Show filters
15 Total Results
Displaying 11-15 of 15
Sort by:
Attacker Value
Unknown

CVE-2014-9248

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 does not require complex passwords, which makes it easier for remote attackers to obtain access via a brute-force attack, aka ZEN-15406.
0
Attacker Value
Unknown

CVE-2014-6256

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 allows remote attackers to bypass intended access restrictions and place files in a directory with public (1) read or (2) execute access via a move action, aka ZEN-15386.
0
Attacker Value
Unknown

CVE-2014-9251

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 uses a weak algorithm to hash passwords, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack on hash values in the database, aka ZEN-15413.
0
Attacker Value
Unknown

CVE-2014-6261

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 does not properly implement the Check For Updates feature, which allows remote attackers to execute arbitrary code by (1) spoofing the callhome server or (2) deploying a crafted web site that is visited during a login session, aka ZEN-12657.
0
Attacker Value
Unknown

CVE-2014-9247

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 allows remote authenticated users to obtain sensitive (1) user account, (2) e-mail address, and (3) role information by visiting the ZenUsers (aka User Manager) page, aka ZEN-15389.
0