Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-48614

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-10 Dec, 2023 | 00:00
Updated At-03 Aug, 2024 | 15:17
Rejected At-
Credits

Special:Ask in Semantic MediaWiki before 4.0.2 allows Reflected XSS.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:10 Dec, 2023 | 00:00
Updated At:03 Aug, 2024 | 15:17
Rejected At:
▼CVE Numbering Authority (CNA)

Special:Ask in Semantic MediaWiki before 4.0.2 allows Reflected XSS.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/SemanticMediaWiki/SemanticMediaWiki/issues/5262
N/A
https://www.semantic-mediawiki.org/wiki/Semantic_MediaWiki_4.0.2
N/A
Hyperlink: https://github.com/SemanticMediaWiki/SemanticMediaWiki/issues/5262
Resource: N/A
Hyperlink: https://www.semantic-mediawiki.org/wiki/Semantic_MediaWiki_4.0.2
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/SemanticMediaWiki/SemanticMediaWiki/issues/5262
x_transferred
https://www.semantic-mediawiki.org/wiki/Semantic_MediaWiki_4.0.2
x_transferred
Hyperlink: https://github.com/SemanticMediaWiki/SemanticMediaWiki/issues/5262
Resource:
x_transferred
Hyperlink: https://www.semantic-mediawiki.org/wiki/Semantic_MediaWiki_4.0.2
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:10 Dec, 2023 | 19:15
Updated At:13 Dec, 2023 | 15:59

Special:Ask in Semantic MediaWiki before 4.0.2 allows Reflected XSS.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CPE Matches

semantic-mediawiki
semantic-mediawiki
>>semantic_mediawiki>>Versions before 4.0.2(exclusive)
cpe:2.3:a:semantic-mediawiki:semantic_mediawiki:*:*:*:*:*:mediawiki:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE ID: CWE-79
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/SemanticMediaWiki/SemanticMediaWiki/issues/5262cve@mitre.org
Issue Tracking
https://www.semantic-mediawiki.org/wiki/Semantic_MediaWiki_4.0.2cve@mitre.org
Release Notes
Hyperlink: https://github.com/SemanticMediaWiki/SemanticMediaWiki/issues/5262
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://www.semantic-mediawiki.org/wiki/Semantic_MediaWiki_4.0.2
Source: cve@mitre.org
Resource:
Release Notes

Change History

0
Information is not available yet

Similar CVEs

9995Records found

CVE-2019-17599
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.74% / 72.51%
||
7 Day CHG~0.00%
Published-13 Dec, 2019 | 13:30
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The quiz-master-next (aka Quiz And Survey Master) plugin before 6.3.5 for WordPress is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via the from or till parameter (and/or the quiz_id parameter). The component is: admin/quiz-options-page.php. The attack vector is: When the Administrator is logged in, a reflected XSS may execute upon a click on a malicious URL.

Action-Not Available
Vendor-expresstechn/a
Product-quiz_and_survey_mastern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-68385
Matching Score-4
Assigner-Elastic
ShareView Details
Matching Score-4
Assigner-Elastic
CVSS Score-7.2||HIGH
EPSS-0.04% / 12.30%
||
7 Day CHG+0.01%
Published-18 Dec, 2025 | 22:08
Updated-23 Dec, 2025 | 19:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kibana Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an authenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a method in Vega bypassing a previous Vega XSS mitigation.

Action-Not Available
Vendor-Elasticsearch BV
Product-kibanaKibana
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-36397
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-6.1||MEDIUM
EPSS-0.15% / 35.55%
||
7 Day CHG~0.00%
Published-16 Jun, 2024 | 08:06
Updated-08 Aug, 2024 | 14:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vantiva - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Vantiva - MediaAccess DGA2232 v19.4 - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Action-Not Available
Vendor-vantivaVantiva
Product-mediaaccess_dga2232_firmwaremediaaccess_dga2232MediaAccess DGA2232
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-44030
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.37% / 58.45%
||
7 Day CHG~0.00%
Published-22 Dec, 2021 | 05:07
Updated-04 Aug, 2024 | 04:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Quest KACE Desktop Authority before 11.2 allows XSS because it does not prevent untrusted HTML from reaching the jQuery.htmlPrefilter method of jQuery.

Action-Not Available
Vendor-n/aQuest Software, Inc.
Product-kace_desktop_authorityn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43682
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 44.73%
||
7 Day CHG~0.00%
Published-02 Dec, 2021 | 13:37
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

thinkphp-bjyblog (last update Jun 4 2021) is affected by a Cross Site Scripting (XSS) vulnerability in AdminBaseController.class.php. The exit function terminates the script and prints a message to the user that contains $_SERVER['HTTP_HOST'].

Action-Not Available
Vendor-thinkphp-bjyblog_projectn/a
Product-thinkphp-bjyblogn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-23722
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.11% / 28.79%
||
7 Day CHG+0.03%
Published-16 Jan, 2026 | 19:29
Updated-30 Jan, 2026 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WeGIA has a Reflected Cross-Site Scripting (XSS) vulnerability allowing arbitrary code execution and UI redressing.

WeGIA is a Web Manager for Charitable Institutions. Prior to 3.6.2, a Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the WeGIA system, specifically within the html/memorando/insere_despacho.php file. The application fails to properly sanitize or encode user-supplied input via the id_memorando GET parameter before reflecting it into the HTML source (likely inside a <script> block or an attribute). This allows unauthenticated attackers to inject arbitrary JavaScript or HTML into the context of the user's browser session. This vulnerability is fixed in 3.6.2.

Action-Not Available
Vendor-wegiaLabRedesCefetRJ
Product-wegiaWeGIA
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43681
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 44.73%
||
7 Day CHG~0.00%
Published-02 Dec, 2021 | 12:47
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SakuraPanel v1.0.1.1 is affected by a Cross Site Scripting (XSS) vulnerability in /master/core/PostHandler.php. The exit function will terminate the script and print the message $data['proxy_name'].

Action-Not Available
Vendor-zerodreamn/a
Product-sakurapaneln/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-27982
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-7.87% / 91.84%
||
7 Day CHG~0.00%
Published-09 Nov, 2020 | 19:12
Updated-04 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IceWarp 11.4.5.0 allows XSS via the language parameter.

Action-Not Available
Vendor-icewarpn/a
Product-mail_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5113
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 60.38%
||
7 Day CHG~0.00%
Published-04 Oct, 2023 | 14:20
Updated-19 Sep, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certain HP Enterprise LaserJet, LaserJet Managed printers - Potential denial of service, potential Cross Site Scripting (XSS)

Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI.

Action-Not Available
Vendor-HP Inc.
Product-color_laserjet_managed_mfp_e78625_5qj90alaserjet_managed_e60155_3gy10acolor_laserjet_managed_mfp_e87640_x3a92alaserjet_managed_flow_mfp_e82540_x3a82acolor_laserjet_managed_flow_mfp_e87660_z8z16acolor_laserjet_enterprise_m751_t3u44alaserjet_managed_mfp_e73140_6bs57alaserjet_managed_mfp_e62665_3gy15acolor_laserjet_managed_mfp_e78223-e78228_8gs14acolor_laserjet_managed_flow_e87750_5qk20acolor_laserjet_managed_flow_mfp_e77822_z8z0alaserjet_managed_mfp_e62555_j8j74acolor_laserjet_managed_flow_mfp_e87650_x3a89acolor_laserjet_managed_flow_mfp_e78630_3sj12alaserjet_managed_e60075_m0p33acolor_laserjet_managed_mfp_e87650_z8z12acolor_laserjet_managed_mfp_e78330_8gs28acolor_laserjet_enterprise_m653_j8a06alaserjet_managed_mfp_e826dn_5qk13acolor_laserjet_managed_flow_mfp_e77830_x3a78acolor_laserjet_managed_e55040dw_3gx98acolor_laserjet_managed_mfp_e87740_3sj38acolor_laserjet_managed_flow_mfp_e77825_x3a83alaserjet_managed_flow_mfp_e72525_x3a62acolor_laserjet_enterprise_flow_mfp_m577_b5l54alaserjet_managed_mfp_e42540_3pz75acolor_laserjet_managed_mfp_e77825_z8z04acolor_laserjet_managed_flow_mfp_e87660_x3a87acolor_laserjet_managed_mfp_e78625_3sj32apagewide_managed_color_mfp_p77940_5zp00acolor_laserjet_enterprise_flow_mfp_m577_b5l47alaserjet_managed_flow_mfp_e82540_z8z23alaserjet_enterprise_m506_f2a70apagewide_managed_color_flow_mfp_e77650z_j7z13alaserjet_managed_mfp_e72525_z8z08acolor_laserjet_enterprise_6700_4y280alaserjet_managed_flow_mfp_e826z_5qk09alaserjet_managed_mfp_e62555_j8j67alaserjet_managed_flow_mfp_e62565_j8j80acolor_laserjet_managed_flow_e87760_3sj20alaserjet_enterprise_flow_mfp_m631_j8j63acolor_laserjet_managed_mfp_e78625_3sj12alaserjet_managed_mfp_e72530_z8z08acolor_laserjet_managed_mfp_e77825_x3a78alaserjet_managed_mfp_e82540_z8z19laserjet_managed_mfp_e82550_x3a68acolor_laserjet_managed_mfp_e78223-e78228_8gs50acolor_laserjet_managed_mfp_e87750_3sj36acolor_laserjet_managed_mfp_e87650_z8z17apagewide_managed_color_flow_mfp_e77660z_j7z07acolor_laserjet_managed_flow_e87750_5qk03acolor_laserjet_managed_flow_mfp_e57540_3gy26acolor_laserjet_managed_flow_e87740_3sj36acolor_laserjet_managed_mfp_e67550_l3u67alaserjet_managed_flow_mfp_e73135_5qj98apagewide_managed_color_mfp_p77960_5zp00acolor_laserjet_managed_mfp_e87770_5qk20apagewide_managed_color_mfp_p77940_y3z68acolor_laserjet_enterprise_mfp_m578_7zu85alaserjet_enterprise_mfp_m632_j8j72acolor_laserjet_managed_flow_mfp_e77830_x3a84alaserjet_enterprise_flow_mfp_m636_7pt00acolor_laserjet_managed_mfp_e87760_3sj37alaserjet_managed_flow_mfp_e82550_z8z23alaserjet_managed_flow_mfp_e72535_z8z06alaserjet_managed_mfp_e72530_x3a60alaserjet_enterprise_mfp_m631_j8j65alaserjet_enterprise_m612_7ps87alaserjet_managed_mfp_e82540du_5cm58acolor_laserjet_managed_mfp_e67560_l3u70alaserjet_managed_mfp_e826dn_3sj29acolor_laserjet_enterprise_mfp_m681_j8a10apagewide_managed_color_mfp_p77950_5zp01acolor_laserjet_managed_mfp_e77822_z8z00alaserjet_managed_flow_mfp_e82540_x3a72alaserjet_enterprise_m611_7ps83apagewide_enterprise_color_flow_mfp_780f_j7z09acolor_laserjet_managed_mfp_e87640du-e87660du_5rc88alaserjet_managed_mfp_e82560_az8z20apagewide_managed_color_flow_mfp_e77660z_j7z08apagewide_managed_color_mfp_p77950_y3z66acolor_laserjet_managed_mfp_e78330_8gs29alaserjet_managed_flow_mfp_e82560_x3a79acolor_laserjet_managed_flow_mfp_e77830_z8z04acolor_laserjet_managed_mfp_e78323_8gs29apagewide_managed_color_mfp_p77960_y3z68acolor_laserjet_managed_mfp_e877_3sj22acolor_laserjet_managed_flow_mfp_e77830_z8z02acolor_laserjet_managed_flow_e87770_3sj21acolor_laserjet_enterprise_m555_7zu78acolor_laserjet_managed_mfp_e87640du-e87660du_5fm80alaserjet_managed_flow_mfp_e62575_j8j74acolor_laserjet_enterprise_mfp_m776_t3u56alaserjet_managed_flow_mfp_e62675_3gy15alaserjet_managed_mfp_e82560_x3a74alaserjet_managed_mfp_e62565_j8j74alaserjet_enterprise_m506_f2a71apagewide_color_mfp_779_4pz46alaserjet_managed_mfp_e72535_z8z08acolor_laserjet_enterprise_mfp_m577_b5l48alaserjet_managed_mfp_e82560_x3a79alaserjet_managed_flow_mfp_e62575_j8j67apagewide_managed_color_mfp_e77650_j7z07acolor_laserjet_managed_flow_e87750_3sj20apagewide_managed_color_mfp_p77950_y3z61acolor_laserjet_enterprise_m554_7zu81alaserjet_managed_flow_mfp_e62675_3gy18acolor_laserjet_managed_flow_e87740_3sj22acolor_laserjet_enterprise_mfp_6800_4y279acolor_laserjet_managed_mfp_e78330_8gr94acolor_laserjet_managed_mfp_e77422-e77428_5rc91alaserjet_managed_flow_mfp_e62575_j8j66acolor_laserjet_managed_mfp_e87660_x3a87acolor_laserjet_enterprise_flow_mfp_5800_6qn29alaserjet_managed_mfp_e82540du_5rc85acolor_laserjet_managed_mfp_e77422-e77428_5cm77acolor_laserjet_managed_mfp_e78323_8gs25acolor_laserjet_managed_mfp_e78625_3sj33alaserjet_managed_e82650_3sj08acolor_laserjet_managed_mfp_e57540_3gy26alaserjet_managed_e82660_5qk13acolor_laserjet_managed_mfp_e78323_9rt92alaserjet_managed_flow_mfp_e82560_x3a82acolor_laserjet_managed_mfp_e87650_x3a90alaserjet_managed_flow_mfp_e82550_x3a71acolor_laserjet_managed_flow_mfp_e78635_3sj12alaserjet_managed_mfp_e82540_x3a82alaserjet_managed_mfp_e73135_3sj02acolor_laserjet_managed_mfp_e87660_x3a90alaserjet_enterprise_mfp_m634_7ps95alaserjet_managed_mfp_e73030_3sj03acolor_laserjet_managed_mfp_e78523_5qj83alaserjet_enterprise_m507_1pv87acolor_laserjet_managed_mfp_e87650_x3a93acolor_laserjet_enterprise_flow_mfp_x57945_49k97avlaserjet_managed_mfp_e72535_x3a60apagewide_managed_color_mfp_p77960_2gp25alaserjet_managed_flow_mfp_e731_6bs58acolor_laserjet_managed_flow_mfp_e77825_x3a78acolor_laserjet_managed_mfp_e87650_z8z16alaserjet_enterprise_mfp_m528_1pv49acolor_laserjet_enterprise_flow_mfp_6800_6qn35alaserjet_managed_mfp_e82550du_5cm61acolor_laserjet_managed_mfp_e78625_3sj13alaserjet_managed_flow_e82650_3sj28acolor_laserjet_managed_flow_mfp_e77830_x3a83acolor_laserjet_managed_flow_mfp_e78635_5qk18alaserjet_enterprise_flow_mfp_m632_j8j72alaserjet_managed_mfp_e82540_x3a72alaserjet_managed_e82670_3sj29acolor_laserjet_managed_e65050_l3u55alaserjet_managed_mfp_e82560_x3a68alaserjet_enterprise_m611_7ps84acolor_laserjet_managed_flow_mfp_e67560_l3u66acolor_laserjet_managed_mfp_e78635_3sj13alaserjet_managed_e60075_m0p39apagewide_managed_color_flow_mfp_e77660z_z5g77alaserjet_managed_e60155_3gy12acolor_laserjet_managed_mfp_e78523_5qj81apagewide_managed_color_mfp_p77950_2gp22acolor_laserjet_managed_e65160_3gy04acolor_laserjet_managed_mfp_e87740_3sj35alaserjet_managed_flow_mfp_e72530_z8z010alaserjet_managed_mfp_e62665_3gy17alaserjet_managed_flow_mfp_e73135_3sj00alaserjet_managed_mfp_e73130_3sj01acolor_laserjet_managed_flow_mfp_e78625_3sj11alaserjet_managed_e60155_3gy09alaserjet_enterprise_mfp_m636_7pt01alaserjet_managed_mfp_e730_3sj03alaserjet_managed_flow_mfp_e73135_6bs59acolor_laserjet_managed_flow_mfp_e78625_5qj94acolor_laserjet_managed_flow_mfp_e786_5qj94acolor_laserjet_managed_mfp_e77422-e77428_5rc92alaserjet_managed_flow_mfp_e72530_z8z011alaserjet_managed_e60055_m0p40acolor_laserjet_managed_flow_e87770_3sj36acolor_laserjet_enterprise_flow_mfp_m681_j8a10acolor_laserjet_managed_flow_e87770_3sj20alaserjet_managed_flow_e82670_3sj28apagewide_enterprise_color_flow_mfp_780f_j7z10alaserjet_enterprise_flow_mfp_m635_7ps97alaserjet_managed_mfp_e82560_z8z23alaserjet_managed_flow_mfp_e82560_z8z23acolor_laserjet_managed_mfp_e877_3sj20alaserjet_managed_flow_mfp_e72535_x3a60acolor_laserjet_managed_mfp_e67650_3gy32alaserjet_managed_flow_mfp_e72525_x3a59alaserjet_managed_mfp_e72525_z8z010acolor_laserjet_managed_mfp_e87750_3sj38acolor_laserjet_enterprise_mfp_5800_49k96avlaserjet_managed_flow_mfp_e82550_az8z20acolor_laserjet_managed_mfp_e78330_8gs00acolor_laserjet_managed_mfp_e87640du-e87660du_5cm66acolor_laserjet_managed_mfp_e87640_z8z12alaserjet_managed_mfp_e73135_3sj00apagewide_managed_color_flow_mfp_e77650z_z5g77apagewide_managed_color_mfp_p77960_5zn98alaserjet_managed_e50145_1pu51alaserjet_managed_mfp_e72425_5cm72alaserjet_managed_flow_mfp_e82560_x3a69alaserjet_enterprise_flow_mfp_m527z_f2a78acolor_laserjet_managed_flow_e87770_5qk20alaserjet_managed_flow_mfp_e82540_x3a74acolor_laserjet_managed_m553_bl27alaserjet_enterprise_flow_mfp_m631_j8j64acolor_laserjet_managed_flow_mfp_e87640_z8z16acolor_laserjet_managed_flow_mfp_e77830_z8z00acolor_laserjet_managed_flow_mfp_e87650_x3a93acolor_laserjet_managed_flow_mfp_e87650_z8z16acolor_laserjet_managed_mfp_e78323_8gr94acolor_laserjet_managed_mfp_e77830_x3a83acolor_laserjet_managed_flow_mfp_e77822_z8z02acolor_laserjet_managed_mfp_e877_3sj19acolor_laserjet_managed_flow_mfp_e786_3sj13acolor_laserjet_managed_flow_mfp_e78635_3sj11alaserjet_managed_mfp_e72525_x3a59alaserjet_managed_flow_mfp_e826z_3sj08alaserjet_managed_mfp_e826dn_3sj07acolor_laserjet_enterprise_mfp_x57945_6qp99alaserjet_managed_e60065_m0p36alaserjet_enterprise_mfp_m527_f2a76alaserjet_managed_mfp_e82540du_5fm78alaserjet_managed_flow_mfp_e72535_x3a63alaserjet_managed_flow_mfp_e82550_x3a82alaserjet_managed_mfp_e72530_x3a59acolor_laserjet_managed_mfp_e77830_z8z05apagewide_managed_color_flow_mfp_e77650z_z5g79alaserjet_managed_mfp_e82550du_5fm78alaserjet_managed_flow_mfp_e73140_3sj02alaserjet_enterprise_m610_7ps82alaserjet_managed_mfp_m527_f2a80acolor_laserjet_managed_flow_mfp_e87650_z8z13alaserjet_managed_mfp_e62655_3gy17apagewide_managed_color_e55650_l3u44acolor_laserjet_enterprise_flow_mfp_m578_7zu85alaserjet_managed_mfp_e73130_6bs59alaserjet_managed_mfp_e72525_x3a65acolor_laserjet_managed_mfp_e77422-e77428_5cm76acolor_laserjet_enterprise_mfp_m578_7zu86apagewide_managed_color_mfp_p77940_2gp23acolor_laserjet_managed_flow_e87760_3sj36acolor_laserjet_managed_e65060_l3u57acolor_laserjet_managed_mfp_e77822_z8z04acolor_laserjet_managed_flow_e87760_5qk03acolor_laserjet_managed_flow_mfp_e67560_l3u67alaserjet_managed_flow_mfp_e73130_5qj98alaserjet_managed_flow_mfp_e731_5qj98acolor_laserjet_enterprise_x55745_49k99acolor_laserjet_managed_flow_e87750_3sj22acolor_laserjet_managed_flow_mfp_e78625_5qk18acolor_laserjet_managed_flow_mfp_e77830_x3a81alaserjet_managed_flow_mfp_e62675_3gy16acolor_laserjet_enterprise_flow_mfp_m577_b5l48alaserjet_managed_flow_mfp_e73140_3sj00acolor_laserjet_managed_mfp_e785dn_5qj81alaserjet_enterprise_flow_mfp_m527z_f2a77alaserjet_managed_flow_e82650_3sj09alaserjet_managed_flow_e82670_3sj07alaserjet_managed_mfp_e72535_z8z011acolor_laserjet_enterprise_flow_mfp_m578_7zu88alaserjet_managed_flow_mfp_e72525_x3a60acolor_laserjet_managed_mfp_e87750_3sj19alaserjet_managed_e82650_5qk13alaserjet_managed_mfp_e82540du_5fm77acolor_laserjet_managed_mfp_e78635_5qj94alaserjet_managed_mfp_e72535_z8z06alaserjet_managed_flow_mfp_e72525_x3a65alaserjet_managed_flow_mfp_e82550_x3a79acolor_laserjet_managed_mfp_e877_3sj37acolor_laserjet_managed_flow_mfp_e78625_3sj13acolor_laserjet_managed_mfp_e78323_8gs28alaserjet_enterprise_flow_mfp_m635_7ps99alaserjet_managed_mfp_e72535_x3a62acolor_laserjet_managed_mfp_m577_b5l50alaserjet_managed_mfp_e82550_x3a69alaserjet_managed_mfp_e82560_x3a71alaserjet_managed_mfp_e72425_5cm70acolor_laserjet_managed_flow_e87760_5qk08acolor_laserjet_enterprise_flow_mfp_m578_7zu86alaserjet_enterprise_mfp_m631_j8j64alaserjet_managed_mfp_e73030_5qj87acolor_laserjet_enterprise_mfp_5800_6qn31acolor_laserjet_managed_mfp_e786_3sj13acolor_laserjet_managed_m553_b5l39acolor_laserjet_managed_mfp_e87640_z8z14alaserjet_managed_flow_mfp_e72525_x3a63alaserjet_managed_mfp_e82560du_5fm78acolor_laserjet_managed_flow_mfp_e67560_l3u69acolor_laserjet_managed_flow_mfp_e78625_5qj90apagewide_managed_color_mfp_e77650_z5g77alaserjet_managed_mfp_e72525_x3a63alaserjet_enterprise_m608_k0q18alaserjet_managed_mfp_e62665_3gy16acolor_laserjet_managed_flow_mfp_e77822_x3a81acolor_laserjet_managed_mfp_e78323_8pe97acolor_laserjet_managed_mfp_e78630_5qj90acolor_laserjet_managed_mfp_e77822_x3a81apagewide_managed_color_mfp_e77650_z5g79acolor_laserjet_managed_mfp_e87640_z8z16alaserjet_managed_flow_mfp_e62555_j8j79apagewide_managed_color_mfp_p77960_y3z64alaserjet_managed_mfp_e72535_x3a59acolor_laserjet_managed_mfp_e77825_x3a80alaserjet_managed_mfp_e72530_x3a63alaserjet_managed_flow_mfp_e82560_z8z22alaserjet_managed_flow_mfp_e826z_3sj29alaserjet_managed_mfp_e73140_3sj00acolor_laserjet_managed_mfp_e77830_x3a81acolor_laserjet_managed_flow_mfp_e77830_z8z0acolor_laserjet_managed_flow_e87770_5qk03alaserjet_managed_mfp_e73135_6bs58acolor_laserjet_managed_flow_e87760_3sj38alaserjet_enterprise_m607_k0q15acolor_laserjet_managed_flow_mfp_e87640_x3a93acolor_laserjet_managed_mfp_e77422-e77428_5cm79alaserjet_managed_mfp_e62555_j8j79alaserjet_managed_flow_mfp_e62565_j8j66alaserjet_enterprise_m607_k0q14apagewide_enterprise_color_mfp_780_j7z10acolor_laserjet_managed_mfp_e87650_x3a92alaserjet_managed_mfp_e72530_z8z010alaserjet_managed_e82670_3sj28alaserjet_managed_e60075_m0p40acolor_laserjet_enterprise_flow_mfp_6800_4y279alaserjet_enterprise_mfp_m633_j8j76alaserjet_managed_mfp_e82560du_5rc84acolor_laserjet_managed_mfp_e87750_3sj21alaserjet_managed_flow_mfp_e62555_j8j67alaserjet_managed_m506_f2a71acolor_laserjet_managed_flow_mfp_e87650_x3a87apagewide_enterprise_color_mfp_586_g1w39apagewide_managed_color_mfp_p77940_5zn99alaserjet_enterprise_flow_mfp_m634_7ps96acolor_laserjet_managed_mfp_e78528_5qj81alaserjet_managed_mfp_e72430_5cm68acolor_laserjet_managed_mfp_e87770_3sj21acolor_laserjet_enterprise_6701_4y280acolor_laserjet_managed_mfp_e78323_9rt91acolor_laserjet_managed_mfp_e78330_8gs27alaserjet_enterprise_mfp_m527_f2a81alaserjet_managed_mfp_e731_3sj02alaserjet_enterprise_m506_f2a68alaserjet_managed_e60075_m0p35alaserjet_enterprise_m608_m0p32acolor_laserjet_managed_mfp_e87660_x3a93acolor_laserjet_managed_m553_b5l25apagewide_managed_color_mfp_p77950_5zn98acolor_laserjet_managed_mfp_e78323_8pe95acolor_laserjet_enterprise_flow_mfp_m681_j8a12alaserjet_managed_mfp_e72525_x3a60alaserjet_managed_mfp_e731_3sj01acolor_laserjet_managed_mfp_e786_5qj90acolor_laserjet_managed_flow_mfp_e67550_l3u67apagewide_enterprise_color_556_g1w46acolor_laserjet_enterprise_flow_mfp_x57945_6qp99acolor_laserjet_managed_flow_e87760_3sj37acolor_laserjet_enterprise_mfp_5800_6qn29acolor_laserjet_managed_flow_e87740_3sj35acolor_laserjet_managed_mfp_e78330_8pe97alaserjet_managed_mfp_e72535_z8z07alaserjet_enterprise_flow_mfp_m631_j8j65acolor_laserjet_managed_mfp_e78323_8gr98acolor_laserjet_managed_mfp_e78625_3sj34acolor_laserjet_managed_mfp_e877_3sj21alaserjet_managed_e50045_3gn19acolor_laserjet_managed_mfp_e78323_8gs00acolor_laserjet_managed_flow_mfp_e786_3sj32acolor_laserjet_managed_mfp_e78330_8gr98acolor_laserjet_managed_mfp_e87770_3sj36acolor_laserjet_managed_flow_e87750_3sj36acolor_laserjet_managed_mfp_e78323_8pe96acolor_laserjet_managed_mfp_e78330_8gs30acolor_laserjet_managed_mfp_e78635_5qk18alaserjet_managed_mfp_e73135_3sj01alaserjet_managed_mfp_e82540_x3a69acolor_laserjet_managed_flow_mfp_e87660_z8z15acolor_laserjet_managed_mfp_e67550_l3u70acolor_laserjet_managed_flow_mfp_e786_3sj11alaserjet_managed_flow_mfp_e82540_z8z22alaserjet_managed_mfp_e72425_5cm71alaserjet_managed_flow_mfp_e82560_z8z18apagewide_managed_color_mfp_p77950_5zp00acolor_laserjet_managed_mfp_e87650_x3a89alaserjet_enterprise_mfp_m631_j8j63acolor_laserjet_managed_flow_mfp_e87650_z8z17acolor_laserjet_managed_flow_mfp_e87660_x3a93alaserjet_managed_flow_mfp_e72530_x3a63apagewide_managed_color_mfp_p77960_y3z63alaserjet_managed_mfp_e62655_3gy16acolor_laserjet_managed_flow_mfp_e78625_3sj12alaserjet_managed_e82660_3sj29alaserjet_enterprise_mfp_m632_j8j70acolor_laserjet_managed_mfp_e78330_8pe94acolor_laserjet_enterprise_mfp_m681_j8a13acolor_laserjet_managed_flow_mfp_e87640_x3a89alaserjet_managed_e82670_3sj08alaserjet_managed_mfp_e73140_5qj98acolor_laserjet_managed_flow_mfp_e87650_z8z14acolor_laserjet_managed_flow_mfp_e87660_z8z17acolor_laserjet_managed_mfp_e87640_x3a89alaserjet_managed_flow_mfp_e73135_3sj01alaserjet_managed_flow_mfp_e82560_x3a71alaserjet_managed_flow_e82670_5qk13apagewide_managed_color_flow_mfp_e77660z_j7z05acolor_laserjet_managed_mfp_e78323_8pe94alaserjet_managed_flow_e82660_3sj09acolor_laserjet_managed_flow_e87740_3sj38acolor_laserjet_enterprise_m856_t3u51acolor_laserjet_managed_mfp_e77822_x3a83acolor_laserjet_enterprise_flow_mfp_m776_t3u56alaserjet_managed_flow_mfp_e82540_z8z19color_laserjet_enterprise_mfp_m577_b5l46alaserjet_managed_e60065_m0p40acolor_laserjet_managed_mfp_e87740_3sj22alaserjet_managed_mfp_e73135_5qj98alaserjet_managed_mfp_e82540_z8z23apagewide_color_mfp_774_4pa44acolor_laserjet_managed_flow_mfp_e78635_3sj32alaserjet_managed_flow_mfp_e62675_3gy17alaserjet_managed_mfp_e82550du_5cm58acolor_laserjet_managed_flow_mfp_e67550_l3u66acolor_laserjet_managed_flow_mfp_e78635_3sj13acolor_laserjet_enterprise_mfp_6800_6qn38acolor_laserjet_managed_mfp_e78223-e78228_8gs37alaserjet_managed_e60055_m0p35alaserjet_managed_mfp_e72430_5rc90alaserjet_managed_flow_mfp_e731_6bs59acolor_laserjet_enterprise_m653_j8a05alaserjet_managed_flow_e82670_3sj09alaserjet_managed_mfp_e62565_j8j67acolor_laserjet_managed_mfp_e77825_z8z00alaserjet_managed_e82650_3sj30alaserjet_managed_mfp_e82550_x3a75acolor_laserjet_managed_mfp_e77825_z8z01apagewide_color_mfp_774_4pz43acolor_laserjet_enterprise_m553_b5l25alaserjet_managed_mfp_e82550_z8z22acolor_laserjet_managed_flow_mfp_e77822_x3a84acolor_laserjet_managed_mfp_e77422-e77428_5cm75alaserjet_enterprise_m609_k0q21alaserjet_managed_mfp_e72525_z8z09acolor_laserjet_managed_mfp_e78330_8gr99acolor_laserjet_managed_mfp_e78330_8gs25alaserjet_managed_mfp_e82550du_5rc84acolor_laserjet_managed_mfp_e786_3sj32alaserjet_enterprise_m608_k0q19acolor_laserjet_enterprise_flow_mfp_5800_6qn31acolor_laserjet_managed_flow_mfp_e87640_z8z17alaserjet_managed_mfp_e82560du_5rc85acolor_laserjet_enterprise_mfp_m682_j8a17acolor_laserjet_managed_mfp_e78523_5qk15alaserjet_managed_flow_mfp_e62565_j8j73acolor_laserjet_enterprise_flow_mfp_m578_7zu87acolor_laserjet_enterprise_flow_mfp_m682_j8a16alaserjet_enterprise_flow_mfp_m634_7ps95apagewide_enterprise_color_765_j7z04alaserjet_managed_mfp_e72525_z8z06alaserjet_managed_flow_mfp_e62565_j8j67acolor_laserjet_managed_mfp_e87750_5qk20alaserjet_managed_e60165_3gy12alaserjet_managed_flow_mfp_e82550_x3a68alaserjet_managed_mfp_e82540du_5cm61alaserjet_enterprise_flow_mfp_m527z_f2a76alaserjet_managed_flow_mfp_e73130_3sj00apagewide_managed_color_mfp_e77650_j7z05alaserjet_managed_mfp_e82550du_5rc85alaserjet_managed_flow_mfp_e82540_x3a75acolor_laserjet_managed_mfp_e78323_8gr97acolor_laserjet_managed_mfp_e78630_3sj13alaserjet_managed_mfp_e72530_x3a62apagewide_managed_color_mfp_e58650dn_l3u42acolor_laserjet_managed_flow_mfp_e77830_z8z01apagewide_enterprise_color_flow_mfp_785_j7z11alaserjet_managed_flow_mfp_e72530_x3a60acolor_laserjet_managed_e65050_l3u56acolor_laserjet_managed_flow_e87760_3sj22acolor_laserjet_managed_mfp_e87660_z8z17alaserjet_managed_mfp_e73135_6bs57apagewide_managed_color_mfp_p77950_2gp25alaserjet_managed_flow_mfp_e72535_z8z010apagewide_managed_color_mfp_p77940_y3z62acolor_laserjet_managed_mfp_e785dn_5qk15acolor_laserjet_managed_flow_mfp_e87640_z8z13acolor_laserjet_managed_flow_mfp_e77825_x3a80acolor_laserjet_managed_mfp_e78630_5qj94acolor_laserjet_enterprise_m455_3pz95alaserjet_managed_mfp_e82540_x3a68alaserjet_managed_mfp_e72430_5cm69acolor_laserjet_managed_mfp_e78223-e78228_8gs13acolor_laserjet_managed_flow_mfp_e77825_z8z04acolor_laserjet_managed_flow_mfp_m577_b5l50alaserjet_enterprise_m406_3pz15alaserjet_managed_mfp_e73130_3sj02acolor_laserjet_managed_flow_mfp_e87660_x3a89acolor_laserjet_managed_flow_mfp_e78630_5qj94alaserjet_managed_mfp_e82540_x3a75alaserjet_managed_e60055_m0p36acolor_laserjet_enterprise_m856_t3u52acolor_laserjet_enterprise_flow_mfp_m681_j8a13apagewide_managed_color_mfp_p77940_5zp01acolor_laserjet_enterprise_mfp_m577_b5l47acolor_laserjet_managed_mfp_e87660_z8z15acolor_laserjet_managed_flow_mfp_e78625_3sj33acolor_laserjet_managed_flow_mfp_e78635_3sj33alaserjet_managed_e60175_3gy10alaserjet_managed_mfp_e73025_5qj87acolor_laserjet_managed_mfp_e786_3sj11acolor_laserjet_managed_flow_mfp_m577_b5l49acolor_laserjet_managed_mfp_e78330_8gs26acolor_laserjet_enterprise_mfp_5800_58r10alaserjet_managed_mfp_e73025_3sj04alaserjet_managed_mfp_e72430_5cm70alaserjet_managed_mfp_e72535_z8z09alaserjet_managed_mfp_e730_3sj04acolor_laserjet_managed_mfp_e78635_3sj12acolor_laserjet_managed_mfp_e67560_l3u69alaserjet_managed_flow_mfp_e73140_5qk02alaserjet_managed_mfp_e82540du_5rc83apagewide_managed_color_mfp_p77940_2gp22acolor_laserjet_managed_mfp_e78635_3sj34alaserjet_managed_flow_mfp_e826z_3sj28alaserjet_managed_e82650_3sj07alaserjet_managed_flow_mfp_e72535_x3a66acolor_laserjet_managed_mfp_e77822_z8z05acolor_laserjet_managed_mfp_e87760_5qk08alaserjet_managed_mfp_e73140_6bs58acolor_laserjet_managed_flow_e87750_3sj19acolor_laserjet_managed_mfp_e87640du-e87660du_5cm65alaserjet_enterprise_m610_7ps81alaserjet_managed_mfp_e72425_5rc89acolor_laserjet_managed_mfp_e77830_x3a84acolor_laserjet_managed_mfp_e877_5qk20acolor_laserjet_managed_mfp_e87760_3sj36acolor_laserjet_managed_mfp_e78630_3sj12acolor_laserjet_managed_mfp_e87660_x3a86apagewide_managed_color_flow_mfp_e77660z_j7z03alaserjet_managed_flow_mfp_e82550_x3a75alaserjet_managed_mfp_e82560du_5cm58acolor_laserjet_managed_mfp_e77822_z8z01acolor_laserjet_enterprise_m653_j8a04alaserjet_enterprise_mfp_m636_7pt00alaserjet_managed_flow_mfp_e72530_z8z09acolor_laserjet_enterprise_flow_mfp_m776_t3u55acolor_laserjet_managed_flow_mfp_e77825_z8z02acolor_laserjet_managed_mfp_e78330_8pe96alaserjet_managed_m506_f2a66acolor_laserjet_managed_mfp_e77825_x3a84acolor_laserjet_managed_mfp_e87640_z8z17alaserjet_managed_mfp_e73140_3sj02alaserjet_managed_mfp_e52645_1ps54alaserjet_managed_e82670_5qk09acolor_laserjet_managed_mfp_e78630_3sj34alaserjet_managed_e82660_3sj07alaserjet_managed_mfp_e72535_x3a66alaserjet_managed_mfp_e82560_x3a82alaserjet_managed_m506_f2a68acolor_laserjet_managed_mfp_e77422-e77428_5cm78acolor_laserjet_managed_mfp_e67550_l3u66acolor_laserjet_enterprise_mfp_m681_j8a11acolor_laserjet_managed_mfp_e786_3sj34acolor_laserjet_managed_mfp_e78323_8gs01alaserjet_managed_e82670_3sj07acolor_laserjet_managed_flow_e87750_5qk08acolor_laserjet_managed_mfp_e77822_x3a77acolor_laserjet_managed_mfp_e67650_3gy31alaserjet_managed_flow_e82650_3sj29alaserjet_managed_mfp_e72530_z8z09apagewide_managed_color_mfp_p77960_2gp22apagewide_managed_color_flow_mfp_e77650z_j7z05acolor_laserjet_managed_mfp_e87660_z8z16acolor_laserjet_enterprise_6700_49l00alaserjet_managed_mfp_e82540_z8z22apagewide_managed_color_mfp_p77960_y3z66apagewide_managed_color_mfp_e77650_j7z03alaserjet_managed_mfp_e731_6bs58alaserjet_managed_flow_mfp_e72525_z8z08acolor_laserjet_managed_flow_mfp_e67550_l3u69alaserjet_managed_flow_mfp_e82560_x3a74acolor_laserjet_managed_mfp_e77822_x3a84apagewide_managed_color_flow_mfp_e77660z_j7z14acolor_laserjet_managed_flow_e87740_3sj19alaserjet_managed_mfp_e731_6bs57alaserjet_enterprise_m609_k0q22alaserjet_managed_e60175_3gy09acolor_laserjet_managed_mfp_e78323_8gs30acolor_laserjet_managed_mfp_e57540_3gy25acolor_laserjet_managed_mfp_e67660_3gy31acolor_laserjet_managed_mfp_e77830_z8z01alaserjet_managed_flow_mfp_e62565_j8j79alaserjet_enterprise_m506_f2a66acolor_laserjet_managed_e65060_l3u56alaserjet_enterprise_m507_1pv88alaserjet_managed_mfp_e72525_x3a66acolor_laserjet_enterprise_mfp_m578_7zu88acolor_laserjet_enterprise_flow_mfp_6800_6qn37apagewide_managed_color_mfp_e77650_j7z08alaserjet_managed_flow_mfp_e62555_j8j74alaserjet_managed_mfp_e72530_x3a65alaserjet_managed_e82650_3sj09alaserjet_enterprise_mfp_m633_j8j78alaserjet_managed_mfp_e82550_az8z20alaserjet_managed_mfp_e82560du_5cm61acolor_laserjet_enterprise_5700_6qn28alaserjet_enterprise_mfp_m431_3pz56acolor_laserjet_managed_mfp_e67660_3gy32alaserjet_managed_e60055_m0p39alaserjet_enterprise_flow_mfp_m634_7ps94acolor_laserjet_managed_mfp_e78323_8gs27acolor_laserjet_managed_flow_e87760_3sj21acolor_laserjet_managed_mfp_e87760_5qk20alaserjet_managed_flow_mfp_e73130_3sj02alaserjet_managed_m506_f2a69acolor_laserjet_managed_mfp_e78635_3sj32alaserjet_managed_flow_mfp_e72535_z8z08alaserjet_managed_mfp_e82560_z8z22alaserjet_managed_mfp_e52545_3gy19acolor_laserjet_enterprise_mfp_6800_6qn36acolor_laserjet_managed_flow_mfp_e77825_z8z01acolor_laserjet_managed_flow_e87760_3sj35acolor_laserjet_managed_flow_mfp_e77825_x3a81acolor_laserjet_managed_flow_mfp_e87640_x3a90acolor_laserjet_managed_flow_mfp_e87640_z8z12alaserjet_managed_flow_mfp_e82540_x3a69acolor_laserjet_managed_flow_mfp_e78630_3sj34acolor_laserjet_managed_e65050_l3u57apagewide_managed_color_mfp_p77960_y3z62acolor_laserjet_enterprise_m553_b5l26alaserjet_managed_flow_mfp_e82540_x3a79alaserjet_managed_mfp_e72430_5rc89alaserjet_enterprise_mfp_m634_7ps94acolor_laserjet_managed_mfp_e78630_3sj33acolor_laserjet_managed_mfp_e87660_z8z14alaserjet_managed_mfp_e82560_x3a69acolor_laserjet_managed_flow_mfp_e786_5qj90apagewide_managed_color_mfp_p77950_y3z64acolor_laserjet_managed_mfp_e87740_5qk03acolor_laserjet_managed_mfp_e78625_5qk18acolor_laserjet_managed_flow_mfp_e67560_l3u70acolor_laserjet_managed_flow_mfp_e786_3sj12alaserjet_managed_flow_e82660_3sj08acolor_laserjet_managed_e75245_t3u64alaserjet_managed_flow_e82660_5qk09acolor_laserjet_enterprise_6700_6qn33alaserjet_managed_flow_mfp_e82550_z8z18acolor_laserjet_managed_flow_mfp_e87650_x3a86acolor_laserjet_managed_flow_mfp_e77830_x3a77alaserjet_enterprise_mfp_m634_7ps96alaserjet_managed_mfp_e82540du_5cm59acolor_laserjet_managed_mfp_e87760_3sj20alaserjet_managed_e82670_5qk13acolor_laserjet_managed_flow_mfp_e77825_z8z00acolor_laserjet_managed_mfp_e77825_z8z0acolor_laserjet_managed_mfp_e87650_z8z14acolor_laserjet_managed_flow_mfp_e786_5qk18alaserjet_managed_flow_mfp_m527z_f2a79acolor_laserjet_managed_mfp_e877_3sj36acolor_laserjet_enterprise_mfp_m682_j8a16alaserjet_managed_mfp_e731_5qk02acolor_laserjet_managed_flow_e87770_3sj35alaserjet_managed_flow_mfp_e62555_j8j73acolor_laserjet_managed_mfp_e78630_3sj11alaserjet_managed_e60065_m0p39alaserjet_managed_e60055_m0p33acolor_laserjet_managed_flow_mfp_e77822_z8z01alaserjet_managed_flow_mfp_e72525_x3a66alaserjet_managed_flow_mfp_e72535_z8z09acolor_laserjet_managed_flow_e87740_5qk20alaserjet_enterprise_mfp_m635_7ps99alaserjet_managed_flow_mfp_e82550_z8z22alaserjet_managed_flow_mfp_e72535_x3a65alaserjet_managed_mfp_e82540du_5rc84apagewide_managed_color_mfp_p77940_y3z63alaserjet_managed_flow_mfp_e72530_x3a62acolor_laserjet_managed_flow_mfp_e87650_z8z12alaserjet_managed_mfp_e73130_5qj98acolor_laserjet_managed_mfp_e77830_z8z02alaserjet_managed_flow_mfp_e731_3sj01acolor_laserjet_enterprise_flow_mfp_5800_6qn30alaserjet_managed_flow_mfp_e73140_6bs59alaserjet_enterprise_flow_mfp_m633_j8j76alaserjet_managed_mfp_e826dn_3sj08acolor_laserjet_managed_mfp_e87640_z8z13alaserjet_managed_flow_e82660_3sj28acolor_laserjet_managed_mfp_e78528_5qk15alaserjet_managed_e82650_3sj28acolor_laserjet_enterprise_m553_bl27acolor_laserjet_managed_mfp_e77825_x3a81apagewide_managed_color_mfp_p77950_y3z62acolor_laserjet_managed_flow_e87740_3sj37alaserjet_managed_mfp_e72525_z8z011acolor_laserjet_enterprise_flow_mfp_5800_58r10acolor_laserjet_managed_flow_mfp_e77830_x3a80apagewide_managed_color_mfp_p77960_y3z65acolor_laserjet_managed_flow_mfp_e87650_x3a92acolor_laserjet_managed_mfp_e77830_z8z00acolor_laserjet_managed_flow_mfp_e87640_x3a87acolor_laserjet_managed_mfp_e786_5qj94alaserjet_managed_flow_mfp_e82550_x3a69acolor_laserjet_managed_mfp_e78323_8gs26acolor_laserjet_managed_mfp_e87740_3sj36acolor_laserjet_managed_flow_mfp_e78635_5qj90acolor_laserjet_managed_flow_mfp_e87660_x3a86acolor_laserjet_managed_mfp_e786_3sj33acolor_laserjet_managed_mfp_e78330_8pe95acolor_laserjet_managed_mfp_e78630_5qk18apagewide_managed_color_flow_mfp_e77650z_j7z08alaserjet_enterprise_m407_3pz16apagewide_enterprise_color_flow_mfp_586z_g1w40acolor_laserjet_managed_flow_mfp_e87640_z8z14alaserjet_managed_flow_mfp_e73130_6bs59alaserjet_managed_flow_mfp_e73130_6bs57alaserjet_managed_e82670_3sj09acolor_laserjet_managed_e65150_3gy03acolor_laserjet_managed_mfp_e87760_3sj35alaserjet_managed_mfp_e82550_z8z23alaserjet_managed_mfp_e82540_z8z18acolor_laserjet_managed_mfp_e78330_9rt92acolor_laserjet_managed_flow_mfp_e77822_x3a78apagewide_managed_color_flow_mfp_e77650z_j7z14acolor_laserjet_managed_flow_e87770_3sj19apagewide_enterprise_color_556_g1w47acolor_laserjet_enterprise_mfp_m577_b5l54alaserjet_managed_flow_mfp_e72530_z8z07acolor_laserjet_enterprise_flow_mfp_m682_j8a17acolor_laserjet_managed_flow_mfp_e77825_x3a77alaserjet_managed_flow_mfp_e73140_6bs57acolor_laserjet_managed_mfp_e78223-e78228_8gs43alaserjet_managed_flow_mfp_e82560_z8z19laserjet_managed_mfp_e72525_z8z07acolor_laserjet_enterprise_6701_49l00acolor_laserjet_managed_mfp_e78223-e78228_8gs44alaserjet_managed_mfp_e73140_3sj01apagewide_color_755_4pz47apagewide_enterprise_color_mfp_780_j7z09acolor_laserjet_enterprise_flow_mfp_6800_6qn38acolor_laserjet_managed_mfp_e87740_3sj19acolor_laserjet_managed_flow_e87740_3sj21acolor_laserjet_managed_mfp_e78323_8gr96acolor_laserjet_managed_mfp_e87640du-e87660du_5fm81acolor_laserjet_managed_flow_mfp_e87640_x3a86apagewide_enterprise_color_flow_mfp_785_j7z12alaserjet_managed_mfp_e826dn_3sj30acolor_laserjet_managed_flow_e87740_5qk03apagewide_managed_color_e75160_j7z06alaserjet_managed_flow_e82670_3sj08acolor_laserjet_managed_mfp_e87740_5qk08acolor_laserjet_managed_mfp_e78330_8gr97alaserjet_managed_flow_mfp_e73135_6bs58afuturesmart_5laserjet_managed_mfp_e82540_az8z20alaserjet_managed_flow_e82660_3sj07apagewide_managed_color_mfp_p77950_y3z68acolor_laserjet_enterprise_m652_j7z99alaserjet_managed_e60065_m0p35alaserjet_managed_flow_mfp_e731_3sj02acolor_laserjet_managed_flow_e87760_5qk20apagewide_managed_color_flow_mfp_e58650z_l3u42acolor_laserjet_managed_mfp_e87640du-e87660du_5rc87alaserjet_managed_mfp_e62565_j8j79acolor_laserjet_managed_mfp_e87760_3sj19apagewide_managed_color_flow_mfp_e77660z_z5g79apagewide_managed_color_mfp_p77960_5zn99alaserjet_managed_flow_mfp_e72525_z8z010alaserjet_managed_flow_mfp_e73130_3sj01alaserjet_managed_e60165_3gy09acolor_laserjet_managed_mfp_e78223-e78228_17f27awcolor_laserjet_managed_mfp_e87770_3sj22alaserjet_managed_flow_mfp_e72525_z8z07alaserjet_managed_flow_mfp_e826z_5qk13alaserjet_managed_mfp_e82540_x3a79apagewide_managed_color_mfp_p77950_y3z65apagewide_managed_color_flow_mfp_e77650z_j7z03acolor_laserjet_managed_mfp_e785dn_5qj83acolor_laserjet_managed_mfp_e78323_8gr99acolor_laserjet_managed_mfp_e77825_x3a77acolor_laserjet_managed_mfp_e77830_x3a80alaserjet_managed_mfp_e72530_z8z06alaserjet_managed_flow_mfp_e82550_x3a72acolor_laserjet_managed_mfp_e87760_3sj38alaserjet_managed_flow_mfp_e731_6bs57alaserjet_managed_flow_mfp_e72535_z8z011alaserjet_managed_flow_mfp_e72530_z8z06alaserjet_managed_flow_e82660_5qk13apagewide_enterprise_color_556_g1w47vcolor_laserjet_managed_mfp_e87640_x3a86alaserjet_managed_mfp_e82550du_5rc83alaserjet_managed_mfp_e82560_x3a72acolor_laserjet_managed_mfp_e78330_9rt91acolor_laserjet_managed_e45028_3qa35acolor_laserjet_managed_flow_mfp_e77822_x3a80alaserjet_managed_e82660_5qk09acolor_laserjet_enterprise_mfp_6800_49k84acolor_laserjet_managed_mfp_e87640_x3a90acolor_laserjet_managed_flow_mfp_e786_3sj33apagewide_enterprise_color_flow_mfp_586z_g1w39alaserjet_managed_flow_mfp_e82560_x3a68acolor_laserjet_managed_mfp_e78528_5qj83alaserjet_managed_flow_mfp_e73140_5qj98acolor_laserjet_managed_flow_mfp_e78625_3sj34acolor_laserjet_managed_flow_mfp_e78630_3sj13acolor_laserjet_managed_flow_mfp_e78630_3sj11alaserjet_managed_e60175_3gy12apagewide_managed_color_p75250_y3z49apagewide_managed_color_mfp_p77960_y3z61alaserjet_managed_flow_e82650_3sj08apagewide_managed_color_mfp_e58650dn_l3u43alaserjet_enterprise_m608_k0q17alaserjet_enterprise_m506_f2a67acolor_laserjet_managed_flow_mfp_e78635_3sj34alaserjet_enterprise_flow_mfp_m527z_f2a81acolor_laserjet_managed_flow_mfp_e77822_z8z05alaserjet_managed_mfp_m527_f2a79acolor_laserjet_managed_mfp_e67560_l3u66acolor_laserjet_managed_mfp_e77822_x3a80alaserjet_enterprise_mfp_m528_1pv65alaserjet_managed_flow_e82670_3sj29acolor_laserjet_managed_flow_mfp_e87640_z8z15apagewide_color_mfp_779_4pz45apagewide_managed_color_mfp_p77950_y3z63acolor_laserjet_managed_mfp_e78223-e78228_8gs12alaserjet_managed_mfp_e82560_x3a75alaserjet_enterprise_m612_7ps86acolor_laserjet_managed_mfp_e47528_3qa75alaserjet_managed_mfp_e72430_5cm71alaserjet_managed_mfp_e73140_5qk02acolor_laserjet_managed_mfp_e77825_x3a83alaserjet_managed_mfp_e826dn_3sj28alaserjet_managed_mfp_e731_3sj00alaserjet_managed_mfp_e72430_5cm72acolor_laserjet_managed_mfp_e87770_5qk03acolor_laserjet_managed_mfp_e87760_5qk03alaserjet_managed_mfp_e62655_3gy14acolor_laserjet_managed_flow_mfp_e67550_l3u70acolor_laserjet_managed_flow_e87770_5qk08alaserjet_managed_mfp_e82550_x3a79alaserjet_managed_flow_mfp_e73140_3sj01alaserjet_managed_mfp_e72535_x3a63alaserjet_managed_flow_mfp_e52545c_3gy20acolor_laserjet_enterprise_mfp_6800_6qn37alaserjet_managed_flow_mfp_e62555_j8j80alaserjet_managed_flow_mfp_e72530_x3a66acolor_laserjet_managed_mfp_e78323_8gr95adigital_sender_flow_8500_fn2_l2762alaserjet_managed_mfp_e82560_z8z19scanjet_enterprise_flow_n9120_fn2_l2763alaserjet_managed_mfp_e73130_6bs58alaserjet_managed_flow_e82670_3sj30alaserjet_managed_flow_mfp_e73140_6bs58alaserjet_managed_mfp_e62655_3gy15apagewide_managed_color_mfp_p77950_2gp23apagewide_managed_color_mfp_p77940_y3z64alaserjet_managed_mfp_e82550du_5fm76apagewide_managed_color_mfp_e77650_j7z13acolor_laserjet_managed_flow_mfp_e77830_z8z05alaserjet_managed_mfp_e62555_j8j66alaserjet_managed_flow_e82650_3sj07alaserjet_managed_flow_mfp_e73130_5qk02acolor_laserjet_managed_flow_e87750_3sj37acolor_laserjet_managed_flow_mfp_e77822_z8z04apagewide_managed_color_mfp_p77940_2gp26alaserjet_enterprise_mfp_m430_3pz55acolor_laserjet_managed_mfp_e87760_3sj22alaserjet_enterprise_m609_k0q20acolor_laserjet_managed_flow_mfp_e87660_z8z14alaserjet_managed_mfp_e82560du_5rc83alaserjet_managed_mfp_e82550_x3a72acolor_laserjet_managed_flow_mfp_e87660_x3a90alaserjet_managed_mfp_e62555_j8j73alaserjet_managed_mfp_e62665_3gy14alaserjet_managed_e60165_3gy10acolor_laserjet_managed_mfp_e77822_z8z0acolor_laserjet_enterprise_mfp_m681_j8a12alaserjet_managed_e40040_3pz35apagewide_managed_color_mfp_p77940_y3z65acolor_laserjet_managed_flow_e87760_3sj19alaserjet_managed_flow_mfp_e82540_az8z20acolor_laserjet_managed_mfp_e87750_3sj22acolor_laserjet_managed_flow_mfp_e77822_x3a83alaserjet_managed_flow_mfp_e82540_x3a71alaserjet_managed_flow_mfp_e72525_z8z06acolor_laserjet_managed_mfp_e87740_3sj21alaserjet_managed_flow_mfp_e62575_j8j73acolor_laserjet_managed_flow_mfp_e78630_5qk18acolor_laserjet_managed_flow_mfp_e87650_x3a90acolor_laserjet_managed_mfp_e77822_z8z02apagewide_enterprise_color_mfp_586_g1w41alaserjet_managed_flow_e82650_3sj30alaserjet_enterprise_m506_f2a69alaserjet_managed_mfp_e82540_x3a71acolor_laserjet_managed_mfp_e87750_5qk03acolor_laserjet_managed_flow_e87770_3sj38alaserjet_managed_mfp_e82550_z8z19color_laserjet_managed_mfp_e78330_8gr96alaserjet_enterprise_flow_mfp_m633_j8j78alaserjet_managed_mfp_e826dn_3sj09acolor_laserjet_enterprise_mfp_6800_6qn35alaserjet_managed_e82660_3sj09alaserjet_managed_mfp_e73130_6bs57acolor_laserjet_managed_mfp_e67550_l3u69alaserjet_managed_mfp_e82560du_5fm76acolor_laserjet_enterprise_x55745_6qp97acolor_laserjet_enterprise_mfp_x57945_6qp98acolor_laserjet_managed_mfp_e877_5qk03alaserjet_managed_flow_mfp_e826z_3sj09alaserjet_managed_e50145_1pu52acolor_laserjet_managed_mfp_e78625_5qj94acolor_laserjet_managed_mfp_e786_3sj12alaserjet_managed_flow_mfp_e72525_z8z09acolor_laserjet_managed_mfp_e87740_3sj37acolor_laserjet_managed_mfp_e78223-e78228_8gs36alaserjet_managed_flow_mfp_e82540_z8z18alaserjet_enterprise_m612_7ps88acolor_laserjet_managed_m553_b5l24acolor_laserjet_managed_mfp_e87770_3sj19alaserjet_enterprise_m507_1pv86alaserjet_managed_mfp_e72425_5cm68acolor_laserjet_enterprise_m555_7zu81acolor_laserjet_managed_mfp_e877_3sj35acolor_laserjet_managed_mfp_e78223-e78228_8gs15acolor_laserjet_managed_mfp_e78635_5qj90acolor_laserjet_managed_mfp_m577_b5l49apagewide_managed_color_mfp_p77940_y3z66alaserjet_managed_mfp_e730_5qj87acolor_laserjet_managed_e65060_l3u55alaserjet_managed_mfp_e82550_x3a82apagewide_enterprise_color_flow_mfp_586z_g1w41acolor_laserjet_managed_mfp_e87650_x3a87apagewide_enterprise_color_556_g1w46vlaserjet_managed_flow_mfp_e82540_x3a68alaserjet_managed_m506_f2a70alaserjet_managed_mfp_e73025_3sj03acolor_laserjet_managed_mfp_e77830_x3a78acolor_laserjet_managed_flow_mfp_e87660_z8z12acolor_laserjet_managed_mfp_e87640_x3a87acolor_laserjet_enterprise_mfp_x57945_49k97avlaserjet_managed_mfp_e73030_3sj04acolor_laserjet_managed_mfp_e78330_8pe98acolor_laserjet_managed_mfp_e78625_3sj11alaserjet_managed_mfp_e73130_5qk02acolor_laserjet_managed_mfp_e78635_3sj33apagewide_managed_color_flow_mfp_e58650z_l3u43alaserjet_enterprise_m507_1pv89alaserjet_managed_flow_mfp_e62675_3gy14acolor_laserjet_managed_flow_mfp_e77825_z8z0alaserjet_managed_mfp_e82550du_5cm59alaserjet_managed_mfp_e82550du_5fm77alaserjet_managed_mfp_e82550_x3a71alaserjet_managed_flow_mfp_e731_3sj00alaserjet_managed_mfp_e72530_x3a66acolor_laserjet_managed_flow_mfp_e78625_3sj32acolor_laserjet_managed_mfp_e87660_z8z13apagewide_managed_color_mfp_p77960_2gp26acolor_laserjet_managed_flow_mfp_e77825_z8z05acolor_laserjet_managed_mfp_e87760_3sj21alaserjet_managed_mfp_e72425_5cm69alaserjet_enterprise_flow_mfp_m632_j8j71alaserjet_managed_mfp_e62555_j8j80acolor_laserjet_managed_mfp_e87640du-e87660du_5rc86acolor_laserjet_managed_e85055_t3u66acolor_laserjet_managed_mfp_e87770_3sj38alaserjet_enterprise_mfp_m632_j8j71acolor_laserjet_enterprise_m751_t3u43alaserjet_managed_flow_mfp_e826z_3sj07alaserjet_managed_flow_e82650_5qk13alaserjet_managed_flow_mfp_e826z_3sj30acolor_laserjet_managed_flow_mfp_e77822_z8z00acolor_laserjet_managed_flow_mfp_e78630_3sj32alaserjet_enterprise_mfp_m528_1pv66alaserjet_managed_flow_mfp_e52545c_3gy19alaserjet_managed_flow_mfp_e62575_j8j79alaserjet_managed_e60075_m0p36alaserjet_managed_flow_e82660_3sj29acolor_laserjet_managed_flow_e87770_3sj22apagewide_managed_color_mfp_p77440_y3z60acolor_laserjet_managed_mfp_e77825_z8z02apagewide_managed_color_mfp_p77960_2gp23acolor_laserjet_managed_flow_e87750_3sj21alaserjet_managed_mfp_e73140_6bs59acolor_laserjet_managed_e65160_3gy03alaserjet_managed_mfp_e73135_5qk02acolor_laserjet_managed_mfp_e87770_3sj37acolor_laserjet_managed_flow_mfp_e87660_x3a92acolor_laserjet_managed_mfp_e78223-e78228_19gsawlaserjet_managed_flow_mfp_e72535_x3a59alaserjet_managed_flow_mfp_e82560_x3a75acolor_laserjet_enterprise_mfp_m776_t3u55alaserjet_managed_flow_mfp_e82550_x3a74acolor_laserjet_enterprise_flow_mfp_x57945_6qp98acolor_laserjet_managed_mfp_e87640du-e87660du_5fm82acolor_laserjet_enterprise_6701_6qn33acolor_laserjet_enterprise_mfp_5800_6qn30acolor_laserjet_enterprise_flow_mfp_6800_6qn36acolor_laserjet_managed_mfp_e877_5qk08alaserjet_managed_flow_mfp_e73135_3sj02acolor_laserjet_managed_mfp_e77830_x3a77alaserjet_managed_flow_mfp_e73135_5qk02alaserjet_managed_mfp_e62565_j8j73apagewide_managed_color_mfp_p77950_2gp26acolor_laserjet_enterprise_flow_mfp_m577_b5l46alaserjet_managed_mfp_e52545_3gy20alaserjet_managed_e82660_3sj28alaserjet_managed_mfp_e731_5qj98apagewide_managed_color_mfp_p77940_y3z61alaserjet_managed_e82650_5qk09alaserjet_managed_mfp_e62565_j8j80alaserjet_managed_e82660_3sj08acolor_laserjet_managed_flow_mfp_e78635_5qj94acolor_laserjet_managed_mfp_e87750_3sj35acolor_laserjet_managed_mfp_e87750_3sj37acolor_laserjet_managed_flow_e87770_3sj37acolor_laserjet_managed_mfp_e78635_3sj11alaserjet_enterprise_mfp_m527_f2a77alaserjet_managed_flow_e82650_5qk09acolor_laserjet_managed_mfp_e87650_x3a86alaserjet_enterprise_mfp_m635_7ps97alaserjet_managed_mfp_e826dn_5qk09acolor_laserjet_managed_flow_mfp_e87650_z8z15acolor_laserjet_managed_mfp_e87750_5qk08apagewide_managed_color_mfp_p77940_5zn98acolor_laserjet_enterprise_5700_49k98alaserjet_enterprise_flow_mfp_m636_7pt01alaserjet_managed_mfp_e82560du_5fm77alaserjet_managed_flow_e82670_5qk09alaserjet_managed_flow_mfp_e72535_x3a62alaserjet_enterprise_m611_7ps85acolor_laserjet_enterprise_6701_58m42alaserjet_enterprise_mfp_m527_f2a78acolor_laserjet_managed_mfp_e78323_8pe98alaserjet_managed_flow_mfp_e731_5qk02alaserjet_managed_mfp_e72535_z8z010alaserjet_managed_flow_mfp_e72530_x3a59apagewide_managed_color_mfp_p77950_5zn99apagewide_managed_color_mfp_p77960_5zp01acolor_laserjet_managed_mfp_e67560_l3u67alaserjet_managed_flow_mfp_e82560_az8z20acolor_laserjet_managed_flow_mfp_e78630_3sj33acolor_laserjet_managed_mfp_e87640du-e87660du_5cm64alaserjet_enterprise_flow_mfp_m632_j8j70alaserjet_managed_flow_e82660_3sj30alaserjet_managed_mfp_e62655_3gy18alaserjet_managed_mfp_e72530_z8z011apagewide_managed_color_mfp_p77940_2gp25acolor_laserjet_managed_mfp_e786_5qk18acolor_laserjet_managed_mfp_e87770_3sj35apagewide_enterprise_color_mfp_586_g1w40alaserjet_managed_mfp_e82560_z8z18acolor_laserjet_enterprise_mfp_m480_3qa55acolor_laserjet_managed_flow_mfp_e87660_z8z13acolor_laserjet_enterprise_flow_mfp_6800_49k84acolor_laserjet_managed_m553_b5l38alaserjet_managed_mfp_e72525_x3a62alaserjet_managed_e82660_3sj30alaserjet_managed_mfp_e52645_1ps55acolor_laserjet_managed_mfp_e78630_3sj32acolor_laserjet_managed_mfp_e87650_z8z15acolor_laserjet_managed_mfp_e77830_z8z0alaserjet_managed_mfp_e82550_x3a74acolor_laserjet_managed_mfp_e87640du-e87660du_5cm63acolor_laserjet_managed_mfp_e877_3sj38alaserjet_managed_flow_mfp_e62565_j8j74alaserjet_managed_flow_mfp_e72530_x3a65acolor_laserjet_enterprise_m554_7zu79acolor_laserjet_enterprise_m555_7zu79acolor_laserjet_enterprise_mfp_m578_7zu87alaserjet_managed_flow_mfp_e72535_z8z07alaserjet_managed_flow_mfp_m527z_f2a80alaserjet_managed_mfp_e72425_5rc90alaserjet_enterprise_flow_mfp_m635_7ps98acolor_laserjet_enterprise_m553_b5l38alaserjet_managed_flow_mfp_e73130_6bs58alaserjet_enterprise_mfp_m635_7ps98apagewide_managed_color_mfp_e77650_j7z14acolor_laserjet_managed_mfp_e77822_x3a78alaserjet_managed_flow_mfp_e62555_j8j66acolor_laserjet_managed_mfp_e87650_z8z13alaserjet_managed_mfp_e62565_j8j66alaserjet_managed_mfp_e73130_3sj00alaserjet_managed_mfp_e82540_x3a74alaserjet_managed_e82670_3sj30apagewide_managed_color_flow_mfp_e77650z_j7z07acolor_laserjet_managed_flow_mfp_e77825_x3a84alaserjet_enterprise_mfp_m528_1pv64acolor_laserjet_managed_flow_mfp_e87640_x3a92acolor_laserjet_managed_mfp_e78330_8gs01acolor_laserjet_managed_flow_e87740_3sj20acolor_laserjet_managed_mfp_e77830_z8z04alaserjet_managed_mfp_e82540du_5fm76alaserjet_managed_mfp_e72535_x3a65acolor_laserjet_enterprise_m652_j7z98acolor_laserjet_managed_mfp_e87660_x3a92acolor_laserjet_managed_flow_e87750_3sj38acolor_laserjet_managed_m553_b5l26alaserjet_managed_mfp_e731_6bs59acolor_laserjet_managed_flow_e87740_5qk08alaserjet_managed_e82650_3sj29acolor_laserjet_managed_mfp_e87770_3sj20acolor_laserjet_managed_flow_e87750_3sj35acolor_laserjet_managed_e65150_3gy04alaserjet_managed_flow_mfp_e62575_j8j80alaserjet_managed_mfp_e72530_z8z07acolor_laserjet_managed_mfp_e87770_5qk08alaserjet_managed_flow_mfp_e73135_6bs57acolor_laserjet_managed_flow_mfp_e77822_x3a77alaserjet_managed_mfp_e62665_3gy18acolor_laserjet_managed_flow_mfp_e786_3sj34acolor_laserjet_managed_mfp_e87740_5qk20alaserjet_enterprise_mfp_m528_1pv67apagewide_managed_color_flow_mfp_e77660z_j7z13alaserjet_managed_m506_f2a67acolor_laserjet_managed_mfp_e87660_z8z12acolor_laserjet_managed_mfp_e78330_8gr95acolor_laserjet_enterprise_m554_7zu78acolor_laserjet_managed_mfp_e87750_3sj20acolor_laserjet_managed_mfp_e87640_z8z15alaserjet_managed_mfp_e82550_z8z18acolor_laserjet_enterprise_m553_b5l39acolor_laserjet_managed_mfp_e77825_z8z05alaserjet_managed_mfp_e82560du_5cm59acolor_laserjet_managed_flow_mfp_e57540_3gy25alaserjet_managed_flow_mfp_e72525_z8z011alaserjet_managed_flow_mfp_e72530_z8z08acolor_laserjet_enterprise_m553_b5l24acolor_laserjet_managed_flow_mfp_e78630_5qj90alaserjet_managed_flow_mfp_e82550_z8z19laserjet_managed_e60065_m0p33alaserjet_managed_flow_mfp_e82560_x3a72acolor_laserjet_managed_mfp_e87660_x3a89alaserjet_managed_mfp_e73135_6bs59acolor_laserjet_enterprise_flow_mfp_m681_j8a11acolor_laserjet_enterprise_6700_58m42acolor_laserjet_managed_mfp_e87740_3sj20acolor_laserjet_managed_mfp_e87640_x3a93aCertain HP Enterprise LaserJet, LaserJet Managed printers
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-44212
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.34% / 56.38%
||
7 Day CHG~0.00%
Published-28 Mar, 2022 | 01:03
Updated-04 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OX App Suite through 7.10.5 allows XSS via a trailing control character such as the SCRIPT\t substring.

Action-Not Available
Vendor-n/aOpen-Xchange AG
Product-ox_app_suiten/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43696
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 44.73%
||
7 Day CHG~0.00%
Published-29 Nov, 2021 | 12:52
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

twmap v2.91_v4.33 is affected by a Cross Site Scripting (XSS) vulnerability. In file list.php, the exit function will terminate the script and print the message to the user. The message will contain $_REQUEST then there is a XSS vulnerability.

Action-Not Available
Vendor-twmap_projectn/a
Product-twmapn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-68936
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 1.37%
||
7 Day CHG~0.00%
Published-25 Dec, 2025 | 20:07
Updated-02 Jan, 2026 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ONLYOFFICE Docs before 9.2.1 allows XSS via the Color theme name. This is related to DocumentServer.

Action-Not Available
Vendor-onlyofficeONLYOFFICE
Product-document_serverDocument Server
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5084
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-3.9||LOW
EPSS-0.08% / 23.32%
||
7 Day CHG~0.00%
Published-20 Sep, 2023 | 09:49
Updated-03 Dec, 2024 | 14:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-site Scripting (XSS) - Reflected in hestiacp/hestiacp

Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.8.8.

Action-Not Available
Vendor-hestiacphestiacp
Product-hestiacphestiacp/hestiacp
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-51300
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.17% / 38.18%
||
7 Day CHG~0.00%
Published-19 Feb, 2025 | 00:00
Updated-04 Nov, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHPJabbers Hotel Booking System v4.0 is vulnerable to Cross-Site Scripting (XSS) vulnerabilities in the "name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key" parameters.

Action-Not Available
Vendor-n/aPHPJabbers Ltd.
Product-hotel_booking_systemn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-29304
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.23% / 78.95%
||
7 Day CHG~0.00%
Published-14 Dec, 2020 | 19:48
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (XSS) vulnerability exists in the SabaiApps WordPress Directories Pro plugin version 1.3.45 and previous, allows attackers who have convinced a site administrator to import a specially crafted CSV file to inject arbitrary web script or HTML as the victim is proceeding through the file import workflow.

Action-Not Available
Vendor-directoriespron/a
Product-directories_pron/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-69098
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 9.80%
||
7 Day CHG~0.00%
Published-22 Jan, 2026 | 16:52
Updated-26 Jan, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Hide My WP plugin <= 6.2.12 - Reflected Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpWave Hide My WP hide_my_wp allows Reflected XSS.This issue affects Hide My WP: from n/a through <= 6.2.12.

Action-Not Available
Vendor-wpWave
Product-Hide My WP
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-25256
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.75% / 72.77%
||
7 Day CHG~0.00%
Published-19 Feb, 2022 | 00:17
Updated-03 Aug, 2024 | 04:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.

Action-Not Available
Vendor-sasn/aHewlett Packard Enterprise (HPE)Oracle CorporationMicrosoft CorporationIBM CorporationLinux Kernel Organization, Inc
Product-hp-ux_ipfiltersolarislinux_kernelwindowsweb_report_studioaixn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43558
Matching Score-4
Assigner-Fedora Project
ShareView Details
Matching Score-4
Assigner-Fedora Project
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.64%
||
7 Day CHG-0.12%
Published-22 Nov, 2021 | 15:59
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A URL parameter in the filetype site administrator tool required extra sanitizing to prevent a reflected XSS risk.

Action-Not Available
Vendor-n/aMoodle Pty LtdFedora Project
Product-extra_packages_for_enterprise_linuxfedoramoodlemoodle
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43692
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.00%
||
7 Day CHG~0.00%
Published-29 Nov, 2021 | 14:27
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

youtube-php-mirroring (last update Jun 9, 2017) is affected by a Cross Site Scripting (XSS) vulnerability in file ytproxy/index.php.

Action-Not Available
Vendor-youtube-php-mirroring_projectn/a
Product-youtube-php-mirroringn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-68892
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 9.80%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 09:17
Updated-20 Jan, 2026 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Scroll rss excerpt plugin <= 5.0 - Reflected Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gopiplus@hotmail.com Scroll rss excerpt scroll-rss-excerpt allows Reflected XSS.This issue affects Scroll rss excerpt: from n/a through <= 5.0.

Action-Not Available
Vendor-gopiplus@hotmail.com
Product-Scroll rss excerpt
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2010-5338
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.21% / 43.36%
||
7 Day CHG~0.00%
Published-11 Oct, 2019 | 10:35
Updated-07 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IceWarp Webclient before 10.2.1 has XSS via an HTTP POST request: webmail/basic/ with the parameter _dlg[captcha][action] is non-persistent in 10.1.3 and 10.2.0.

Action-Not Available
Vendor-icewarpn/a
Product-webclientn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-44178
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-5.4||MEDIUM
EPSS-2.82% / 85.90%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 20:27
Updated-16 Sep, 2024 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Adobe Experience Manager Reflected XSS in /bin/wcm/contentfinder/page/view.html

AEM's Cloud Service offering, as well as version 6.5.10.0 (and below) are affected by a reflected Cross-Site Scripting (XSS) vulnerability via the itemResourceType parameter. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser

Action-Not Available
Vendor-Adobe Inc.
Product-experience_manager_cloud_serviceexperience_managerExperience Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-69268
Matching Score-4
Assigner-CA Technologies - A Broadcom Company
ShareView Details
Matching Score-4
Assigner-CA Technologies - A Broadcom Company
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 10.10%
||
7 Day CHG~0.00%
Published-12 Jan, 2026 | 03:59
Updated-14 Jan, 2026 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Spectrum reflected XSS

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Reflected XSS.This issue affects DX NetOps Spectrum: 24.3.8 and earlier.

Action-Not Available
Vendor-Microsoft CorporationLinux Kernel Organization, IncBroadcom Inc.
Product-linux_kernelwindowsdx_netops_spectrumDX NetOps Spectrum
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43776
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.4||HIGH
EPSS-0.31% / 53.87%
||
7 Day CHG~0.00%
Published-26 Nov, 2021 | 18:15
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS vulnerability in @backstage/plugin-auth-backend

Backstage is an open platform for building developer portals. In affected versions the auth-backend plugin allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other secrets from the user's browser. The default CSP does prevent this attack, but it is expected that some deployments have these policies disabled due to incompatibilities. This is vulnerability is patched in version `0.4.9` of `@backstage/plugin-auth-backend`.

Action-Not Available
Vendor-backstageThe Linux Foundation
Product-auth_backendbackstage
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-44209
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.21% / 43.43%
||
7 Day CHG~0.00%
Published-28 Mar, 2022 | 00:57
Updated-04 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OX App Suite through 7.10.5 allows XSS via an HTML 5 element such as AUDIO.

Action-Not Available
Vendor-n/aOpen-Xchange AG
Product-ox_app_suiten/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4363
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.77% / 73.28%
||
7 Day CHG~0.00%
Published-07 Jun, 2023 | 01:51
Updated-20 Dec, 2024 | 23:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 5.5 due to insufficient input sanitization and output escaping on the 'save_content_front' function that uses print_r on the user-supplied $_REQUEST values . This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-webdevoceanlabibahmed42
Product-wp_quick_frontend_editorWP Quick FrontEnd Editor – WordPress Plugin
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4358
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-7.2||HIGH
EPSS-0.80% / 73.84%
||
7 Day CHG~0.00%
Published-07 Jun, 2023 | 01:51
Updated-05 Feb, 2025 | 19:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an unknown parameter in versions up to, and including, 3.1.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-legalweblegalweb
Product-wp_dsgvo_toolsWP DSGVO Tools (GDPR)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43942
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-6.1||MEDIUM
EPSS-3.08% / 86.52%
||
7 Day CHG~0.00%
Published-04 Jan, 2022 | 02:40
Updated-08 Oct, 2024 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Reflected Cross-Site Scripting (XSS) vulnerability in the /rest/collectors/1.0/template/custom endpoint. To exploit this issue, the attacker must trick a user into visiting a malicious website. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3.

Action-Not Available
Vendor-Atlassian
Product-jira_serverjira_server_and_data_centerJira ServerJira Data Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43690
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 44.73%
||
7 Day CHG~0.00%
Published-01 Dec, 2021 | 12:27
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

YurunProxy v0.01 is affected by a Cross Site Scripting (XSS) vulnerability in src/Client.php. The exit function will terminate the script and print a message which have values from the socket_read.

Action-Not Available
Vendor-yurunproxy_projectn/a
Product-yurunproxyn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-44196
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-6.1||MEDIUM
EPSS-0.46% / 63.95%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 13:07
Updated-04 Mar, 2025 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS in UBIT Information Technologies Student Information Management System

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in UBIT Information Technologies Student Information Management System.This issue affects Student Information Management System: before 20211126.

Action-Not Available
Vendor-ubitUBIT Information Technologies
Product-student_information_management_systemStudent Information Management System
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43683
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 47.74%
||
7 Day CHG~0.00%
Published-02 Dec, 2021 | 12:36
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

pictshare v1.5 is affected by a Cross Site Scripting (XSS) vulnerability in api/info.php. The exit function will terminate the script and print the message which has $_REQUEST['hash'].

Action-Not Available
Vendor-haschekn/a
Product-pictsharen/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43785
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.6||HIGH
EPSS-0.40% / 60.14%
||
7 Day CHG~0.00%
Published-26 Nov, 2021 | 18:20
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross Site Scripting Vulnerability in @joeattardi/emoji-button

@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code.

Action-Not Available
Vendor-emoji_button_projectjoeattardi
Product-emoji_buttonemoji-button
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-44053
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.42% / 61.66%
||
7 Day CHG~0.00%
Published-05 May, 2022 | 16:50
Updated-16 Sep, 2024 | 19:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected XSS

A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running QTS, QuTS hero and QuTScloud. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of QTS, QuTS hero and QuTScloud: QTS 4.5.4.1991 build 20220329 and later QTS 5.0.0.1986 build 20220324 and later QuTS hero h5.0.0.1986 build 20220324 and later QuTS hero h4.5.4.1971 build 20220310 and later QuTScloud c5.0.1.1949 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-quts_heroqutscloudqtsQuTScloudQuTS heroQTS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-67025
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.02% / 5.16%
||
7 Day CHG~0.00%
Published-15 Jan, 2026 | 00:00
Updated-30 Jan, 2026 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross Site Scripting vulnerability in Anycomment anycomment.io 0.4.4 allows a remote attacker to execute arbitrary code via the Anycomment comment section

Action-Not Available
Vendor-anycommentn/a
Product-anycomment.ion/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-68115
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.15%
||
7 Day CHG~0.00%
Published-16 Dec, 2025 | 00:56
Updated-02 Jan, 2026 | 16:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Parse Server vulnerable to Cross-Site Scripting (XSS) via Unescaped Mustache Template Variables

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 8.6.1 and 9.1.0-alpha.3, a Reflected Cross-Site Scripting (XSS) vulnerability exists in Parse Server's password reset and email verification HTML pages. The patch, available in versions 8.6.1 and 9.1.0-alpha.3, escapes user controlled values that are inserted into the HTML pages. No known workarounds are available.

Action-Not Available
Vendor-parseplatformparse-community
Product-parse-serverparse-server
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-67918
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 9.80%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 09:17
Updated-20 Jan, 2026 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Woffice theme <= 5.4.30 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WofficeIO Woffice woffice allows Reflected XSS.This issue affects Woffice: from n/a through <= 5.4.30.

Action-Not Available
Vendor-WofficeIO
Product-Woffice
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-68268
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-5.4||MEDIUM
EPSS-0.12% / 31.85%
||
7 Day CHG~0.00%
Published-16 Dec, 2025 | 15:27
Updated-18 Dec, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2025.11.1 reflected XSS was possible on the storage settings page

Action-Not Available
Vendor-JetBrains s.r.o.
Product-teamcityTeamCity
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-67349
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.02% / 4.85%
||
7 Day CHG~0.00%
Published-26 Dec, 2025 | 00:00
Updated-31 Dec, 2025 | 21:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (XSS) vulnerability was identified in FluentCMS 1.2.3. After logging in as an admin and navigating to the "Add Page" function, the application fails to properly sanitize input in the <head> section, allowing remote attackers to inject arbitrary script tags.

Action-Not Available
Vendor-fluentcmsn/a
Product-fluentcmsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-22029
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8||HIGH
EPSS-0.01% / 3.13%
||
7 Day CHG~0.00%
Published-10 Jan, 2026 | 02:42
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
React Router vulnerable to XSS via Open Redirects

React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode (<BrowserRouter>) is being used. This issue has been patched in @remix-run/router version 1.23.2 and react-router version 7.12.0.

Action-Not Available
Vendor-shopifyremix-run
Product-react-routerremix-run\/reactreact-router
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-66924
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.07% / 20.43%
||
7 Day CHG+0.01%
Published-17 Dec, 2025 | 00:00
Updated-18 Dec, 2025 | 19:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Cross-site scripting (XSS) vulnerability in Create/Update Item Kit(s) in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the "name" parameter.

Action-Not Available
Vendor-opensourceposn/a
Product-open_source_point_of_salen/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43686
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 44.73%
||
7 Day CHG~0.00%
Published-02 Dec, 2021 | 12:17
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

nZEDb v0.4.20 is affected by a Cross Site Scripting (XSS) vulnerability in www/pages/api.php. The exit function will terminate the script and print the message which has the input $_GET['t'].

Action-Not Available
Vendor-nzedb_projectn/a
Product-nzedbn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-66648
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.2||HIGH
EPSS-0.04% / 13.87%
||
7 Day CHG~0.00%
Published-05 Jan, 2026 | 21:33
Updated-05 Feb, 2026 | 21:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
`vega-functions` vulnerable to Cross-site Scripting via `setdata` function

vega-functions provides function implementations for the Vega expression language. Prior to version 6.1.1, for sites that allow users to supply untrusted user input, malicious use of an internal function (not part of the public API) could be used to run unintentional javascript (XSS). This issue is fixed in vega-functions `6.1.1`. There is no workaround besides upgrading. Using `vega.expressionInterpreter` as described in CSP safe mode does not prevent this issue.

Action-Not Available
Vendor-vega-functions_projectvega
Product-vega-functionsvega
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-50808
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.53% / 66.81%
||
7 Day CHG~0.00%
Published-13 Feb, 2024 | 00:00
Updated-17 Oct, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zimbra Collaboration before Kepler 9.0.0 Patch 38 GA allows DOM-based JavaScript injection in the Modern UI.

Action-Not Available
Vendor-n/aZimbraSynacor, Inc.
Product-collaborationn/azimbra_collaboration_suite
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43543
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.61% / 69.37%
||
7 Day CHG~0.00%
Published-08 Dec, 2021 | 21:19
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Action-Not Available
Vendor-Debian GNU/LinuxMozilla Corporation
Product-firefoxthunderbirddebian_linuxfirefox_esrThunderbirdFirefox ESRFirefox
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-66845
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 12.97%
||
7 Day CHG~0.00%
Published-23 Dec, 2025 | 00:00
Updated-05 Jan, 2026 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A reflected Cross-Site Scripting (XSS) vulnerability has been identified in TechStore version 1.0. The user_name endpoint reflects the id query parameter directly into the HTML response without output encoding or sanitization, allowing execution of arbitrary JavaScript code in a victim’s browser.

Action-Not Available
Vendor-nooncarlettn/a
Product-techstoren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-67930
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 9.80%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 09:17
Updated-20 Jan, 2026 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress eHive Search plugin <= 2.5.0 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vernon Systems Limited eHive Search ehive-search allows Reflected XSS.This issue affects eHive Search: from n/a through <= 2.5.0.

Action-Not Available
Vendor-Vernon Systems Limited
Product-eHive Search
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43197
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 0.56%
||
7 Day CHG~0.00%
Published-09 Nov, 2021 | 14:47
Updated-04 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2021.1.2, email notifications could include unescaped HTML for XSS.

Action-Not Available
Vendor-n/aJetBrains s.r.o.
Product-teamcityn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-67710
Matching Score-4
Assigner-Environmental Systems Research Institute, Inc.
ShareView Details
Matching Score-4
Assigner-Environmental Systems Research Institute, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.05% / 14.47%
||
7 Day CHG~0.00%
Published-31 Dec, 2025 | 22:18
Updated-06 Jan, 2026 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stored XSS vulnerability in ArcGIS Server

There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.

Action-Not Available
Vendor-Microsoft CorporationLinux Kernel Organization, IncEnvironmental Systems Research Institute, Inc. ("Esri")
Product-linux_kernelwindowsarcgis_serverArcGIS Server
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4325
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.32% / 54.36%
||
7 Day CHG+0.21%
Published-22 Feb, 2023 | 00:00
Updated-12 Mar, 2025 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NHN TOAST UI Chart Legend cross site scripting

A vulnerability, which was classified as problematic, has been found in NHN TOAST UI Chart 4.1.4. This issue affects some unknown processing of the component Legend Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 4.2.0 is able to address this issue. The identifier of the patch is 1a3f455d17df379e11b501bb5ba1dd1bcc41d63e. It is recommended to upgrade the affected component. The identifier VDB-221501 was assigned to this vulnerability.

Action-Not Available
Vendor-nhncloudNHN
Product-toast_ui_chartTOAST UI Chart
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-44217
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.74% / 72.64%
||
7 Day CHG~0.00%
Published-18 Jan, 2022 | 15:00
Updated-04 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API.

Action-Not Available
Vendor-n/aEricsson
Product-codecheckern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • ...
  • 13
  • 14
  • 15
  • ...
  • 199
  • 200
  • Next
Details not found