[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-7013":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":49},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":46,"name":47,"published":48,"updated":27},7013,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},3,"OpenVAS",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":33,"epss_score":34,"epss_percentile":35,"cve":36,"in_cisa_catalog":45,"date":27,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"high","Successful exploitation will allow remote attackers to do redirection, XSS, authentication bypass, SQL Injection and denial of services attacks.","Cybozu Garoon is prone to multiple vulnerabilities.","Update to version 4.2.3 or later.",[],8.8,0.03534,0.87635,[37,38,39,40,41,42,43,44],"CVE-2016-4906","CVE-2016-4907","CVE-2016-4908","CVE-2016-4909","CVE-2016-4910","CVE-2016-7801","CVE-2016-7802","CVE-2016-7803",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.108176","Cybozu Garoon 3.0.0 - 4.2.2 Multiple Vulnerabilities","2018-01-02T00:00:00Z",["Island",50],{"key":51,"params":52,"result":54},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":53},"{\"text-color\":\"gray\"}",{"head":55},{}]