Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-5082

Summary
Assigner-Wordfence
Assigner Org ID-b15e7b5b-3da4-40ae-a43c-f7aa60e62599
Published At-28 May, 2025 | 07:23
Updated At-28 May, 2025 | 14:37
Rejected At-
Credits

WP Attachments <= 5.0.12 - Reflected Cross-Site Scripting via attachment_id Parameter

The WP Attachments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘attachment_id’ parameter in all versions up to, and including, 5.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Wordfence
Assigner Org ID:b15e7b5b-3da4-40ae-a43c-f7aa60e62599
Published At:28 May, 2025 | 07:23
Updated At:28 May, 2025 | 14:37
Rejected At:
▼CVE Numbering Authority (CNA)
WP Attachments <= 5.0.12 - Reflected Cross-Site Scripting via attachment_id Parameter

The WP Attachments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘attachment_id’ parameter in all versions up to, and including, 5.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Affected Products
Vendor
milmor
Product
WP Attachments
Default Status
unaffected
Versions
Affected
  • From * through 5.0.12 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-79CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: CWE
CWE ID: CWE-79
Description: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Antonio Francesco Sardella
Timeline
EventDate
Disclosed2025-05-27 19:16:07
Event: Disclosed
Date: 2025-05-27 19:16:07
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.wordfence.com/threat-intel/vulnerabilities/id/bdc33ecc-da54-4852-8426-bfafe0dca41b?source=cve
N/A
https://wordpress.org/plugins/wp-attachments/#developers
N/A
https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/html/attachmentEditIframe.php
N/A
https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/ij-post-attachments.php#L274
N/A
https://plugins.trac.wordpress.org/changeset/3300269/
N/A
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/bdc33ecc-da54-4852-8426-bfafe0dca41b?source=cve
Resource: N/A
Hyperlink: https://wordpress.org/plugins/wp-attachments/#developers
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/html/attachmentEditIframe.php
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/ij-post-attachments.php#L274
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/changeset/3300269/
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@wordfence.com
Published At:28 May, 2025 | 08:15
Updated At:28 May, 2025 | 15:01

The WP Attachments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘attachment_id’ parameter in all versions up to, and including, 5.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-79Primarysecurity@wordfence.com
CWE ID: CWE-79
Type: Primary
Source: security@wordfence.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/html/attachmentEditIframe.phpsecurity@wordfence.com
N/A
https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/ij-post-attachments.php#L274security@wordfence.com
N/A
https://plugins.trac.wordpress.org/changeset/3300269/security@wordfence.com
N/A
https://wordpress.org/plugins/wp-attachments/#developerssecurity@wordfence.com
N/A
https://www.wordfence.com/threat-intel/vulnerabilities/id/bdc33ecc-da54-4852-8426-bfafe0dca41b?source=cvesecurity@wordfence.com
N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/html/attachmentEditIframe.php
Source: security@wordfence.com
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/ij-post-attachments.php#L274
Source: security@wordfence.com
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/changeset/3300269/
Source: security@wordfence.com
Resource: N/A
Hyperlink: https://wordpress.org/plugins/wp-attachments/#developers
Source: security@wordfence.com
Resource: N/A
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/bdc33ecc-da54-4852-8426-bfafe0dca41b?source=cve
Source: security@wordfence.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

9962Records found

CVE-2021-42970
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.04%
||
7 Day CHG~0.00%
Published-29 Mar, 2022 | 17:19
Updated-04 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross Site Scripting (XSS) vulnerability exists in cxuucms v3 via the imgurl of /feedback/post/ content parameter.

Action-Not Available
Vendor-cxuun/a
Product-cxuucmsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42134
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.04%
||
7 Day CHG~0.00%
Published-11 Oct, 2021 | 00:55
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053.

Action-Not Available
Vendor-django-unicornn/a
Product-unicornn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-41924
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.04%
||
7 Day CHG~0.00%
Published-21 Jun, 2022 | 14:18
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Webkul krayin crm before 1.2.2 is vulnerable to Cross Site Scripting (XSS).

Action-Not Available
Vendor-n/aWebkul Software Pvt. Ltd.
Product-krayinn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43062
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-6.1||MEDIUM
EPSS-50.21% / 97.76%
||
7 Day CHG~0.00%
Published-02 Feb, 2022 | 11:08
Updated-22 Oct, 2024 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiMail version 7.0.1 and 7.0.0, version 6.4.5 and below, version 6.3.7 and below, version 6.0.11 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the FortiGuard URI protection service.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortimailFortinet FortiMail
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-5728
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.32%
||
7 Day CHG~0.00%
Published-17 Apr, 2020 | 18:29
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenMRS 2.9 and prior copies "Referrer" header values into an html element named "redirectUrl" within many webpages (such as login.htm). There is insufficient validation for this parameter, which allows for the possibility of cross-site scripting.

Action-Not Available
Vendor-openmrsn/a
Product-openmrsOpenMRS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-20
Improper Input Validation
CVE-2021-42856
Matching Score-4
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Matching Score-4
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-4.7||MEDIUM
EPSS-0.20% / 42.24%
||
7 Day CHG~0.00%
Published-09 Mar, 2022 | 16:51
Updated-17 Sep, 2024 | 04:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross-site Scripting at DsaDataTest

It was discovered that the /DsaDataTest endpoint is susceptible to Cross-site scripting (XSS) attack. It was noted that the Metric parameter does not have any input checks on the user input that allows an attacker to craft its own malicious payload to trigger a XSS vulnerability.

Action-Not Available
Vendor-riverbedAternity
Product-steelcentral_appinternals_dynamic_sampling_agentSteelCentral AppInternals Dynamic Sampling Agent
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42703
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-5.4||MEDIUM
EPSS-0.17% / 37.60%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 14:03
Updated-17 Sep, 2024 | 00:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AzeoTech DAQFactory

This vulnerability could allow an attacker to send malicious Javascript code resulting in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage, and performing unintended browser action.

Action-Not Available
Vendor-Advantech (Advantech Co., Ltd.)
Product-webaccess_hmi_designerHMI Designer
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4269
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.27% / 50.34%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SimpleRisk common.js checkAndSetValidation cross site scripting

A vulnerability has been found in SimpleRisk and classified as problematic. This vulnerability affects the function checkAndSetValidation of the file simplerisk/js/common.js. The manipulation of the argument title leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 20220306-001 is able to address this issue. The name of the patch is 591405b4ed160fbefc1dca1e55c5745079a7bb48. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216472.

Action-Not Available
Vendor-simpleriskunspecified
Product-simpleriskSimpleRisk
CWE ID-CWE-707
Improper Neutralization
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4310
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.34% / 55.87%
||
7 Day CHG~0.00%
Published-09 Jan, 2023 | 08:40
Updated-03 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
01-Scripts 01-Artikelsystem 01article.php cross site scripting

A vulnerability was found in 01-Scripts 01-Artikelsystem. It has been classified as problematic. Affected is an unknown function of the file 01article.php. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. It is possible to launch the attack remotely. The patch is identified as ae849b347a58c2cb1be38d04bbe56fc883d5d84a. It is recommended to apply a patch to fix this issue. VDB-217662 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-01-Scripts
Product-01-artikelsystem01-Artikelsystem
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-13937
Matching Score-4
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Matching Score-4
Assigner-WatchGuard Technologies, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 9.48%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:47
Updated-10 Dec, 2025 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in ConnectWise Technology Integration Configuration

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS (ConnectWise Technology Integration module) allows Stored XSS.This issue affects Fireware OS 12.4 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_nv5firebox_m570firewarefirebox_t70firebox_m670firebox_t115-wfirebox_t15firebox_t125-wfirebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_m290fireboxvfirebox_t25firebox_t145firebox_t35firebox_m5800firebox_t145-wfirebox_m370firebox_m270fireboxcloudfirebox_m690firebox_t55firebox_t40firebox_t20firebox_m4800firebox_m590firebox_t125firebox_t45firebox_t185firebox_t85Fireware OS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42043
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.44% / 62.76%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 20:28
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Special:MediaSearch in the MediaSearch extension in MediaWiki through 1.36.2. The suggestion text (a parameter to mediasearch-did-you-mean) was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the intitle: search operator within the query.

Action-Not Available
Vendor-n/aWikimedia Foundation
Product-mediawikin/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42363
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.35% / 56.70%
||
7 Day CHG~0.00%
Published-19 Nov, 2021 | 15:35
Updated-14 Feb, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Preview E-Mails for WooCommerce <= 1.6.8 Reflected Cross-Site Scripting

The Preview E-Mails for WooCommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the search_order parameter found in the ~/views/form.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.6.8.

Action-Not Available
Vendor-preview_e-mails_for_woocommerce_projectPreview E-Mails for WooCommerce
Product-preview_e-mails_for_woocommercePreview E-Mails for WooCommerce
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4274
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.27% / 50.34%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
sileht bird-lg layout.html cross site scripting

A vulnerability, which was classified as problematic, has been found in sileht bird-lg. This issue affects some unknown processing of the file templates/layout.html. The manipulation of the argument request_args leads to cross site scripting. The attack may be initiated remotely. The name of the patch is ef6b32c527478fefe7a4436e10b96ee28ed5b308. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216479.

Action-Not Available
Vendor-bird-lg_projectsileht
Product-bird-lgbird-lg
CWE ID-CWE-707
Improper Neutralization
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42193
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.07% / 20.82%
||
7 Day CHG~0.00%
Published-03 Oct, 2025 | 00:00
Updated-19 Dec, 2025 | 17:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

nopCommerce 4.40.3 is vulnerable to XSS in the Product Name at /Admin/Product/Edit/[id]. Each time a user views the product in the shop, the XSS payload fires.

Action-Not Available
Vendor-nopcommercen/a
Product-nopcommercen/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-22582
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-9||CRITICAL
EPSS-0.10% / 28.78%
||
7 Day CHG~0.00%
Published-11 Jun, 2023 | 13:17
Updated-09 Jan, 2025 | 07:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross-Site Scripting in Danfoss AK-EM100

The Danfoss AK-EM100 web applications allow for Reflected Cross-Site Scripting.

Action-Not Available
Vendor-danfossDanfoss
Product-ak-em100_firmwareak-em100AK-EM100
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4293
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.27% / 50.43%
||
7 Day CHG~0.00%
Published-28 Dec, 2022 | 08:53
Updated-03 Aug, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
gnuboard youngcart5 menu_list_update.php cross site scripting

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in gnuboard youngcart5 up to 5.4.5.1. Affected is an unknown function of the file adm/menu_list_update.php. The manipulation of the argument me_link leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 5.4.5.2 is able to address this issue. The name of the patch is 70daa537adfa47b87af12d85f1e698fff01785ff. It is recommended to upgrade the affected component. VDB-216954 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-sirgnuboard
Product-youngcart5youngcart5
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42534
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.3||MEDIUM
EPSS-0.30% / 53.00%
||
7 Day CHG~0.00%
Published-22 Oct, 2021 | 13:17
Updated-16 Sep, 2024 | 23:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Trane Building Automation Controllers Cross-site Scripting

The affected product’s web application does not properly neutralize the input during webpage generation, which could allow an attacker to inject code in the input forms.

Action-Not Available
Vendor-traneTrane
Product-tracer_sctracer_sc_firmwareTracer SC
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4263
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.24% / 47.53%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
leanote history.js define cross site scripting

A vulnerability, which was classified as problematic, has been found in leanote 2.6.1. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is 0f9733c890077942150696dcc6d2b1482b7a0a19. It is recommended to apply a patch to fix this issue. The identifier VDB-216461 was assigned to this vulnerability.

Action-Not Available
Vendor-leanoten/a
Product-leanoteleanote
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-50630
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.12% / 31.76%
||
7 Day CHG~0.00%
Published-04 Jan, 2024 | 00:00
Updated-17 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross Site Scripting (XSS) vulnerability in xiweicheng TMS v.2.28.0 allows a remote attacker to execute arbitrary code via a crafted script to the click here function.

Action-Not Available
Vendor-teamwork_management_system_projectn/a
Product-teamwork_management_systemn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4257
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.31% / 53.48%
||
7 Day CHG~0.00%
Published-18 Dec, 2022 | 00:00
Updated-03 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ctrlo lenio Task task.tt cross site scripting

A vulnerability was found in ctrlo lenio. It has been declared as problematic. This vulnerability affects unknown code of the file views/task.tt of the component Task Handler. The manipulation of the argument site.org.name/check.name/task.tasktype.name/task.name leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 698c5fa465169d6f23c6a41ca4b1fc9a7869013a. It is recommended to apply a patch to fix this issue. VDB-216214 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-ctrloctrlo
Product-leniolenio
CWE ID-CWE-707
Improper Neutralization
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-22585
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-9||CRITICAL
EPSS-0.10% / 28.78%
||
7 Day CHG~0.00%
Published-11 Jun, 2023 | 13:17
Updated-09 Jan, 2025 | 07:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross-Site Scripting in Danfoss AK-EM100

The Danfoss AK-EM100 web applications allow for Reflected Cross-Site Scripting in the title parameter.

Action-Not Available
Vendor-danfossDanfoss
Product-ak-em100_firmwareak-em100AK-EM100
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-26159
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.17% / 37.91%
||
7 Day CHG+0.12%
Published-22 Apr, 2025 | 00:00
Updated-23 Apr, 2025 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-37828
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.10% / 27.18%
||
7 Day CHG~0.00%
Published-01 Sep, 2023 | 00:00
Updated-01 Oct, 2024 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (XSS) vulnerability in General Solutions Steiner GmbH CASE 3 Taskmanagement V 3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Tasktyp parameter.

Action-Not Available
Vendor-general-solutionsn/a
Product-contwise_case2n/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4291
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.34% / 55.91%
||
7 Day CHG~0.00%
Published-27 Dec, 2022 | 22:54
Updated-17 May, 2024 | 02:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenMRS Admin UI Module location.gsp cross site scripting

A vulnerability was found in OpenMRS Admin UI Module up to 1.5.x. It has been declared as problematic. This vulnerability affects unknown code of the file omod/src/main/webapp/pages/metadata/locations/location.gsp. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216916.

Action-Not Available
Vendor-openmrsOpenMRS
Product-admin_ui_moduleAdmin UI Module
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42558
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-2.15% / 83.94%
||
7 Day CHG~0.00%
Published-12 Jan, 2022 | 19:06
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in CALDERA 2.8.1. It contains multiple reflected, stored, and self XSS vulnerabilities that may be exploited by authenticated and unauthenticated attackers.

Action-Not Available
Vendor-mitren/a
Product-calderan/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-9557
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 55.32%
||
7 Day CHG~0.00%
Published-28 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in SmartCMS v.2.

Action-Not Available
Vendor-smartwebsitesn/a
Product-smartcmsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-45050
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-6.1||MEDIUM
EPSS-0.34% / 56.30%
||
7 Day CHG~0.00%
Published-01 Dec, 2022 | 08:00
Updated-25 Apr, 2025 | 14:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected XSS in Axiell Iguana CMS

A reflected XSS vulnerability has been found in Axiell Iguana CMS, allowing an attacker to execute code in a victim's browser. The title parameter on the twitter.php endpoint does not properly neutralise user input, resulting in the vulnerability.

Action-Not Available
Vendor-axiellAxiell
Product-iguanaIguana
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42244
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 53.35%
||
7 Day CHG~0.00%
Published-25 Feb, 2022 | 18:15
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (XSS) vulnerability in PaquitoSoftware Notimoo v1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted title or message in a notification.

Action-Not Available
Vendor-notimoo_projectn/a
Product-notimoon/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4273
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.3||MEDIUM
EPSS-0.30% / 52.95%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
studygolang search.go Search cross site scripting

A vulnerability classified as problematic was found in studygolang. This vulnerability affects the function Search of the file http/controller/search.go. The manipulation of the argument q leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 97ba556d42fa89dfaa7737e9cd3a8ddaf670bb23. It is recommended to apply a patch to fix this issue. VDB-216478 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-studygolangunspecified
Product-studygolangstudygolang
CWE ID-CWE-707
Improper Neutralization
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43141
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.57% / 68.14%
||
7 Day CHG~0.00%
Published-03 Nov, 2021 | 18:40
Updated-24 Feb, 2025 | 14:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscription Website 1.0 via the id parameter in plan_application.

Action-Not Available
Vendor-n/aoretnom23
Product-simple_subscription_websiten/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-45049
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-6.1||MEDIUM
EPSS-0.36% / 57.94%
||
7 Day CHG~0.00%
Published-04 Jan, 2023 | 18:11
Updated-10 Apr, 2025 | 18:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected XSS in Axiell Iguana CMS

A reflected XSS vulnerability has been found in Axiell Iguana CMS, allowing an attacker to execute code in a victim's browser. The url parameter on the novelist.php endpoint does not properly neutralise user input, resulting in the vulnerability.

Action-Not Available
Vendor-axiellAxiellLinux Kernel Organization, IncMicrosoft Corporation
Product-windowslinux_kerneliguanaIguana
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-45051
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-6.1||MEDIUM
EPSS-0.36% / 57.94%
||
7 Day CHG~0.00%
Published-04 Jan, 2023 | 18:11
Updated-10 Apr, 2025 | 18:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected POST XSS in Axiell Iguana CMS

A reflected XSS vulnerability has been found in Axiell Iguana CMS, allowing an attacker to execute code in a victim's browser. The module parameter on the Service.template.cls endpoint does not properly neutralise user input, resulting in the vulnerability.

Action-Not Available
Vendor-axiellAxiellLinux Kernel Organization, IncMicrosoft Corporation
Product-windowslinux_kerneliguanaIguana
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42549
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-4.7||MEDIUM
EPSS-0.78% / 73.38%
||
7 Day CHG~0.00%
Published-13 Dec, 2021 | 10:54
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
reflected XSS in search functionality of WP Cloud Plugins - Lets-Box

Insufficient Input Validation in the search functionality of Wordpress plugin Lets-Box prior to 1.15.3 allows unauthenticated user to craft a reflected Cross-Site Scripting attack.

Action-Not Available
Vendor-wpcloudpluginsWP Cloud Plugins
Product-lets-boxLets-Box
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42639
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.89% / 75.08%
||
7 Day CHG~0.00%
Published-02 Feb, 2022 | 17:16
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to multiple reflected cross site scripting vulnerabilities. Attacker controlled input is reflected back in the page without sanitization.

Action-Not Available
Vendor-printerlogicn/a
Product-web_stackn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-43197
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 0.56%
||
7 Day CHG~0.00%
Published-09 Nov, 2021 | 14:47
Updated-04 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2021.1.2, email notifications could include unescaped HTML for XSS.

Action-Not Available
Vendor-n/aJetBrains s.r.o.
Product-teamcityn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-41823
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.23% / 46.07%
||
7 Day CHG~0.00%
Published-01 Jan, 2023 | 00:00
Updated-11 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Web Application Firewall (WAF) in Kemp LoadMaster 7.2.54.1 allows certain uses of onmouseover to bypass an XSS protection mechanism.

Action-Not Available
Vendor-n/aKemp
Product-web_application_firewalln/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42551
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-6.1||MEDIUM
EPSS-18.53% / 95.11%
||
7 Day CHG~0.00%
Published-14 Jan, 2022 | 09:52
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected XSS in NetBiblio WebOPAC search functionality

Cross-site Scripting (XSS) vulnerability in the search functionality of AlCoda NetBiblio WebOPAC allows an unauthenticated user to craft a reflected Cross-Site Scripting attack. This issue affects: AlCoda NetBiblio WebOPAC versions prior to 4.0.0.320; versions later than 4.0.0.328. This issue does not affect: AlCoda NetBiblio WebOPAC version 4.0.0.335 and later versions.

Action-Not Available
Vendor-AlCoda GmbH
Product-netbiblioNetBiblio WebOPAC
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-24386
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-8.8||HIGH
EPSS-0.38% / 58.75%
||
7 Day CHG~0.00%
Published-14 Mar, 2022 | 00:00
Updated-11 Mar, 2025 | 13:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stored XSS in SmarterTrack v100.0.8019.14010

Stored XSS in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.

Action-Not Available
Vendor-smartertoolsSmarterTools
Product-smartertrackSmarterTrack
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-24384
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-8.8||HIGH
EPSS-48.03% / 97.65%
||
7 Day CHG~0.00%
Published-14 Mar, 2022 | 00:00
Updated-11 Mar, 2025 | 13:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflective XSS on SmarterTrack v100.0.8019.14010

Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.

Action-Not Available
Vendor-smartertoolsSmarterToolssmartertools
Product-smartertrackSmarterTracksmartertrack
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4270
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.21% / 43.70%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Imprint CMS ViewHelpers.cs SearchForm cross site scripting

A vulnerability was found in Imprint CMS. It has been classified as problematic. Affected is the function SearchForm of the file ImprintCMS/Models/ViewHelpers.cs. The manipulation of the argument query leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 6140b140ccd02b5e4e7d6ba013ac1225724487f4. It is recommended to apply a patch to fix this issue. VDB-216474 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-imprint_cms_projectunspecified
Product-imprint_cmsImprint CMS
CWE ID-CWE-707
Improper Neutralization
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5113
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 60.36%
||
7 Day CHG~0.00%
Published-04 Oct, 2023 | 14:20
Updated-19 Sep, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certain HP Enterprise LaserJet, LaserJet Managed printers - Potential denial of service, potential Cross Site Scripting (XSS)

Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI.

Action-Not Available
Vendor-HP Inc.
Product-color_laserjet_managed_mfp_e78625_5qj90alaserjet_managed_e60155_3gy10acolor_laserjet_managed_mfp_e87640_x3a92alaserjet_managed_flow_mfp_e82540_x3a82acolor_laserjet_managed_flow_mfp_e87660_z8z16acolor_laserjet_enterprise_m751_t3u44alaserjet_managed_mfp_e73140_6bs57alaserjet_managed_mfp_e62665_3gy15acolor_laserjet_managed_mfp_e78223-e78228_8gs14acolor_laserjet_managed_flow_e87750_5qk20acolor_laserjet_managed_flow_mfp_e77822_z8z0alaserjet_managed_mfp_e62555_j8j74acolor_laserjet_managed_flow_mfp_e87650_x3a89acolor_laserjet_managed_flow_mfp_e78630_3sj12alaserjet_managed_e60075_m0p33acolor_laserjet_managed_mfp_e87650_z8z12acolor_laserjet_managed_mfp_e78330_8gs28acolor_laserjet_enterprise_m653_j8a06alaserjet_managed_mfp_e826dn_5qk13acolor_laserjet_managed_flow_mfp_e77830_x3a78acolor_laserjet_managed_e55040dw_3gx98acolor_laserjet_managed_mfp_e87740_3sj38acolor_laserjet_managed_flow_mfp_e77825_x3a83alaserjet_managed_flow_mfp_e72525_x3a62acolor_laserjet_enterprise_flow_mfp_m577_b5l54alaserjet_managed_mfp_e42540_3pz75acolor_laserjet_managed_mfp_e77825_z8z04acolor_laserjet_managed_flow_mfp_e87660_x3a87acolor_laserjet_managed_mfp_e78625_3sj32apagewide_managed_color_mfp_p77940_5zp00acolor_laserjet_enterprise_flow_mfp_m577_b5l47alaserjet_managed_flow_mfp_e82540_z8z23alaserjet_enterprise_m506_f2a70apagewide_managed_color_flow_mfp_e77650z_j7z13alaserjet_managed_mfp_e72525_z8z08acolor_laserjet_enterprise_6700_4y280alaserjet_managed_flow_mfp_e826z_5qk09alaserjet_managed_mfp_e62555_j8j67alaserjet_managed_flow_mfp_e62565_j8j80acolor_laserjet_managed_flow_e87760_3sj20alaserjet_enterprise_flow_mfp_m631_j8j63acolor_laserjet_managed_mfp_e78625_3sj12alaserjet_managed_mfp_e72530_z8z08acolor_laserjet_managed_mfp_e77825_x3a78alaserjet_managed_mfp_e82540_z8z19laserjet_managed_mfp_e82550_x3a68acolor_laserjet_managed_mfp_e78223-e78228_8gs50acolor_laserjet_managed_mfp_e87750_3sj36acolor_laserjet_managed_mfp_e87650_z8z17apagewide_managed_color_flow_mfp_e77660z_j7z07acolor_laserjet_managed_flow_e87750_5qk03acolor_laserjet_managed_flow_mfp_e57540_3gy26acolor_laserjet_managed_flow_e87740_3sj36acolor_laserjet_managed_mfp_e67550_l3u67alaserjet_managed_flow_mfp_e73135_5qj98apagewide_managed_color_mfp_p77960_5zp00acolor_laserjet_managed_mfp_e87770_5qk20apagewide_managed_color_mfp_p77940_y3z68acolor_laserjet_enterprise_mfp_m578_7zu85alaserjet_enterprise_mfp_m632_j8j72acolor_laserjet_managed_flow_mfp_e77830_x3a84alaserjet_enterprise_flow_mfp_m636_7pt00acolor_laserjet_managed_mfp_e87760_3sj37alaserjet_managed_flow_mfp_e82550_z8z23alaserjet_managed_flow_mfp_e72535_z8z06alaserjet_managed_mfp_e72530_x3a60alaserjet_enterprise_mfp_m631_j8j65alaserjet_enterprise_m612_7ps87alaserjet_managed_mfp_e82540du_5cm58acolor_laserjet_managed_mfp_e67560_l3u70alaserjet_managed_mfp_e826dn_3sj29acolor_laserjet_enterprise_mfp_m681_j8a10apagewide_managed_color_mfp_p77950_5zp01acolor_laserjet_managed_mfp_e77822_z8z00alaserjet_managed_flow_mfp_e82540_x3a72alaserjet_enterprise_m611_7ps83apagewide_enterprise_color_flow_mfp_780f_j7z09acolor_laserjet_managed_mfp_e87640du-e87660du_5rc88alaserjet_managed_mfp_e82560_az8z20apagewide_managed_color_flow_mfp_e77660z_j7z08apagewide_managed_color_mfp_p77950_y3z66acolor_laserjet_managed_mfp_e78330_8gs29alaserjet_managed_flow_mfp_e82560_x3a79acolor_laserjet_managed_flow_mfp_e77830_z8z04acolor_laserjet_managed_mfp_e78323_8gs29apagewide_managed_color_mfp_p77960_y3z68acolor_laserjet_managed_mfp_e877_3sj22acolor_laserjet_managed_flow_mfp_e77830_z8z02acolor_laserjet_managed_flow_e87770_3sj21acolor_laserjet_enterprise_m555_7zu78acolor_laserjet_managed_mfp_e87640du-e87660du_5fm80alaserjet_managed_flow_mfp_e62575_j8j74acolor_laserjet_enterprise_mfp_m776_t3u56alaserjet_managed_flow_mfp_e62675_3gy15alaserjet_managed_mfp_e82560_x3a74alaserjet_managed_mfp_e62565_j8j74alaserjet_enterprise_m506_f2a71apagewide_color_mfp_779_4pz46alaserjet_managed_mfp_e72535_z8z08acolor_laserjet_enterprise_mfp_m577_b5l48alaserjet_managed_mfp_e82560_x3a79alaserjet_managed_flow_mfp_e62575_j8j67apagewide_managed_color_mfp_e77650_j7z07acolor_laserjet_managed_flow_e87750_3sj20apagewide_managed_color_mfp_p77950_y3z61acolor_laserjet_enterprise_m554_7zu81alaserjet_managed_flow_mfp_e62675_3gy18acolor_laserjet_managed_flow_e87740_3sj22acolor_laserjet_enterprise_mfp_6800_4y279acolor_laserjet_managed_mfp_e78330_8gr94acolor_laserjet_managed_mfp_e77422-e77428_5rc91alaserjet_managed_flow_mfp_e62575_j8j66acolor_laserjet_managed_mfp_e87660_x3a87acolor_laserjet_enterprise_flow_mfp_5800_6qn29alaserjet_managed_mfp_e82540du_5rc85acolor_laserjet_managed_mfp_e77422-e77428_5cm77acolor_laserjet_managed_mfp_e78323_8gs25acolor_laserjet_managed_mfp_e78625_3sj33alaserjet_managed_e82650_3sj08acolor_laserjet_managed_mfp_e57540_3gy26alaserjet_managed_e82660_5qk13acolor_laserjet_managed_mfp_e78323_9rt92alaserjet_managed_flow_mfp_e82560_x3a82acolor_laserjet_managed_mfp_e87650_x3a90alaserjet_managed_flow_mfp_e82550_x3a71acolor_laserjet_managed_flow_mfp_e78635_3sj12alaserjet_managed_mfp_e82540_x3a82alaserjet_managed_mfp_e73135_3sj02acolor_laserjet_managed_mfp_e87660_x3a90alaserjet_enterprise_mfp_m634_7ps95alaserjet_managed_mfp_e73030_3sj03acolor_laserjet_managed_mfp_e78523_5qj83alaserjet_enterprise_m507_1pv87acolor_laserjet_managed_mfp_e87650_x3a93acolor_laserjet_enterprise_flow_mfp_x57945_49k97avlaserjet_managed_mfp_e72535_x3a60apagewide_managed_color_mfp_p77960_2gp25alaserjet_managed_flow_mfp_e731_6bs58acolor_laserjet_managed_flow_mfp_e77825_x3a78acolor_laserjet_managed_mfp_e87650_z8z16alaserjet_enterprise_mfp_m528_1pv49acolor_laserjet_enterprise_flow_mfp_6800_6qn35alaserjet_managed_mfp_e82550du_5cm61acolor_laserjet_managed_mfp_e78625_3sj13alaserjet_managed_flow_e82650_3sj28acolor_laserjet_managed_flow_mfp_e77830_x3a83acolor_laserjet_managed_flow_mfp_e78635_5qk18alaserjet_enterprise_flow_mfp_m632_j8j72alaserjet_managed_mfp_e82540_x3a72alaserjet_managed_e82670_3sj29acolor_laserjet_managed_e65050_l3u55alaserjet_managed_mfp_e82560_x3a68alaserjet_enterprise_m611_7ps84acolor_laserjet_managed_flow_mfp_e67560_l3u66acolor_laserjet_managed_mfp_e78635_3sj13alaserjet_managed_e60075_m0p39apagewide_managed_color_flow_mfp_e77660z_z5g77alaserjet_managed_e60155_3gy12acolor_laserjet_managed_mfp_e78523_5qj81apagewide_managed_color_mfp_p77950_2gp22acolor_laserjet_managed_e65160_3gy04acolor_laserjet_managed_mfp_e87740_3sj35alaserjet_managed_flow_mfp_e72530_z8z010alaserjet_managed_mfp_e62665_3gy17alaserjet_managed_flow_mfp_e73135_3sj00alaserjet_managed_mfp_e73130_3sj01acolor_laserjet_managed_flow_mfp_e78625_3sj11alaserjet_managed_e60155_3gy09alaserjet_enterprise_mfp_m636_7pt01alaserjet_managed_mfp_e730_3sj03alaserjet_managed_flow_mfp_e73135_6bs59acolor_laserjet_managed_flow_mfp_e78625_5qj94acolor_laserjet_managed_flow_mfp_e786_5qj94acolor_laserjet_managed_mfp_e77422-e77428_5rc92alaserjet_managed_flow_mfp_e72530_z8z011alaserjet_managed_e60055_m0p40acolor_laserjet_managed_flow_e87770_3sj36acolor_laserjet_enterprise_flow_mfp_m681_j8a10acolor_laserjet_managed_flow_e87770_3sj20alaserjet_managed_flow_e82670_3sj28apagewide_enterprise_color_flow_mfp_780f_j7z10alaserjet_enterprise_flow_mfp_m635_7ps97alaserjet_managed_mfp_e82560_z8z23alaserjet_managed_flow_mfp_e82560_z8z23acolor_laserjet_managed_mfp_e877_3sj20alaserjet_managed_flow_mfp_e72535_x3a60acolor_laserjet_managed_mfp_e67650_3gy32alaserjet_managed_flow_mfp_e72525_x3a59alaserjet_managed_mfp_e72525_z8z010acolor_laserjet_managed_mfp_e87750_3sj38acolor_laserjet_enterprise_mfp_5800_49k96avlaserjet_managed_flow_mfp_e82550_az8z20acolor_laserjet_managed_mfp_e78330_8gs00acolor_laserjet_managed_mfp_e87640du-e87660du_5cm66acolor_laserjet_managed_mfp_e87640_z8z12alaserjet_managed_mfp_e73135_3sj00apagewide_managed_color_flow_mfp_e77650z_z5g77apagewide_managed_color_mfp_p77960_5zn98alaserjet_managed_e50145_1pu51alaserjet_managed_mfp_e72425_5cm72alaserjet_managed_flow_mfp_e82560_x3a69alaserjet_enterprise_flow_mfp_m527z_f2a78acolor_laserjet_managed_flow_e87770_5qk20alaserjet_managed_flow_mfp_e82540_x3a74acolor_laserjet_managed_m553_bl27alaserjet_enterprise_flow_mfp_m631_j8j64acolor_laserjet_managed_flow_mfp_e87640_z8z16acolor_laserjet_managed_flow_mfp_e77830_z8z00acolor_laserjet_managed_flow_mfp_e87650_x3a93acolor_laserjet_managed_flow_mfp_e87650_z8z16acolor_laserjet_managed_mfp_e78323_8gr94acolor_laserjet_managed_mfp_e77830_x3a83acolor_laserjet_managed_flow_mfp_e77822_z8z02acolor_laserjet_managed_mfp_e877_3sj19acolor_laserjet_managed_flow_mfp_e786_3sj13acolor_laserjet_managed_flow_mfp_e78635_3sj11alaserjet_managed_mfp_e72525_x3a59alaserjet_managed_flow_mfp_e826z_3sj08alaserjet_managed_mfp_e826dn_3sj07acolor_laserjet_enterprise_mfp_x57945_6qp99alaserjet_managed_e60065_m0p36alaserjet_enterprise_mfp_m527_f2a76alaserjet_managed_mfp_e82540du_5fm78alaserjet_managed_flow_mfp_e72535_x3a63alaserjet_managed_flow_mfp_e82550_x3a82alaserjet_managed_mfp_e72530_x3a59acolor_laserjet_managed_mfp_e77830_z8z05apagewide_managed_color_flow_mfp_e77650z_z5g79alaserjet_managed_mfp_e82550du_5fm78alaserjet_managed_flow_mfp_e73140_3sj02alaserjet_enterprise_m610_7ps82alaserjet_managed_mfp_m527_f2a80acolor_laserjet_managed_flow_mfp_e87650_z8z13alaserjet_managed_mfp_e62655_3gy17apagewide_managed_color_e55650_l3u44acolor_laserjet_enterprise_flow_mfp_m578_7zu85alaserjet_managed_mfp_e73130_6bs59alaserjet_managed_mfp_e72525_x3a65acolor_laserjet_managed_mfp_e77422-e77428_5cm76acolor_laserjet_enterprise_mfp_m578_7zu86apagewide_managed_color_mfp_p77940_2gp23acolor_laserjet_managed_flow_e87760_3sj36acolor_laserjet_managed_e65060_l3u57acolor_laserjet_managed_mfp_e77822_z8z04acolor_laserjet_managed_flow_e87760_5qk03acolor_laserjet_managed_flow_mfp_e67560_l3u67alaserjet_managed_flow_mfp_e73130_5qj98alaserjet_managed_flow_mfp_e731_5qj98acolor_laserjet_enterprise_x55745_49k99acolor_laserjet_managed_flow_e87750_3sj22acolor_laserjet_managed_flow_mfp_e78625_5qk18acolor_laserjet_managed_flow_mfp_e77830_x3a81alaserjet_managed_flow_mfp_e62675_3gy16acolor_laserjet_enterprise_flow_mfp_m577_b5l48alaserjet_managed_flow_mfp_e73140_3sj00acolor_laserjet_managed_mfp_e785dn_5qj81alaserjet_enterprise_flow_mfp_m527z_f2a77alaserjet_managed_flow_e82650_3sj09alaserjet_managed_flow_e82670_3sj07alaserjet_managed_mfp_e72535_z8z011acolor_laserjet_enterprise_flow_mfp_m578_7zu88alaserjet_managed_flow_mfp_e72525_x3a60acolor_laserjet_managed_mfp_e87750_3sj19alaserjet_managed_e82650_5qk13alaserjet_managed_mfp_e82540du_5fm77acolor_laserjet_managed_mfp_e78635_5qj94alaserjet_managed_mfp_e72535_z8z06alaserjet_managed_flow_mfp_e72525_x3a65alaserjet_managed_flow_mfp_e82550_x3a79acolor_laserjet_managed_mfp_e877_3sj37acolor_laserjet_managed_flow_mfp_e78625_3sj13acolor_laserjet_managed_mfp_e78323_8gs28alaserjet_enterprise_flow_mfp_m635_7ps99alaserjet_managed_mfp_e72535_x3a62acolor_laserjet_managed_mfp_m577_b5l50alaserjet_managed_mfp_e82550_x3a69alaserjet_managed_mfp_e82560_x3a71alaserjet_managed_mfp_e72425_5cm70acolor_laserjet_managed_flow_e87760_5qk08acolor_laserjet_enterprise_flow_mfp_m578_7zu86alaserjet_enterprise_mfp_m631_j8j64alaserjet_managed_mfp_e73030_5qj87acolor_laserjet_enterprise_mfp_5800_6qn31acolor_laserjet_managed_mfp_e786_3sj13acolor_laserjet_managed_m553_b5l39acolor_laserjet_managed_mfp_e87640_z8z14alaserjet_managed_flow_mfp_e72525_x3a63alaserjet_managed_mfp_e82560du_5fm78acolor_laserjet_managed_flow_mfp_e67560_l3u69acolor_laserjet_managed_flow_mfp_e78625_5qj90apagewide_managed_color_mfp_e77650_z5g77alaserjet_managed_mfp_e72525_x3a63alaserjet_enterprise_m608_k0q18alaserjet_managed_mfp_e62665_3gy16acolor_laserjet_managed_flow_mfp_e77822_x3a81acolor_laserjet_managed_mfp_e78323_8pe97acolor_laserjet_managed_mfp_e78630_5qj90acolor_laserjet_managed_mfp_e77822_x3a81apagewide_managed_color_mfp_e77650_z5g79acolor_laserjet_managed_mfp_e87640_z8z16alaserjet_managed_flow_mfp_e62555_j8j79apagewide_managed_color_mfp_p77960_y3z64alaserjet_managed_mfp_e72535_x3a59acolor_laserjet_managed_mfp_e77825_x3a80alaserjet_managed_mfp_e72530_x3a63alaserjet_managed_flow_mfp_e82560_z8z22alaserjet_managed_flow_mfp_e826z_3sj29alaserjet_managed_mfp_e73140_3sj00acolor_laserjet_managed_mfp_e77830_x3a81acolor_laserjet_managed_flow_mfp_e77830_z8z0acolor_laserjet_managed_flow_e87770_5qk03alaserjet_managed_mfp_e73135_6bs58acolor_laserjet_managed_flow_e87760_3sj38alaserjet_enterprise_m607_k0q15acolor_laserjet_managed_flow_mfp_e87640_x3a93acolor_laserjet_managed_mfp_e77422-e77428_5cm79alaserjet_managed_mfp_e62555_j8j79alaserjet_managed_flow_mfp_e62565_j8j66alaserjet_enterprise_m607_k0q14apagewide_enterprise_color_mfp_780_j7z10acolor_laserjet_managed_mfp_e87650_x3a92alaserjet_managed_mfp_e72530_z8z010alaserjet_managed_e82670_3sj28alaserjet_managed_e60075_m0p40acolor_laserjet_enterprise_flow_mfp_6800_4y279alaserjet_enterprise_mfp_m633_j8j76alaserjet_managed_mfp_e82560du_5rc84acolor_laserjet_managed_mfp_e87750_3sj21alaserjet_managed_flow_mfp_e62555_j8j67alaserjet_managed_m506_f2a71acolor_laserjet_managed_flow_mfp_e87650_x3a87apagewide_enterprise_color_mfp_586_g1w39apagewide_managed_color_mfp_p77940_5zn99alaserjet_enterprise_flow_mfp_m634_7ps96acolor_laserjet_managed_mfp_e78528_5qj81alaserjet_managed_mfp_e72430_5cm68acolor_laserjet_managed_mfp_e87770_3sj21acolor_laserjet_enterprise_6701_4y280acolor_laserjet_managed_mfp_e78323_9rt91acolor_laserjet_managed_mfp_e78330_8gs27alaserjet_enterprise_mfp_m527_f2a81alaserjet_managed_mfp_e731_3sj02alaserjet_enterprise_m506_f2a68alaserjet_managed_e60075_m0p35alaserjet_enterprise_m608_m0p32acolor_laserjet_managed_mfp_e87660_x3a93acolor_laserjet_managed_m553_b5l25apagewide_managed_color_mfp_p77950_5zn98acolor_laserjet_managed_mfp_e78323_8pe95acolor_laserjet_enterprise_flow_mfp_m681_j8a12alaserjet_managed_mfp_e72525_x3a60alaserjet_managed_mfp_e731_3sj01acolor_laserjet_managed_mfp_e786_5qj90acolor_laserjet_managed_flow_mfp_e67550_l3u67apagewide_enterprise_color_556_g1w46acolor_laserjet_enterprise_flow_mfp_x57945_6qp99acolor_laserjet_managed_flow_e87760_3sj37acolor_laserjet_enterprise_mfp_5800_6qn29acolor_laserjet_managed_flow_e87740_3sj35acolor_laserjet_managed_mfp_e78330_8pe97alaserjet_managed_mfp_e72535_z8z07alaserjet_enterprise_flow_mfp_m631_j8j65acolor_laserjet_managed_mfp_e78323_8gr98acolor_laserjet_managed_mfp_e78625_3sj34acolor_laserjet_managed_mfp_e877_3sj21alaserjet_managed_e50045_3gn19acolor_laserjet_managed_mfp_e78323_8gs00acolor_laserjet_managed_flow_mfp_e786_3sj32acolor_laserjet_managed_mfp_e78330_8gr98acolor_laserjet_managed_mfp_e87770_3sj36acolor_laserjet_managed_flow_e87750_3sj36acolor_laserjet_managed_mfp_e78323_8pe96acolor_laserjet_managed_mfp_e78330_8gs30acolor_laserjet_managed_mfp_e78635_5qk18alaserjet_managed_mfp_e73135_3sj01alaserjet_managed_mfp_e82540_x3a69acolor_laserjet_managed_flow_mfp_e87660_z8z15acolor_laserjet_managed_mfp_e67550_l3u70acolor_laserjet_managed_flow_mfp_e786_3sj11alaserjet_managed_flow_mfp_e82540_z8z22alaserjet_managed_mfp_e72425_5cm71alaserjet_managed_flow_mfp_e82560_z8z18apagewide_managed_color_mfp_p77950_5zp00acolor_laserjet_managed_mfp_e87650_x3a89alaserjet_enterprise_mfp_m631_j8j63acolor_laserjet_managed_flow_mfp_e87650_z8z17acolor_laserjet_managed_flow_mfp_e87660_x3a93alaserjet_managed_flow_mfp_e72530_x3a63apagewide_managed_color_mfp_p77960_y3z63alaserjet_managed_mfp_e62655_3gy16acolor_laserjet_managed_flow_mfp_e78625_3sj12alaserjet_managed_e82660_3sj29alaserjet_enterprise_mfp_m632_j8j70acolor_laserjet_managed_mfp_e78330_8pe94acolor_laserjet_enterprise_mfp_m681_j8a13acolor_laserjet_managed_flow_mfp_e87640_x3a89alaserjet_managed_e82670_3sj08alaserjet_managed_mfp_e73140_5qj98acolor_laserjet_managed_flow_mfp_e87650_z8z14acolor_laserjet_managed_flow_mfp_e87660_z8z17acolor_laserjet_managed_mfp_e87640_x3a89alaserjet_managed_flow_mfp_e73135_3sj01alaserjet_managed_flow_mfp_e82560_x3a71alaserjet_managed_flow_e82670_5qk13apagewide_managed_color_flow_mfp_e77660z_j7z05acolor_laserjet_managed_mfp_e78323_8pe94alaserjet_managed_flow_e82660_3sj09acolor_laserjet_managed_flow_e87740_3sj38acolor_laserjet_enterprise_m856_t3u51acolor_laserjet_managed_mfp_e77822_x3a83acolor_laserjet_enterprise_flow_mfp_m776_t3u56alaserjet_managed_flow_mfp_e82540_z8z19color_laserjet_enterprise_mfp_m577_b5l46alaserjet_managed_e60065_m0p40acolor_laserjet_managed_mfp_e87740_3sj22alaserjet_managed_mfp_e73135_5qj98alaserjet_managed_mfp_e82540_z8z23apagewide_color_mfp_774_4pa44acolor_laserjet_managed_flow_mfp_e78635_3sj32alaserjet_managed_flow_mfp_e62675_3gy17alaserjet_managed_mfp_e82550du_5cm58acolor_laserjet_managed_flow_mfp_e67550_l3u66acolor_laserjet_managed_flow_mfp_e78635_3sj13acolor_laserjet_enterprise_mfp_6800_6qn38acolor_laserjet_managed_mfp_e78223-e78228_8gs37alaserjet_managed_e60055_m0p35alaserjet_managed_mfp_e72430_5rc90alaserjet_managed_flow_mfp_e731_6bs59acolor_laserjet_enterprise_m653_j8a05alaserjet_managed_flow_e82670_3sj09alaserjet_managed_mfp_e62565_j8j67acolor_laserjet_managed_mfp_e77825_z8z00alaserjet_managed_e82650_3sj30alaserjet_managed_mfp_e82550_x3a75acolor_laserjet_managed_mfp_e77825_z8z01apagewide_color_mfp_774_4pz43acolor_laserjet_enterprise_m553_b5l25alaserjet_managed_mfp_e82550_z8z22acolor_laserjet_managed_flow_mfp_e77822_x3a84acolor_laserjet_managed_mfp_e77422-e77428_5cm75alaserjet_enterprise_m609_k0q21alaserjet_managed_mfp_e72525_z8z09acolor_laserjet_managed_mfp_e78330_8gr99acolor_laserjet_managed_mfp_e78330_8gs25alaserjet_managed_mfp_e82550du_5rc84acolor_laserjet_managed_mfp_e786_3sj32alaserjet_enterprise_m608_k0q19acolor_laserjet_enterprise_flow_mfp_5800_6qn31acolor_laserjet_managed_flow_mfp_e87640_z8z17alaserjet_managed_mfp_e82560du_5rc85acolor_laserjet_enterprise_mfp_m682_j8a17acolor_laserjet_managed_mfp_e78523_5qk15alaserjet_managed_flow_mfp_e62565_j8j73acolor_laserjet_enterprise_flow_mfp_m578_7zu87acolor_laserjet_enterprise_flow_mfp_m682_j8a16alaserjet_enterprise_flow_mfp_m634_7ps95apagewide_enterprise_color_765_j7z04alaserjet_managed_mfp_e72525_z8z06alaserjet_managed_flow_mfp_e62565_j8j67acolor_laserjet_managed_mfp_e87750_5qk20alaserjet_managed_e60165_3gy12alaserjet_managed_flow_mfp_e82550_x3a68alaserjet_managed_mfp_e82540du_5cm61alaserjet_enterprise_flow_mfp_m527z_f2a76alaserjet_managed_flow_mfp_e73130_3sj00apagewide_managed_color_mfp_e77650_j7z05alaserjet_managed_mfp_e82550du_5rc85alaserjet_managed_flow_mfp_e82540_x3a75acolor_laserjet_managed_mfp_e78323_8gr97acolor_laserjet_managed_mfp_e78630_3sj13alaserjet_managed_mfp_e72530_x3a62apagewide_managed_color_mfp_e58650dn_l3u42acolor_laserjet_managed_flow_mfp_e77830_z8z01apagewide_enterprise_color_flow_mfp_785_j7z11alaserjet_managed_flow_mfp_e72530_x3a60acolor_laserjet_managed_e65050_l3u56acolor_laserjet_managed_flow_e87760_3sj22acolor_laserjet_managed_mfp_e87660_z8z17alaserjet_managed_mfp_e73135_6bs57apagewide_managed_color_mfp_p77950_2gp25alaserjet_managed_flow_mfp_e72535_z8z010apagewide_managed_color_mfp_p77940_y3z62acolor_laserjet_managed_mfp_e785dn_5qk15acolor_laserjet_managed_flow_mfp_e87640_z8z13acolor_laserjet_managed_flow_mfp_e77825_x3a80acolor_laserjet_managed_mfp_e78630_5qj94acolor_laserjet_enterprise_m455_3pz95alaserjet_managed_mfp_e82540_x3a68alaserjet_managed_mfp_e72430_5cm69acolor_laserjet_managed_mfp_e78223-e78228_8gs13acolor_laserjet_managed_flow_mfp_e77825_z8z04acolor_laserjet_managed_flow_mfp_m577_b5l50alaserjet_enterprise_m406_3pz15alaserjet_managed_mfp_e73130_3sj02acolor_laserjet_managed_flow_mfp_e87660_x3a89acolor_laserjet_managed_flow_mfp_e78630_5qj94alaserjet_managed_mfp_e82540_x3a75alaserjet_managed_e60055_m0p36acolor_laserjet_enterprise_m856_t3u52acolor_laserjet_enterprise_flow_mfp_m681_j8a13apagewide_managed_color_mfp_p77940_5zp01acolor_laserjet_enterprise_mfp_m577_b5l47acolor_laserjet_managed_mfp_e87660_z8z15acolor_laserjet_managed_flow_mfp_e78625_3sj33acolor_laserjet_managed_flow_mfp_e78635_3sj33alaserjet_managed_e60175_3gy10alaserjet_managed_mfp_e73025_5qj87acolor_laserjet_managed_mfp_e786_3sj11acolor_laserjet_managed_flow_mfp_m577_b5l49acolor_laserjet_managed_mfp_e78330_8gs26acolor_laserjet_enterprise_mfp_5800_58r10alaserjet_managed_mfp_e73025_3sj04alaserjet_managed_mfp_e72430_5cm70alaserjet_managed_mfp_e72535_z8z09alaserjet_managed_mfp_e730_3sj04acolor_laserjet_managed_mfp_e78635_3sj12acolor_laserjet_managed_mfp_e67560_l3u69alaserjet_managed_flow_mfp_e73140_5qk02alaserjet_managed_mfp_e82540du_5rc83apagewide_managed_color_mfp_p77940_2gp22acolor_laserjet_managed_mfp_e78635_3sj34alaserjet_managed_flow_mfp_e826z_3sj28alaserjet_managed_e82650_3sj07alaserjet_managed_flow_mfp_e72535_x3a66acolor_laserjet_managed_mfp_e77822_z8z05acolor_laserjet_managed_mfp_e87760_5qk08alaserjet_managed_mfp_e73140_6bs58acolor_laserjet_managed_flow_e87750_3sj19acolor_laserjet_managed_mfp_e87640du-e87660du_5cm65alaserjet_enterprise_m610_7ps81alaserjet_managed_mfp_e72425_5rc89acolor_laserjet_managed_mfp_e77830_x3a84acolor_laserjet_managed_mfp_e877_5qk20acolor_laserjet_managed_mfp_e87760_3sj36acolor_laserjet_managed_mfp_e78630_3sj12acolor_laserjet_managed_mfp_e87660_x3a86apagewide_managed_color_flow_mfp_e77660z_j7z03alaserjet_managed_flow_mfp_e82550_x3a75alaserjet_managed_mfp_e82560du_5cm58acolor_laserjet_managed_mfp_e77822_z8z01acolor_laserjet_enterprise_m653_j8a04alaserjet_enterprise_mfp_m636_7pt00alaserjet_managed_flow_mfp_e72530_z8z09acolor_laserjet_enterprise_flow_mfp_m776_t3u55acolor_laserjet_managed_flow_mfp_e77825_z8z02acolor_laserjet_managed_mfp_e78330_8pe96alaserjet_managed_m506_f2a66acolor_laserjet_managed_mfp_e77825_x3a84acolor_laserjet_managed_mfp_e87640_z8z17alaserjet_managed_mfp_e73140_3sj02alaserjet_managed_mfp_e52645_1ps54alaserjet_managed_e82670_5qk09acolor_laserjet_managed_mfp_e78630_3sj34alaserjet_managed_e82660_3sj07alaserjet_managed_mfp_e72535_x3a66alaserjet_managed_mfp_e82560_x3a82alaserjet_managed_m506_f2a68acolor_laserjet_managed_mfp_e77422-e77428_5cm78acolor_laserjet_managed_mfp_e67550_l3u66acolor_laserjet_enterprise_mfp_m681_j8a11acolor_laserjet_managed_mfp_e786_3sj34acolor_laserjet_managed_mfp_e78323_8gs01alaserjet_managed_e82670_3sj07acolor_laserjet_managed_flow_e87750_5qk08acolor_laserjet_managed_mfp_e77822_x3a77acolor_laserjet_managed_mfp_e67650_3gy31alaserjet_managed_flow_e82650_3sj29alaserjet_managed_mfp_e72530_z8z09apagewide_managed_color_mfp_p77960_2gp22apagewide_managed_color_flow_mfp_e77650z_j7z05acolor_laserjet_managed_mfp_e87660_z8z16acolor_laserjet_enterprise_6700_49l00alaserjet_managed_mfp_e82540_z8z22apagewide_managed_color_mfp_p77960_y3z66apagewide_managed_color_mfp_e77650_j7z03alaserjet_managed_mfp_e731_6bs58alaserjet_managed_flow_mfp_e72525_z8z08acolor_laserjet_managed_flow_mfp_e67550_l3u69alaserjet_managed_flow_mfp_e82560_x3a74acolor_laserjet_managed_mfp_e77822_x3a84apagewide_managed_color_flow_mfp_e77660z_j7z14acolor_laserjet_managed_flow_e87740_3sj19alaserjet_managed_mfp_e731_6bs57alaserjet_enterprise_m609_k0q22alaserjet_managed_e60175_3gy09acolor_laserjet_managed_mfp_e78323_8gs30acolor_laserjet_managed_mfp_e57540_3gy25acolor_laserjet_managed_mfp_e67660_3gy31acolor_laserjet_managed_mfp_e77830_z8z01alaserjet_managed_flow_mfp_e62565_j8j79alaserjet_enterprise_m506_f2a66acolor_laserjet_managed_e65060_l3u56alaserjet_enterprise_m507_1pv88alaserjet_managed_mfp_e72525_x3a66acolor_laserjet_enterprise_mfp_m578_7zu88acolor_laserjet_enterprise_flow_mfp_6800_6qn37apagewide_managed_color_mfp_e77650_j7z08alaserjet_managed_flow_mfp_e62555_j8j74alaserjet_managed_mfp_e72530_x3a65alaserjet_managed_e82650_3sj09alaserjet_enterprise_mfp_m633_j8j78alaserjet_managed_mfp_e82550_az8z20alaserjet_managed_mfp_e82560du_5cm61acolor_laserjet_enterprise_5700_6qn28alaserjet_enterprise_mfp_m431_3pz56acolor_laserjet_managed_mfp_e67660_3gy32alaserjet_managed_e60055_m0p39alaserjet_enterprise_flow_mfp_m634_7ps94acolor_laserjet_managed_mfp_e78323_8gs27acolor_laserjet_managed_flow_e87760_3sj21acolor_laserjet_managed_mfp_e87760_5qk20alaserjet_managed_flow_mfp_e73130_3sj02alaserjet_managed_m506_f2a69acolor_laserjet_managed_mfp_e78635_3sj32alaserjet_managed_flow_mfp_e72535_z8z08alaserjet_managed_mfp_e82560_z8z22alaserjet_managed_mfp_e52545_3gy19acolor_laserjet_enterprise_mfp_6800_6qn36acolor_laserjet_managed_flow_mfp_e77825_z8z01acolor_laserjet_managed_flow_e87760_3sj35acolor_laserjet_managed_flow_mfp_e77825_x3a81acolor_laserjet_managed_flow_mfp_e87640_x3a90acolor_laserjet_managed_flow_mfp_e87640_z8z12alaserjet_managed_flow_mfp_e82540_x3a69acolor_laserjet_managed_flow_mfp_e78630_3sj34acolor_laserjet_managed_e65050_l3u57apagewide_managed_color_mfp_p77960_y3z62acolor_laserjet_enterprise_m553_b5l26alaserjet_managed_flow_mfp_e82540_x3a79alaserjet_managed_mfp_e72430_5rc89alaserjet_enterprise_mfp_m634_7ps94acolor_laserjet_managed_mfp_e78630_3sj33acolor_laserjet_managed_mfp_e87660_z8z14alaserjet_managed_mfp_e82560_x3a69acolor_laserjet_managed_flow_mfp_e786_5qj90apagewide_managed_color_mfp_p77950_y3z64acolor_laserjet_managed_mfp_e87740_5qk03acolor_laserjet_managed_mfp_e78625_5qk18acolor_laserjet_managed_flow_mfp_e67560_l3u70acolor_laserjet_managed_flow_mfp_e786_3sj12alaserjet_managed_flow_e82660_3sj08acolor_laserjet_managed_e75245_t3u64alaserjet_managed_flow_e82660_5qk09acolor_laserjet_enterprise_6700_6qn33alaserjet_managed_flow_mfp_e82550_z8z18acolor_laserjet_managed_flow_mfp_e87650_x3a86acolor_laserjet_managed_flow_mfp_e77830_x3a77alaserjet_enterprise_mfp_m634_7ps96alaserjet_managed_mfp_e82540du_5cm59acolor_laserjet_managed_mfp_e87760_3sj20alaserjet_managed_e82670_5qk13acolor_laserjet_managed_flow_mfp_e77825_z8z00acolor_laserjet_managed_mfp_e77825_z8z0acolor_laserjet_managed_mfp_e87650_z8z14acolor_laserjet_managed_flow_mfp_e786_5qk18alaserjet_managed_flow_mfp_m527z_f2a79acolor_laserjet_managed_mfp_e877_3sj36acolor_laserjet_enterprise_mfp_m682_j8a16alaserjet_managed_mfp_e731_5qk02acolor_laserjet_managed_flow_e87770_3sj35alaserjet_managed_flow_mfp_e62555_j8j73acolor_laserjet_managed_mfp_e78630_3sj11alaserjet_managed_e60065_m0p39alaserjet_managed_e60055_m0p33acolor_laserjet_managed_flow_mfp_e77822_z8z01alaserjet_managed_flow_mfp_e72525_x3a66alaserjet_managed_flow_mfp_e72535_z8z09acolor_laserjet_managed_flow_e87740_5qk20alaserjet_enterprise_mfp_m635_7ps99alaserjet_managed_flow_mfp_e82550_z8z22alaserjet_managed_flow_mfp_e72535_x3a65alaserjet_managed_mfp_e82540du_5rc84apagewide_managed_color_mfp_p77940_y3z63alaserjet_managed_flow_mfp_e72530_x3a62acolor_laserjet_managed_flow_mfp_e87650_z8z12alaserjet_managed_mfp_e73130_5qj98acolor_laserjet_managed_mfp_e77830_z8z02alaserjet_managed_flow_mfp_e731_3sj01acolor_laserjet_enterprise_flow_mfp_5800_6qn30alaserjet_managed_flow_mfp_e73140_6bs59alaserjet_enterprise_flow_mfp_m633_j8j76alaserjet_managed_mfp_e826dn_3sj08acolor_laserjet_managed_mfp_e87640_z8z13alaserjet_managed_flow_e82660_3sj28acolor_laserjet_managed_mfp_e78528_5qk15alaserjet_managed_e82650_3sj28acolor_laserjet_enterprise_m553_bl27acolor_laserjet_managed_mfp_e77825_x3a81apagewide_managed_color_mfp_p77950_y3z62acolor_laserjet_managed_flow_e87740_3sj37alaserjet_managed_mfp_e72525_z8z011acolor_laserjet_enterprise_flow_mfp_5800_58r10acolor_laserjet_managed_flow_mfp_e77830_x3a80apagewide_managed_color_mfp_p77960_y3z65acolor_laserjet_managed_flow_mfp_e87650_x3a92acolor_laserjet_managed_mfp_e77830_z8z00acolor_laserjet_managed_flow_mfp_e87640_x3a87acolor_laserjet_managed_mfp_e786_5qj94alaserjet_managed_flow_mfp_e82550_x3a69acolor_laserjet_managed_mfp_e78323_8gs26acolor_laserjet_managed_mfp_e87740_3sj36acolor_laserjet_managed_flow_mfp_e78635_5qj90acolor_laserjet_managed_flow_mfp_e87660_x3a86acolor_laserjet_managed_mfp_e786_3sj33acolor_laserjet_managed_mfp_e78330_8pe95acolor_laserjet_managed_mfp_e78630_5qk18apagewide_managed_color_flow_mfp_e77650z_j7z08alaserjet_enterprise_m407_3pz16apagewide_enterprise_color_flow_mfp_586z_g1w40acolor_laserjet_managed_flow_mfp_e87640_z8z14alaserjet_managed_flow_mfp_e73130_6bs59alaserjet_managed_flow_mfp_e73130_6bs57alaserjet_managed_e82670_3sj09acolor_laserjet_managed_e65150_3gy03acolor_laserjet_managed_mfp_e87760_3sj35alaserjet_managed_mfp_e82550_z8z23alaserjet_managed_mfp_e82540_z8z18acolor_laserjet_managed_mfp_e78330_9rt92acolor_laserjet_managed_flow_mfp_e77822_x3a78apagewide_managed_color_flow_mfp_e77650z_j7z14acolor_laserjet_managed_flow_e87770_3sj19apagewide_enterprise_color_556_g1w47acolor_laserjet_enterprise_mfp_m577_b5l54alaserjet_managed_flow_mfp_e72530_z8z07acolor_laserjet_enterprise_flow_mfp_m682_j8a17acolor_laserjet_managed_flow_mfp_e77825_x3a77alaserjet_managed_flow_mfp_e73140_6bs57acolor_laserjet_managed_mfp_e78223-e78228_8gs43alaserjet_managed_flow_mfp_e82560_z8z19laserjet_managed_mfp_e72525_z8z07acolor_laserjet_enterprise_6701_49l00acolor_laserjet_managed_mfp_e78223-e78228_8gs44alaserjet_managed_mfp_e73140_3sj01apagewide_color_755_4pz47apagewide_enterprise_color_mfp_780_j7z09acolor_laserjet_enterprise_flow_mfp_6800_6qn38acolor_laserjet_managed_mfp_e87740_3sj19acolor_laserjet_managed_flow_e87740_3sj21acolor_laserjet_managed_mfp_e78323_8gr96acolor_laserjet_managed_mfp_e87640du-e87660du_5fm81acolor_laserjet_managed_flow_mfp_e87640_x3a86apagewide_enterprise_color_flow_mfp_785_j7z12alaserjet_managed_mfp_e826dn_3sj30acolor_laserjet_managed_flow_e87740_5qk03apagewide_managed_color_e75160_j7z06alaserjet_managed_flow_e82670_3sj08acolor_laserjet_managed_mfp_e87740_5qk08acolor_laserjet_managed_mfp_e78330_8gr97alaserjet_managed_flow_mfp_e73135_6bs58afuturesmart_5laserjet_managed_mfp_e82540_az8z20alaserjet_managed_flow_e82660_3sj07apagewide_managed_color_mfp_p77950_y3z68acolor_laserjet_enterprise_m652_j7z99alaserjet_managed_e60065_m0p35alaserjet_managed_flow_mfp_e731_3sj02acolor_laserjet_managed_flow_e87760_5qk20apagewide_managed_color_flow_mfp_e58650z_l3u42acolor_laserjet_managed_mfp_e87640du-e87660du_5rc87alaserjet_managed_mfp_e62565_j8j79acolor_laserjet_managed_mfp_e87760_3sj19apagewide_managed_color_flow_mfp_e77660z_z5g79apagewide_managed_color_mfp_p77960_5zn99alaserjet_managed_flow_mfp_e72525_z8z010alaserjet_managed_flow_mfp_e73130_3sj01alaserjet_managed_e60165_3gy09acolor_laserjet_managed_mfp_e78223-e78228_17f27awcolor_laserjet_managed_mfp_e87770_3sj22alaserjet_managed_flow_mfp_e72525_z8z07alaserjet_managed_flow_mfp_e826z_5qk13alaserjet_managed_mfp_e82540_x3a79apagewide_managed_color_mfp_p77950_y3z65apagewide_managed_color_flow_mfp_e77650z_j7z03acolor_laserjet_managed_mfp_e785dn_5qj83acolor_laserjet_managed_mfp_e78323_8gr99acolor_laserjet_managed_mfp_e77825_x3a77acolor_laserjet_managed_mfp_e77830_x3a80alaserjet_managed_mfp_e72530_z8z06alaserjet_managed_flow_mfp_e82550_x3a72acolor_laserjet_managed_mfp_e87760_3sj38alaserjet_managed_flow_mfp_e731_6bs57alaserjet_managed_flow_mfp_e72535_z8z011alaserjet_managed_flow_mfp_e72530_z8z06alaserjet_managed_flow_e82660_5qk13apagewide_enterprise_color_556_g1w47vcolor_laserjet_managed_mfp_e87640_x3a86alaserjet_managed_mfp_e82550du_5rc83alaserjet_managed_mfp_e82560_x3a72acolor_laserjet_managed_mfp_e78330_9rt91acolor_laserjet_managed_e45028_3qa35acolor_laserjet_managed_flow_mfp_e77822_x3a80alaserjet_managed_e82660_5qk09acolor_laserjet_enterprise_mfp_6800_49k84acolor_laserjet_managed_mfp_e87640_x3a90acolor_laserjet_managed_flow_mfp_e786_3sj33apagewide_enterprise_color_flow_mfp_586z_g1w39alaserjet_managed_flow_mfp_e82560_x3a68acolor_laserjet_managed_mfp_e78528_5qj83alaserjet_managed_flow_mfp_e73140_5qj98acolor_laserjet_managed_flow_mfp_e78625_3sj34acolor_laserjet_managed_flow_mfp_e78630_3sj13acolor_laserjet_managed_flow_mfp_e78630_3sj11alaserjet_managed_e60175_3gy12apagewide_managed_color_p75250_y3z49apagewide_managed_color_mfp_p77960_y3z61alaserjet_managed_flow_e82650_3sj08apagewide_managed_color_mfp_e58650dn_l3u43alaserjet_enterprise_m608_k0q17alaserjet_enterprise_m506_f2a67acolor_laserjet_managed_flow_mfp_e78635_3sj34alaserjet_enterprise_flow_mfp_m527z_f2a81acolor_laserjet_managed_flow_mfp_e77822_z8z05alaserjet_managed_mfp_m527_f2a79acolor_laserjet_managed_mfp_e67560_l3u66acolor_laserjet_managed_mfp_e77822_x3a80alaserjet_enterprise_mfp_m528_1pv65alaserjet_managed_flow_e82670_3sj29acolor_laserjet_managed_flow_mfp_e87640_z8z15apagewide_color_mfp_779_4pz45apagewide_managed_color_mfp_p77950_y3z63acolor_laserjet_managed_mfp_e78223-e78228_8gs12alaserjet_managed_mfp_e82560_x3a75alaserjet_enterprise_m612_7ps86acolor_laserjet_managed_mfp_e47528_3qa75alaserjet_managed_mfp_e72430_5cm71alaserjet_managed_mfp_e73140_5qk02acolor_laserjet_managed_mfp_e77825_x3a83alaserjet_managed_mfp_e826dn_3sj28alaserjet_managed_mfp_e731_3sj00alaserjet_managed_mfp_e72430_5cm72acolor_laserjet_managed_mfp_e87770_5qk03acolor_laserjet_managed_mfp_e87760_5qk03alaserjet_managed_mfp_e62655_3gy14acolor_laserjet_managed_flow_mfp_e67550_l3u70acolor_laserjet_managed_flow_e87770_5qk08alaserjet_managed_mfp_e82550_x3a79alaserjet_managed_flow_mfp_e73140_3sj01alaserjet_managed_mfp_e72535_x3a63alaserjet_managed_flow_mfp_e52545c_3gy20acolor_laserjet_enterprise_mfp_6800_6qn37alaserjet_managed_flow_mfp_e62555_j8j80alaserjet_managed_flow_mfp_e72530_x3a66acolor_laserjet_managed_mfp_e78323_8gr95adigital_sender_flow_8500_fn2_l2762alaserjet_managed_mfp_e82560_z8z19scanjet_enterprise_flow_n9120_fn2_l2763alaserjet_managed_mfp_e73130_6bs58alaserjet_managed_flow_e82670_3sj30alaserjet_managed_flow_mfp_e73140_6bs58alaserjet_managed_mfp_e62655_3gy15apagewide_managed_color_mfp_p77950_2gp23apagewide_managed_color_mfp_p77940_y3z64alaserjet_managed_mfp_e82550du_5fm76apagewide_managed_color_mfp_e77650_j7z13acolor_laserjet_managed_flow_mfp_e77830_z8z05alaserjet_managed_mfp_e62555_j8j66alaserjet_managed_flow_e82650_3sj07alaserjet_managed_flow_mfp_e73130_5qk02acolor_laserjet_managed_flow_e87750_3sj37acolor_laserjet_managed_flow_mfp_e77822_z8z04apagewide_managed_color_mfp_p77940_2gp26alaserjet_enterprise_mfp_m430_3pz55acolor_laserjet_managed_mfp_e87760_3sj22alaserjet_enterprise_m609_k0q20acolor_laserjet_managed_flow_mfp_e87660_z8z14alaserjet_managed_mfp_e82560du_5rc83alaserjet_managed_mfp_e82550_x3a72acolor_laserjet_managed_flow_mfp_e87660_x3a90alaserjet_managed_mfp_e62555_j8j73alaserjet_managed_mfp_e62665_3gy14alaserjet_managed_e60165_3gy10acolor_laserjet_managed_mfp_e77822_z8z0acolor_laserjet_enterprise_mfp_m681_j8a12alaserjet_managed_e40040_3pz35apagewide_managed_color_mfp_p77940_y3z65acolor_laserjet_managed_flow_e87760_3sj19alaserjet_managed_flow_mfp_e82540_az8z20acolor_laserjet_managed_mfp_e87750_3sj22acolor_laserjet_managed_flow_mfp_e77822_x3a83alaserjet_managed_flow_mfp_e82540_x3a71alaserjet_managed_flow_mfp_e72525_z8z06acolor_laserjet_managed_mfp_e87740_3sj21alaserjet_managed_flow_mfp_e62575_j8j73acolor_laserjet_managed_flow_mfp_e78630_5qk18acolor_laserjet_managed_flow_mfp_e87650_x3a90acolor_laserjet_managed_mfp_e77822_z8z02apagewide_enterprise_color_mfp_586_g1w41alaserjet_managed_flow_e82650_3sj30alaserjet_enterprise_m506_f2a69alaserjet_managed_mfp_e82540_x3a71acolor_laserjet_managed_mfp_e87750_5qk03acolor_laserjet_managed_flow_e87770_3sj38alaserjet_managed_mfp_e82550_z8z19color_laserjet_managed_mfp_e78330_8gr96alaserjet_enterprise_flow_mfp_m633_j8j78alaserjet_managed_mfp_e826dn_3sj09acolor_laserjet_enterprise_mfp_6800_6qn35alaserjet_managed_e82660_3sj09alaserjet_managed_mfp_e73130_6bs57acolor_laserjet_managed_mfp_e67550_l3u69alaserjet_managed_mfp_e82560du_5fm76acolor_laserjet_enterprise_x55745_6qp97acolor_laserjet_enterprise_mfp_x57945_6qp98acolor_laserjet_managed_mfp_e877_5qk03alaserjet_managed_flow_mfp_e826z_3sj09alaserjet_managed_e50145_1pu52acolor_laserjet_managed_mfp_e78625_5qj94acolor_laserjet_managed_mfp_e786_3sj12alaserjet_managed_flow_mfp_e72525_z8z09acolor_laserjet_managed_mfp_e87740_3sj37acolor_laserjet_managed_mfp_e78223-e78228_8gs36alaserjet_managed_flow_mfp_e82540_z8z18alaserjet_enterprise_m612_7ps88acolor_laserjet_managed_m553_b5l24acolor_laserjet_managed_mfp_e87770_3sj19alaserjet_enterprise_m507_1pv86alaserjet_managed_mfp_e72425_5cm68acolor_laserjet_enterprise_m555_7zu81acolor_laserjet_managed_mfp_e877_3sj35acolor_laserjet_managed_mfp_e78223-e78228_8gs15acolor_laserjet_managed_mfp_e78635_5qj90acolor_laserjet_managed_mfp_m577_b5l49apagewide_managed_color_mfp_p77940_y3z66alaserjet_managed_mfp_e730_5qj87acolor_laserjet_managed_e65060_l3u55alaserjet_managed_mfp_e82550_x3a82apagewide_enterprise_color_flow_mfp_586z_g1w41acolor_laserjet_managed_mfp_e87650_x3a87apagewide_enterprise_color_556_g1w46vlaserjet_managed_flow_mfp_e82540_x3a68alaserjet_managed_m506_f2a70alaserjet_managed_mfp_e73025_3sj03acolor_laserjet_managed_mfp_e77830_x3a78acolor_laserjet_managed_flow_mfp_e87660_z8z12acolor_laserjet_managed_mfp_e87640_x3a87acolor_laserjet_enterprise_mfp_x57945_49k97avlaserjet_managed_mfp_e73030_3sj04acolor_laserjet_managed_mfp_e78330_8pe98acolor_laserjet_managed_mfp_e78625_3sj11alaserjet_managed_mfp_e73130_5qk02acolor_laserjet_managed_mfp_e78635_3sj33apagewide_managed_color_flow_mfp_e58650z_l3u43alaserjet_enterprise_m507_1pv89alaserjet_managed_flow_mfp_e62675_3gy14acolor_laserjet_managed_flow_mfp_e77825_z8z0alaserjet_managed_mfp_e82550du_5cm59alaserjet_managed_mfp_e82550du_5fm77alaserjet_managed_mfp_e82550_x3a71alaserjet_managed_flow_mfp_e731_3sj00alaserjet_managed_mfp_e72530_x3a66acolor_laserjet_managed_flow_mfp_e78625_3sj32acolor_laserjet_managed_mfp_e87660_z8z13apagewide_managed_color_mfp_p77960_2gp26acolor_laserjet_managed_flow_mfp_e77825_z8z05acolor_laserjet_managed_mfp_e87760_3sj21alaserjet_managed_mfp_e72425_5cm69alaserjet_enterprise_flow_mfp_m632_j8j71alaserjet_managed_mfp_e62555_j8j80acolor_laserjet_managed_mfp_e87640du-e87660du_5rc86acolor_laserjet_managed_e85055_t3u66acolor_laserjet_managed_mfp_e87770_3sj38alaserjet_enterprise_mfp_m632_j8j71acolor_laserjet_enterprise_m751_t3u43alaserjet_managed_flow_mfp_e826z_3sj07alaserjet_managed_flow_e82650_5qk13alaserjet_managed_flow_mfp_e826z_3sj30acolor_laserjet_managed_flow_mfp_e77822_z8z00acolor_laserjet_managed_flow_mfp_e78630_3sj32alaserjet_enterprise_mfp_m528_1pv66alaserjet_managed_flow_mfp_e52545c_3gy19alaserjet_managed_flow_mfp_e62575_j8j79alaserjet_managed_e60075_m0p36alaserjet_managed_flow_e82660_3sj29acolor_laserjet_managed_flow_e87770_3sj22apagewide_managed_color_mfp_p77440_y3z60acolor_laserjet_managed_mfp_e77825_z8z02apagewide_managed_color_mfp_p77960_2gp23acolor_laserjet_managed_flow_e87750_3sj21alaserjet_managed_mfp_e73140_6bs59acolor_laserjet_managed_e65160_3gy03alaserjet_managed_mfp_e73135_5qk02acolor_laserjet_managed_mfp_e87770_3sj37acolor_laserjet_managed_flow_mfp_e87660_x3a92acolor_laserjet_managed_mfp_e78223-e78228_19gsawlaserjet_managed_flow_mfp_e72535_x3a59alaserjet_managed_flow_mfp_e82560_x3a75acolor_laserjet_enterprise_mfp_m776_t3u55alaserjet_managed_flow_mfp_e82550_x3a74acolor_laserjet_enterprise_flow_mfp_x57945_6qp98acolor_laserjet_managed_mfp_e87640du-e87660du_5fm82acolor_laserjet_enterprise_6701_6qn33acolor_laserjet_enterprise_mfp_5800_6qn30acolor_laserjet_enterprise_flow_mfp_6800_6qn36acolor_laserjet_managed_mfp_e877_5qk08alaserjet_managed_flow_mfp_e73135_3sj02acolor_laserjet_managed_mfp_e77830_x3a77alaserjet_managed_flow_mfp_e73135_5qk02alaserjet_managed_mfp_e62565_j8j73apagewide_managed_color_mfp_p77950_2gp26acolor_laserjet_enterprise_flow_mfp_m577_b5l46alaserjet_managed_mfp_e52545_3gy20alaserjet_managed_e82660_3sj28alaserjet_managed_mfp_e731_5qj98apagewide_managed_color_mfp_p77940_y3z61alaserjet_managed_e82650_5qk09alaserjet_managed_mfp_e62565_j8j80alaserjet_managed_e82660_3sj08acolor_laserjet_managed_flow_mfp_e78635_5qj94acolor_laserjet_managed_mfp_e87750_3sj35acolor_laserjet_managed_mfp_e87750_3sj37acolor_laserjet_managed_flow_e87770_3sj37acolor_laserjet_managed_mfp_e78635_3sj11alaserjet_enterprise_mfp_m527_f2a77alaserjet_managed_flow_e82650_5qk09acolor_laserjet_managed_mfp_e87650_x3a86alaserjet_enterprise_mfp_m635_7ps97alaserjet_managed_mfp_e826dn_5qk09acolor_laserjet_managed_flow_mfp_e87650_z8z15acolor_laserjet_managed_mfp_e87750_5qk08apagewide_managed_color_mfp_p77940_5zn98acolor_laserjet_enterprise_5700_49k98alaserjet_enterprise_flow_mfp_m636_7pt01alaserjet_managed_mfp_e82560du_5fm77alaserjet_managed_flow_e82670_5qk09alaserjet_managed_flow_mfp_e72535_x3a62alaserjet_enterprise_m611_7ps85acolor_laserjet_enterprise_6701_58m42alaserjet_enterprise_mfp_m527_f2a78acolor_laserjet_managed_mfp_e78323_8pe98alaserjet_managed_flow_mfp_e731_5qk02alaserjet_managed_mfp_e72535_z8z010alaserjet_managed_flow_mfp_e72530_x3a59apagewide_managed_color_mfp_p77950_5zn99apagewide_managed_color_mfp_p77960_5zp01acolor_laserjet_managed_mfp_e67560_l3u67alaserjet_managed_flow_mfp_e82560_az8z20acolor_laserjet_managed_flow_mfp_e78630_3sj33acolor_laserjet_managed_mfp_e87640du-e87660du_5cm64alaserjet_enterprise_flow_mfp_m632_j8j70alaserjet_managed_flow_e82660_3sj30alaserjet_managed_mfp_e62655_3gy18alaserjet_managed_mfp_e72530_z8z011apagewide_managed_color_mfp_p77940_2gp25acolor_laserjet_managed_mfp_e786_5qk18acolor_laserjet_managed_mfp_e87770_3sj35apagewide_enterprise_color_mfp_586_g1w40alaserjet_managed_mfp_e82560_z8z18acolor_laserjet_enterprise_mfp_m480_3qa55acolor_laserjet_managed_flow_mfp_e87660_z8z13acolor_laserjet_enterprise_flow_mfp_6800_49k84acolor_laserjet_managed_m553_b5l38alaserjet_managed_mfp_e72525_x3a62alaserjet_managed_e82660_3sj30alaserjet_managed_mfp_e52645_1ps55acolor_laserjet_managed_mfp_e78630_3sj32acolor_laserjet_managed_mfp_e87650_z8z15acolor_laserjet_managed_mfp_e77830_z8z0alaserjet_managed_mfp_e82550_x3a74acolor_laserjet_managed_mfp_e87640du-e87660du_5cm63acolor_laserjet_managed_mfp_e877_3sj38alaserjet_managed_flow_mfp_e62565_j8j74alaserjet_managed_flow_mfp_e72530_x3a65acolor_laserjet_enterprise_m554_7zu79acolor_laserjet_enterprise_m555_7zu79acolor_laserjet_enterprise_mfp_m578_7zu87alaserjet_managed_flow_mfp_e72535_z8z07alaserjet_managed_flow_mfp_m527z_f2a80alaserjet_managed_mfp_e72425_5rc90alaserjet_enterprise_flow_mfp_m635_7ps98acolor_laserjet_enterprise_m553_b5l38alaserjet_managed_flow_mfp_e73130_6bs58alaserjet_enterprise_mfp_m635_7ps98apagewide_managed_color_mfp_e77650_j7z14acolor_laserjet_managed_mfp_e77822_x3a78alaserjet_managed_flow_mfp_e62555_j8j66acolor_laserjet_managed_mfp_e87650_z8z13alaserjet_managed_mfp_e62565_j8j66alaserjet_managed_mfp_e73130_3sj00alaserjet_managed_mfp_e82540_x3a74alaserjet_managed_e82670_3sj30apagewide_managed_color_flow_mfp_e77650z_j7z07acolor_laserjet_managed_flow_mfp_e77825_x3a84alaserjet_enterprise_mfp_m528_1pv64acolor_laserjet_managed_flow_mfp_e87640_x3a92acolor_laserjet_managed_mfp_e78330_8gs01acolor_laserjet_managed_flow_e87740_3sj20acolor_laserjet_managed_mfp_e77830_z8z04alaserjet_managed_mfp_e82540du_5fm76alaserjet_managed_mfp_e72535_x3a65acolor_laserjet_enterprise_m652_j7z98acolor_laserjet_managed_mfp_e87660_x3a92acolor_laserjet_managed_flow_e87750_3sj38acolor_laserjet_managed_m553_b5l26alaserjet_managed_mfp_e731_6bs59acolor_laserjet_managed_flow_e87740_5qk08alaserjet_managed_e82650_3sj29acolor_laserjet_managed_mfp_e87770_3sj20acolor_laserjet_managed_flow_e87750_3sj35acolor_laserjet_managed_e65150_3gy04alaserjet_managed_flow_mfp_e62575_j8j80alaserjet_managed_mfp_e72530_z8z07acolor_laserjet_managed_mfp_e87770_5qk08alaserjet_managed_flow_mfp_e73135_6bs57acolor_laserjet_managed_flow_mfp_e77822_x3a77alaserjet_managed_mfp_e62665_3gy18acolor_laserjet_managed_flow_mfp_e786_3sj34acolor_laserjet_managed_mfp_e87740_5qk20alaserjet_enterprise_mfp_m528_1pv67apagewide_managed_color_flow_mfp_e77660z_j7z13alaserjet_managed_m506_f2a67acolor_laserjet_managed_mfp_e87660_z8z12acolor_laserjet_managed_mfp_e78330_8gr95acolor_laserjet_enterprise_m554_7zu78acolor_laserjet_managed_mfp_e87750_3sj20acolor_laserjet_managed_mfp_e87640_z8z15alaserjet_managed_mfp_e82550_z8z18acolor_laserjet_enterprise_m553_b5l39acolor_laserjet_managed_mfp_e77825_z8z05alaserjet_managed_mfp_e82560du_5cm59acolor_laserjet_managed_flow_mfp_e57540_3gy25alaserjet_managed_flow_mfp_e72525_z8z011alaserjet_managed_flow_mfp_e72530_z8z08acolor_laserjet_enterprise_m553_b5l24acolor_laserjet_managed_flow_mfp_e78630_5qj90alaserjet_managed_flow_mfp_e82550_z8z19laserjet_managed_e60065_m0p33alaserjet_managed_flow_mfp_e82560_x3a72acolor_laserjet_managed_mfp_e87660_x3a89alaserjet_managed_mfp_e73135_6bs59acolor_laserjet_enterprise_flow_mfp_m681_j8a11acolor_laserjet_enterprise_6700_58m42acolor_laserjet_managed_mfp_e87740_3sj20acolor_laserjet_managed_mfp_e87640_x3a93aCertain HP Enterprise LaserJet, LaserJet Managed printers
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4284
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.87% / 74.83%
||
7 Day CHG~0.00%
Published-27 Dec, 2022 | 09:51
Updated-17 May, 2024 | 02:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenMRS HTML Form Entry UI Framework Integration Module cross site scripting

A vulnerability classified as problematic has been found in OpenMRS HTML Form Entry UI Framework Integration Module up to 1.x. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is 811990972ea07649ae33c4b56c61c3b520895f07. It is recommended to upgrade the affected component. The identifier VDB-216873 was assigned to this vulnerability.

Action-Not Available
Vendor-openmrsOpenMRS
Product-htmlformentryuiHTML Form Entry UI Framework Integration Module
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42357
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-6.1||MEDIUM
EPSS-10.41% / 93.08%
||
7 Day CHG~0.00%
Published-17 Jan, 2022 | 19:25
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DOM based XSS Vulnerability in Apache Knox

When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.

Action-Not Available
Vendor-The Apache Software Foundation
Product-knoxApache Knox
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-14076
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 19.24%
||
7 Day CHG~0.00%
Published-19 Feb, 2026 | 04:36
Updated-19 Feb, 2026 | 20:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iXML – Google XML sitemap generator <= 0.6 - Reflected Cross-Site Scripting via 'iXML_email' Parameter

The iXML – Google XML sitemap generator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'iXML_email' parameter in all versions up to, and including, 0.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-icount
Product-iXML – Google XML sitemap generator
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5140
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-0.12% / 30.67%
||
7 Day CHG~0.00%
Published-20 Nov, 2023 | 18:55
Updated-02 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bonus for Woo < 5.8.3 - Reflected Cross-Site Scripting

The Bonus for Woo WordPress plugin before 5.8.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

Action-Not Available
Vendor-computyUnknown
Product-bonus_for_wooBonus for Woo
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42546
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-4.7||MEDIUM
EPSS-0.78% / 73.38%
||
7 Day CHG~0.00%
Published-13 Dec, 2021 | 10:54
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected XSS in search functionality of WP Cloud Plugins - Use-Your-Drive

Insufficient Input Validation in the search functionality of Wordpress plugin Use-Your-Drive prior to 1.18.3 allows unauthenticated user to craft a reflected Cross-Site Scripting attack.

Action-Not Available
Vendor-wpcloudpluginsWP Cloud Plugins
Product-use-your-driveUse-Your-Drive
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4265
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.39% / 59.26%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 00:00
Updated-19 Nov, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
siwapp-ror cross site scripting

A vulnerability was found in siwapp-ror. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 924d16008cfcc09356c87db01848e45290cb58ca. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216467.

Action-Not Available
Vendor-siwappunspecified
Product-siwapp-rorsiwapp-ror
CWE ID-CWE-707
Improper Neutralization
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-4302
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.25% / 47.64%
||
7 Day CHG~0.00%
Published-04 Jan, 2023 | 21:24
Updated-10 Apr, 2025 | 13:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
slackero phpwcms SVG File cross site scripting

A vulnerability was found in slackero phpwcms up to 1.9.26. It has been classified as problematic. This affects an unknown part of the component SVG File Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.9.27 is able to address this issue. The patch is named b39db9c7ad3800f319195ff0e26a0981395b1c54. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217419.

Action-Not Available
Vendor-phpwcmsslackero
Product-phpwcmsphpwcms
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42648
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 60.09%
||
7 Day CHG~0.00%
Published-11 May, 2022 | 17:34
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability exists in Coder Code-Server before 3.12.0, allows attackers to execute arbitrary code via crafted URL.

Action-Not Available
Vendor-codern/a
Product-code-servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-42112
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.58% / 68.35%
||
7 Day CHG~0.00%
Published-08 Oct, 2021 | 20:45
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The "File upload question" functionality in LimeSurvey 3.x-LTS through 3.27.18 allows XSS in assets/scripts/modaldialog.js and assets/scripts/uploader.js.

Action-Not Available
Vendor-limesurveyn/a
Product-limesurveyn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 199
  • 200
  • Next
Details not found