Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zenoss vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2018-25063
A vulnerability classified as problematic was found in Zenoss Dashboard up to 1.3.4. Affected by this vulnerability is an unknown functionality of the file ZenPacks/zenoss/Dashboard/browser/resources/js/defaultportlets.js. The manipulation of the argument HTMLString leads to cros...
Zenoss Dashboard
5
CVSSv2
CVE-2014-6262
Multiple format string vulnerabilities in the python module in RRDtool, as used in Zenoss Core prior to 4.2.5 and other products, allow remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted third argument to the rrdtool.gr...
Zenoss Zenoss Core
Debian Debian Linux 8.0
5
CVSSv2
CVE-2019-14258
The XML-RPC subsystem in Zenoss 2.5.3 allows XXE attacks that lead to unauthenticated information disclosure via port 9988.
Zenoss Zenoss 2.5.3
7.2
CVSSv2
CVE-2019-14257
pyraw in Zenoss 2.5.3 allows local privilege escalation by modifying environment variables to redirect execution before privileges are dropped, aka ZEN-31765.
Zenoss Zenoss 2.5.3
5
CVSSv2
CVE-2013-2131
Format string vulnerability in the rrdtool module 1.4.7 for Python, as used in Zenoss, allows context-dependent malicious users to cause a denial of service (crash) via format string specifiers to the rrdtool.graph function.
Rrdtool Project Rrdtool 1.4.7
1 EDB exploit
5
CVSSv2
CVE-2014-9248
Zenoss Core through 5 Beta 3 does not require complex passwords, which makes it easier for remote malicious users to obtain access via a brute-force attack, aka ZEN-15406.
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.1.0
7.5
CVSSv2
CVE-2014-9249
The default configuration of Zenoss Core prior to 5 allows remote malicious users to read or modify database information by connecting to unspecified open ports, aka ZEN-15408.
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
6.8
CVSSv2
CVE-2014-6253
Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss Core through 5 Beta 3 allow remote malicious users to hijack the authentication of arbitrary users, aka ZEN-12653.
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core
6.4
CVSSv2
CVE-2014-6255
Open redirect vulnerability in the login form in Zenoss Core prior to 4.2.5 SP161 allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via the came_from parameter, aka ZEN-11998.
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 4.2.3
5
CVSSv2
CVE-2014-6258
An unspecified endpoint in Zenoss Core through 5 Beta 3 allows remote malicious users to cause a denial of service (CPU consumption) by triggering an arbitrary regular-expression match attempt, aka ZEN-15411.
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27977
IMAP
local users
CVE-2024-32038
CVE-2023-49963
CVE-2023-22869
CVE-2024-31497
local
CVE-2024-2961
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »