Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zenoss zenoss core 4.2.5 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2014-6262
Multiple format string vulnerabilities in the python module in RRDtool, as used in Zenoss Core prior to 4.2.5 and other products, allow remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted third argument to the rrdtool.gr...
Zenoss Zenoss Core
Debian Debian Linux 8.0
383
VMScore
CVE-2014-6254
Multiple cross-site scripting (XSS) vulnerabilities in Zenoss Core through 5 Beta 3 allow remote malicious users to inject arbitrary web script or HTML via an attribute in a (1) device name, (2) device detail, (3) report name, (4) report detail, or (5) portlet name, or (6) a stri...
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 4.2.5
668
VMScore
CVE-2014-6256
Zenoss Core through 5 Beta 3 allows remote malicious users to bypass intended access restrictions and place files in a directory with public (1) read or (2) execute access via a move action, aka ZEN-15386.
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core
570
VMScore
CVE-2014-6255
Open redirect vulnerability in the login form in Zenoss Core prior to 4.2.5 SP161 allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via the came_from parameter, aka ZEN-11998.
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 4.2.3
445
VMScore
CVE-2014-6259
Zenoss Core through 5 Beta 3 does not properly detect recursion during entity expansion, which allows remote malicious users to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, aka ZEN-15414, ...
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 4.2.4
605
VMScore
CVE-2014-6253
Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss Core through 5 Beta 3 allow remote malicious users to hijack the authentication of arbitrary users, aka ZEN-12653.
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core
445
VMScore
CVE-2014-6257
Zenoss Core through 5 Beta 3 allows remote malicious users to bypass intended access restrictions by using a web-endpoint URL to invoke an object helper method, aka ZEN-15407.
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 4.2.5
445
VMScore
CVE-2014-6258
An unspecified endpoint in Zenoss Core through 5 Beta 3 allows remote malicious users to cause a denial of service (CPU consumption) by triggering an arbitrary regular-expression match attempt, aka ZEN-15411.
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core
605
VMScore
CVE-2014-6260
Zenoss Core through 5 Beta 3 does not require a password for modifying the pager command string, which allows remote malicious users to execute arbitrary commands or cause a denial of service (paging outage) by leveraging an unattended workstation, aka ZEN-15412.
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
828
VMScore
CVE-2014-6261
Zenoss Core through 5 Beta 3 does not properly implement the Check For Updates feature, which allows remote malicious users to execute arbitrary code by (1) spoofing the callhome server or (2) deploying a crafted web site that is visited during a login session, aka ZEN-12657.
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 4.2.5
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »