Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zen vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-6577
The IT-Recht Kanzlei plugin in Zen Cart 1.5.6c (German edition) allows itrk-api.php rechtstext_language SQL Injection.
It-recht-kanzlei It-recht-kanzlei 1.5.6c
7.8
CVSSv3
CVE-2019-14257
pyraw in Zenoss 2.5.3 allows local privilege escalation by modifying environment variables to redirect execution before privileges are dropped, aka ZEN-31765.
Zenoss Zenoss 2.5.3
NA
CVE-2014-9249
The default configuration of Zenoss Core prior to 5 allows remote malicious users to read or modify database information by connecting to unspecified open ports, aka ZEN-15408.
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
NA
CVE-2014-6253
Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss Core through 5 Beta 3 allow remote malicious users to hijack the authentication of arbitrary users, aka ZEN-12653.
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core
NA
CVE-2007-0616
Directory traversal vulnerability in zen/template-functions.php in zenphoto 1.0.4 up to 1.0.6 allows remote malicious users to list arbitrary directories via ".." sequences in the album parameter to index.php.
Zenphoto Zenphoto 1.0.6
Zenphoto Zenphoto 1.0.4
Zenphoto Zenphoto 1.0.5
NA
CVE-2014-9248
Zenoss Core through 5 Beta 3 does not require complex passwords, which makes it easier for remote malicious users to obtain access via a brute-force attack, aka ZEN-15406.
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.1.0
NA
CVE-2014-9252
Zenoss Core through 5 Beta 3 stores cleartext passwords in the session database, which might allow local users to obtain sensitive information by reading database entries, aka ZEN-15416.
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
NA
CVE-2014-6257
Zenoss Core through 5 Beta 3 allows remote malicious users to bypass intended access restrictions by using a web-endpoint URL to invoke an object helper method, aka ZEN-15407.
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 4.2.5
NA
CVE-2014-6258
An unspecified endpoint in Zenoss Core through 5 Beta 3 allows remote malicious users to cause a denial of service (CPU consumption) by triggering an arbitrary regular-expression match attempt, aka ZEN-15411.
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 5.0.0
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 4.2.4
Zenoss Zenoss Core 4.2.5
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core
NA
CVE-2014-9386
Zenoss Core prior to 4.2.5 SP161 sets an infinite lifetime for the session ID cookie, which makes it easier for remote malicious users to hijack sessions by leveraging an unattended workstation, aka ZEN-12691.
Zenoss Zenoss Core
Zenoss Zenoss Core 3.0.1
Zenoss Zenoss Core 3.0.3
Zenoss Zenoss Core 2.4.5
Zenoss Zenoss Core 2.5.0
Zenoss Zenoss Core 2.5.1
Zenoss Zenoss Core 2.5.2
Zenoss Zenoss Core 3.1.0
Zenoss Zenoss Core 3.2.0
Zenoss Zenoss Core 3.2.1
Zenoss Zenoss Core 4.2.0
Zenoss Zenoss Core 4.2.3
Zenoss Zenoss Core 2.4.0
Zenoss Zenoss Core 3.0.0
Zenoss Zenoss Core 3.0.2
Zenoss Zenoss Core 4.2.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »