Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zenoss zenoss 4.2.5 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2014-6262
Multiple format string vulnerabilities in the python module in RRDtool, as used in Zenoss Core prior to 4.2.5 and other products, allow remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted third argument to the rrdtool.gr...
Zenoss Zenoss Core
Debian Debian Linux 8.0
NA
CVE-2014-6257
Zenoss Core through 5 Beta 3 allows remote malicious users to bypass intended access restrictions by using a web-endpoint URL to invoke an object helper method, aka ZEN-15407.
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 3.0.3
NA
CVE-2014-6260
Zenoss Core through 5 Beta 3 does not require a password for modifying the pager command string, which allows remote malicious users to execute arbitrary commands or cause a denial of service (paging outage) by leveraging an unattended workstation, aka ZEN-15412.
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 3.0.3
NA
CVE-2014-9245
Zenoss Core through 5 Beta 3 allows remote malicious users to obtain sensitive information by attempting a product-rename action with an invalid new name and then reading a stack trace, as demonstrated by internal URL information, aka ZEN-15382.
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 3.0.3
NA
CVE-2014-9247
Zenoss Core through 5 Beta 3 allows remote authenticated users to obtain sensitive (1) user account, (2) e-mail address, and (3) role information by visiting the ZenUsers (aka User Manager) page, aka ZEN-15389.
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 3.0.3
NA
CVE-2014-9250
Zenoss Core through 5 Beta 3 does not include the HTTPOnly flag in a Set-Cookie header for the authentication cookie, which makes it easier for remote malicious users to obtain credential information via script access to this cookie, aka ZEN-10418.
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 3.0.3
NA
CVE-2014-9252
Zenoss Core through 5 Beta 3 stores cleartext passwords in the session database, which might allow local users to obtain sensitive information by reading database entries, aka ZEN-15416.
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 3.0.3
NA
CVE-2014-9385
Cross-site request forgery (CSRF) vulnerability in Zenoss Core through 5 Beta 3 allows remote malicious users to hijack the authentication of arbitrary users for requests that trigger arbitrary code execution via a ZenPack upload, aka ZEN-15388.
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 3.0.3
NA
CVE-2014-9386
Zenoss Core prior to 4.2.5 SP161 sets an infinite lifetime for the session ID cookie, which makes it easier for remote malicious users to hijack sessions by leveraging an unattended workstation, aka ZEN-12691.
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 3.0.3
NA
CVE-2014-6253
Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss Core through 5 Beta 3 allow remote malicious users to hijack the authentication of arbitrary users, aka ZEN-12653.
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 3.0.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »