Zohocorp

Manageengine Remote Access Plus

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.08%
  • Veröffentlicht 15.11.2023 21:15:08
  • Zuletzt bearbeitet 13.02.2025 18:16:03

An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use t...

Warnung Exploit
  • EPSS 94.43%
  • Veröffentlicht 18.01.2023 18:15:10
  • Zuletzt bearbeitet 07.03.2025 17:12:53

Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, ...

Exploit
  • EPSS 1.77%
  • Veröffentlicht 16.04.2022 16:15:07
  • Zuletzt bearbeitet 21.11.2024 06:54:15

Zoho ManageEngine Remote Access Plus before 10.1.2137.15 allows guest users to view domain details (such as the username and GUID of an administrator).

Exploit
  • EPSS 1.77%
  • Veröffentlicht 16.04.2022 16:15:07
  • Zuletzt bearbeitet 21.11.2024 06:54:29

Zoho ManageEngine Remote Access Plus before 10.1.2137.15 allows guest users to view license details.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 17.11.2021 13:15:07
  • Zuletzt bearbeitet 21.11.2024 06:28:19

Zoho Remote Access Plus Server Windows Desktop Binary fixed from 10.1.2121.1 is affected by incorrect access control. The installation directory is vulnerable to weak file permissions by allowing full control for Windows Everyone user group (non-admi...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 17.11.2021 13:15:07
  • Zuletzt bearbeitet 21.11.2024 06:28:20

Zoho Remote Access Plus Server Windows Desktop binary fixed in version 10.1.2132 is affected by an unauthorized password reset vulnerability. Because of the designed password reset mechanism, any non-admin Windows user can reset the password of the R...

Exploit
  • EPSS 6.06%
  • Veröffentlicht 30.09.2021 03:15:07
  • Zuletzt bearbeitet 21.11.2024 06:26:50

Zoho ManageEngine Remote Access Plus before 10.1.2121.1 relies on the application's build number to calculate a certain encryption key.

Exploit
  • EPSS 11.4%
  • Veröffentlicht 30.09.2021 03:15:06
  • Zuletzt bearbeitet 21.11.2024 06:26:49

Zoho ManageEngine Remote Access Plus before 10.1.2121.1 has hardcoded credentials for read-only access. The credentials are in the source code that corresponds to the DCBackupRestore JAR archive.

Exploit
  • EPSS 11.4%
  • Veröffentlicht 30.09.2021 03:15:06
  • Zuletzt bearbeitet 21.11.2024 06:26:50

Zoho ManageEngine Remote Access Plus before 10.1.2121.1 has hardcoded credentials associated with resetPWD.xml.

Exploit
  • EPSS 13.6%
  • Veröffentlicht 03.02.2021 18:15:15
  • Zuletzt bearbeitet 21.11.2024 04:30:25

Zoho ManageEngine Remote Access Plus 10.0.259 allows HTML injection via the Description field on the Admin - User Administration userMgmt.do?actionToCall=ShowUser screen.