5
CVE-2014-9251
- EPSS 0.25%
- Published 15.12.2014 18:59:25
- Last modified 12.04.2025 10:46:40
- Source cret@cert.org
- Teams watchlist Login
- Open Login
Zenoss Core through 5 Beta 3 uses a weak algorithm to hash passwords, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack on hash values in the database, aka ZEN-15413.
Data is provided by the National Vulnerability Database (NVD)
Zenoss ≫ Zenoss Core Updatebeta_3 Version <= 5.0.0
Zenoss ≫ Zenoss Core Version2.4.0
Zenoss ≫ Zenoss Core Version2.4.5
Zenoss ≫ Zenoss Core Version2.5.0
Zenoss ≫ Zenoss Core Version2.5.1
Zenoss ≫ Zenoss Core Version2.5.2
Zenoss ≫ Zenoss Core Version3.0.0
Zenoss ≫ Zenoss Core Version3.0.1
Zenoss ≫ Zenoss Core Version3.0.2
Zenoss ≫ Zenoss Core Version3.0.3
Zenoss ≫ Zenoss Core Version3.1.0
Zenoss ≫ Zenoss Core Version3.2.0
Zenoss ≫ Zenoss Core Version3.2.1
Zenoss ≫ Zenoss Core Version4.2.0
Zenoss ≫ Zenoss Core Version4.2.3
Zenoss ≫ Zenoss Core Version4.2.4
Zenoss ≫ Zenoss Core Version4.2.5
Zenoss ≫ Zenoss Core Version5.0.0
Zenoss ≫ Zenoss Core Version5.0.0 Updatebeta_1
Zenoss ≫ Zenoss Core Version5.0.0 Updatebeta_2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.25% | 0.484 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|