Show filters
19 Total Results
Displaying 11-19 of 19
Sort by:
Attacker Value
Unknown

CVE-2014-9245

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 allows remote attackers to obtain sensitive information by attempting a product-rename action with an invalid new name and then reading a stack trace, as demonstrated by internal URL information, aka ZEN-15382.
0
Attacker Value
Unknown

CVE-2014-6258

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
An unspecified endpoint in Zenoss Core through 5 Beta 3 allows remote attackers to cause a denial of service (CPU consumption) by triggering an arbitrary regular-expression match attempt, aka ZEN-15411.
0
Attacker Value
Unknown

CVE-2014-6255

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Open redirect vulnerability in the login form in Zenoss Core before 4.2.5 SP161 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the came_from parameter, aka ZEN-11998.
0
Attacker Value
Unknown

CVE-2014-9248

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 does not require complex passwords, which makes it easier for remote attackers to obtain access via a brute-force attack, aka ZEN-15406.
0
Attacker Value
Unknown

CVE-2014-6256

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 allows remote attackers to bypass intended access restrictions and place files in a directory with public (1) read or (2) execute access via a move action, aka ZEN-15386.
0
Attacker Value
Unknown

CVE-2014-9251

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 uses a weak algorithm to hash passwords, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack on hash values in the database, aka ZEN-15413.
0
Attacker Value
Unknown

CVE-2014-9249

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
The default configuration of Zenoss Core before 5 allows remote attackers to read or modify database information by connecting to unspecified open ports, aka ZEN-15408.
0
Attacker Value
Unknown

CVE-2014-6261

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 does not properly implement the Check For Updates feature, which allows remote attackers to execute arbitrary code by (1) spoofing the callhome server or (2) deploying a crafted web site that is visited during a login session, aka ZEN-12657.
0
Attacker Value
Unknown

CVE-2014-9247

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 allows remote authenticated users to obtain sensitive (1) user account, (2) e-mail address, and (3) role information by visiting the ZenUsers (aka User Manager) page, aka ZEN-15389.
0