViewer/logViewer.jsf XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Action-Not Available
Vendor-n/aOracle Corporation
Product-glassfish_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-1482
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.44% / 62.21%
||
7 Day CHG~0.00%
Published-11 Sep, 2020 | 17:09
Updated-04 Aug, 2024 | 06:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Office SharePoint XSS Vulnerability

<p>A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.</p> <p>The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current user. The attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the SharePoint site on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.</p> <p>The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.</p>

Action-Not Available
Vendor-Microsoft Corporation
Product-sharepoint_serversharepoint_foundationsharepoint_enterprise_serverMicrosoft SharePoint Server 2019Microsoft SharePoint Enterprise Server 2016Microsoft SharePoint Foundation 2013 Service Pack 1Microsoft SharePoint Foundation 2010 Service Pack 2
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-5798
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-10
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.1||MEDIUM
EPSS-5.88% / 90.24%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 22:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Code Execution vulnerability in HPE OpenCall Media Platform (OCMP) was found. The vulnerability impacts OCMP versions prior to 3.4.2 RP201 (for OCMP 3.x), all versions prior to 4.4.7 RP702 (for OCMP 4.x).

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-opencall_media_platformOpenCall Media Platform (OCMP)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2015-7439
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 45.11%
||
7 Day CHG~0.00%
Published-27 Jan, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in InfoSphere Data Architect (IDA), as distributed in IBM Rational Software Architect 8.5 through 9.5, Rational Software Architect for WebSphere Software (RSA4WS) 8.5 through 9.5, and Rational Software Architect RealTime (RSART) 8.5 through 9.5, allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

Action-Not Available
Vendor-n/aIBM Corporation
Product-rational_software_architect_for_websphere_software\'rational_software_architectrational_software_architect_realtimerational_software_architect_for_websphere_softwaren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-14592
Matching Score-10
Assigner-Oracle
ShareView Details
Matching Score-10
Assigner-Oracle
CVSS Score-6.1||MEDIUM
EPSS-0.85% / 74.00%
||
7 Day CHG~0.00%
Published-15 Jul, 2020 | 17:34
Updated-27 Sep, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Rich Text Editor). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-peoplesoft_enterprise_peopletoolsPeopleSoft Enterprise PT PeopleTools
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-14613
Matching Score-10
Assigner-Oracle
ShareView Details
Matching Score-10
Assigner-Oracle
CVSS Score-6.1||MEDIUM
EPSS-0.88% / 74.43%
||
7 Day CHG~0.00%
Published-15 Jul, 2020 | 17:34
Updated-27 Sep, 2024 | 18:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Advanced User Interface). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data as well as unauthorized read access to a subset of Oracle WebCenter Sites accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-webcenter_sitesWebCenter Sites
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-1442
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.61% / 68.69%
||
7 Day CHG~0.00%
Published-14 Jul, 2020 | 22:54
Updated-04 Aug, 2024 | 06:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A spoofing vulnerability exists when an Office Web Apps server does not properly sanitize a specially crafted request, aka 'Office Web Apps XSS Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-office_online_serveroffice_web_appsMicrosoft Office Web AppsMicrosoft Office Online Server
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 288
  • 289
  • Next
Details not found