Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zenoss zenoss 2.4.0 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2010-0713
Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss 2.3.3, and other versions prior to 2.5, allow remote malicious users to hijack the authentication of an administrator for (1) requests that reset user passwords via zport/dmd/ZenUsers/admin, and (2) requests tha...
Zenoss Zenoss 2.3.0
Zenoss Zenoss 2.4.0
Zenoss Zenoss 2.4.2
Zenoss Zenoss 2.3.3
Zenoss Zenoss
1 EDB exploit
6.5
CVSSv2
CVE-2010-0712
Multiple SQL injection vulnerabilities in zport/dmd/Events/getJSONEventsInfo in Zenoss 2.3.3, and other versions prior to 2.5, allow remote authenticated users to execute arbitrary SQL commands via the (1) severity, (2) state, (3) filter, (4) offset, and (5) count parameters.
Zenoss Zenoss 2.4.2
Zenoss Zenoss
Zenoss Zenoss 2.3.3
Zenoss Zenoss 2.3.0
Zenoss Zenoss 2.4.0
1 EDB exploit
6.4
CVSSv2
CVE-2014-6255
Open redirect vulnerability in the login form in Zenoss Core prior to 4.2.5 SP161 allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via the came_from parameter, aka ZEN-11998.
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 4.2.3
7.5
CVSSv2
CVE-2014-9249
The default configuration of Zenoss Core prior to 5 allows remote malicious users to read or modify database information by connecting to unspecified open ports, aka ZEN-15408.
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
6.8
CVSSv2
CVE-2014-9386
Zenoss Core prior to 4.2.5 SP161 sets an infinite lifetime for the session ID cookie, which makes it easier for remote malicious users to hijack sessions by leveraging an unattended workstation, aka ZEN-12691.
Zenoss Zenoss Core
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 4.2.4
5
CVSSv2
CVE-2014-9245
Zenoss Core through 5 Beta 3 allows remote malicious users to obtain sensitive information by attempting a product-rename action with an invalid new name and then reading a stack trace, as demonstrated by internal URL information, aka ZEN-15382.
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core
4
CVSSv2
CVE-2014-9247
Zenoss Core through 5 Beta 3 allows remote authenticated users to obtain sensitive (1) user account, (2) e-mail address, and (3) role information by visiting the ZenUsers (aka User Manager) page, aka ZEN-15389.
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.4
2.1
CVSSv2
CVE-2014-9252
Zenoss Core through 5 Beta 3 stores cleartext passwords in the session database, which might allow local users to obtain sensitive information by reading database entries, aka ZEN-15416.
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
4.3
CVSSv2
CVE-2014-6254
Multiple cross-site scripting (XSS) vulnerabilities in Zenoss Core through 5 Beta 3 allow remote malicious users to inject arbitrary web script or HTML via an attribute in a (1) device name, (2) device detail, (3) report name, (4) report detail, or (5) portlet name, or (6) a stri...
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 4.2.5
5
CVSSv2
CVE-2014-6258
An unspecified endpoint in Zenoss Core through 5 Beta 3 allows remote malicious users to cause a denial of service (CPU consumption) by triggering an arbitrary regular-expression match attempt, aka ZEN-15411.
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »