5
CVE-2014-9248
- EPSS 0.72%
- Veröffentlicht 15.12.2014 18:59:22
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle cret@cert.org
- CVE-Watchlists
- Unerledigt
Zenoss Core through 5 Beta 3 does not require complex passwords, which makes it easier for remote attackers to obtain access via a brute-force attack, aka ZEN-15406.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Zenoss ≫ Zenoss Core Updatebeta_3 Version <= 5.0.0
Zenoss ≫ Zenoss Core Version2.4.0
Zenoss ≫ Zenoss Core Version2.4.5
Zenoss ≫ Zenoss Core Version2.5.0
Zenoss ≫ Zenoss Core Version2.5.1
Zenoss ≫ Zenoss Core Version2.5.2
Zenoss ≫ Zenoss Core Version3.0.0
Zenoss ≫ Zenoss Core Version3.0.1
Zenoss ≫ Zenoss Core Version3.0.2
Zenoss ≫ Zenoss Core Version3.0.3
Zenoss ≫ Zenoss Core Version3.1.0
Zenoss ≫ Zenoss Core Version3.2.0
Zenoss ≫ Zenoss Core Version3.2.1
Zenoss ≫ Zenoss Core Version4.2.0
Zenoss ≫ Zenoss Core Version4.2.3
Zenoss ≫ Zenoss Core Version4.2.4
Zenoss ≫ Zenoss Core Version4.2.5
Zenoss ≫ Zenoss Core Version5.0.0
Zenoss ≫ Zenoss Core Version5.0.0 Updatebeta_1
Zenoss ≫ Zenoss Core Version5.0.0 Updatebeta_2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.72% | 0.717 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|