Show filters
26 Total Results
Displaying 21-26 of 26
Sort by:
Attacker Value
Unknown
CVE-2014-6261
Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 does not properly implement the Check For Updates feature, which allows remote attackers to execute arbitrary code by (1) spoofing the callhome server or (2) deploying a crafted web site that is visited during a login session, aka ZEN-12657.
0
Attacker Value
Unknown
CVE-2014-9247
Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 allows remote authenticated users to obtain sensitive (1) user account, (2) e-mail address, and (3) role information by visiting the ZenUsers (aka User Manager) page, aka ZEN-15389.
0
Attacker Value
Unknown
CVE-2014-3739
Disclosure Date: May 20, 2014 (last updated October 05, 2023)
Open redirect vulnerability in zport/acl_users/cookieAuthHelper/login_form in Zenoss 4.2.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the came_from parameter.
0
Attacker Value
Unknown
CVE-2014-3738
Disclosure Date: May 20, 2014 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in Zenoss 4.2.5 allows remote attackers to inject arbitrary web script or HTML via the title of a device.
0
Attacker Value
Unknown
CVE-2010-0713
Disclosure Date: February 26, 2010 (last updated October 04, 2023)
Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss 2.3.3, and other versions before 2.5, allow remote attackers to hijack the authentication of an administrator for (1) requests that reset user passwords via zport/dmd/ZenUsers/admin, and (2) requests that change user commands, which allows for remote execution of system commands via zport/dmd/userCommands/.
0
Attacker Value
Unknown
CVE-2010-0712
Disclosure Date: February 26, 2010 (last updated October 04, 2023)
Multiple SQL injection vulnerabilities in zport/dmd/Events/getJSONEventsInfo in Zenoss 2.3.3, and other versions before 2.5, allow remote authenticated users to execute arbitrary SQL commands via the (1) severity, (2) state, (3) filter, (4) offset, and (5) count parameters.
0