Show filters
26 Total Results
Displaying 1-10 of 26
Sort by:
Attacker Value
Unknown

CVE-2018-25063

Disclosure Date: January 01, 2023 (last updated October 20, 2023)
A vulnerability classified as problematic was found in Zenoss Dashboard up to 1.3.4. Affected by this vulnerability is an unknown functionality of the file ZenPacks/zenoss/Dashboard/browser/resources/js/defaultportlets.js. The manipulation of the argument HTMLString leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.5 is able to address this issue. The identifier of the patch is f462285a0a2d7e1a9255b0820240b94a43b00a44. It is recommended to upgrade the affected component. The identifier VDB-217153 was assigned to this vulnerability.
Attacker Value
Unknown

CVE-2014-6262

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Multiple format string vulnerabilities in the python module in RRDtool, as used in Zenoss Core before 4.2.5 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted third argument to the rrdtool.graph function, aka ZEN-15415, a related issue to CVE-2013-2131.
Attacker Value
Unknown

CVE-2019-14258

Disclosure Date: August 21, 2019 (last updated November 27, 2024)
The XML-RPC subsystem in Zenoss 2.5.3 allows XXE attacks that lead to unauthenticated information disclosure via port 9988.
0
Attacker Value
Unknown

CVE-2019-14257

Disclosure Date: August 21, 2019 (last updated November 27, 2024)
pyraw in Zenoss 2.5.3 allows local privilege escalation by modifying environment variables to redirect execution before privileges are dropped, aka ZEN-31765.
0
Attacker Value
Unknown

CVE-2014-6254

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in Zenoss Core through 5 Beta 3 allow remote attackers to inject arbitrary web script or HTML via an attribute in a (1) device name, (2) device detail, (3) report name, (4) report detail, or (5) portlet name, or (6) a string to a helper method, aka ZEN-15381 and ZEN-15410.
0
Attacker Value
Unknown

CVE-2014-9250

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 does not include the HTTPOnly flag in a Set-Cookie header for the authentication cookie, which makes it easier for remote attackers to obtain credential information via script access to this cookie, aka ZEN-10418.
0
Attacker Value
Unknown

CVE-2014-9386

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core before 4.2.5 SP161 sets an infinite lifetime for the session ID cookie, which makes it easier for remote attackers to hijack sessions by leveraging an unattended workstation, aka ZEN-12691.
0
Attacker Value
Unknown

CVE-2014-6260

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 does not require a password for modifying the pager command string, which allows remote attackers to execute arbitrary commands or cause a denial of service (paging outage) by leveraging an unattended workstation, aka ZEN-15412.
0
Attacker Value
Unknown

CVE-2014-6257

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 allows remote attackers to bypass intended access restrictions by using a web-endpoint URL to invoke an object helper method, aka ZEN-15407.
0
Attacker Value
Unknown

CVE-2014-9252

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Zenoss Core through 5 Beta 3 stores cleartext passwords in the session database, which might allow local users to obtain sensitive information by reading database entries, aka ZEN-15416.
0