Zenoss

Zenoss Core

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.48%
  • Veröffentlicht 08.08.2025 18:14:38
  • Zuletzt bearbeitet 08.08.2025 20:30:18

Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary co...

  • EPSS 22.59%
  • Veröffentlicht 12.02.2020 02:15:10
  • Zuletzt bearbeitet 21.11.2024 02:14:03

Multiple format string vulnerabilities in the python module in RRDtool, as used in Zenoss Core before 4.2.5 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted third argu...

  • EPSS 0.71%
  • Veröffentlicht 15.12.2014 18:59:28
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Zenoss Core before 4.2.5 SP161 sets an infinite lifetime for the session ID cookie, which makes it easier for remote attackers to hijack sessions by leveraging an unattended workstation, aka ZEN-12691.

  • EPSS 0.34%
  • Veröffentlicht 15.12.2014 18:59:27
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Cross-site request forgery (CSRF) vulnerability in Zenoss Core through 5 Beta 3 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger arbitrary code execution via a ZenPack upload, aka ZEN-15388.

  • EPSS 0.06%
  • Veröffentlicht 15.12.2014 18:59:26
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 stores cleartext passwords in the session database, which might allow local users to obtain sensitive information by reading database entries, aka ZEN-15416.

  • EPSS 0.25%
  • Veröffentlicht 15.12.2014 18:59:25
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 uses a weak algorithm to hash passwords, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack on hash values in the database, aka ZEN-15413.

  • EPSS 0.59%
  • Veröffentlicht 15.12.2014 18:59:24
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 does not include the HTTPOnly flag in a Set-Cookie header for the authentication cookie, which makes it easier for remote attackers to obtain credential information via script access to this cookie, aka ZEN-10418.

  • EPSS 0.71%
  • Veröffentlicht 15.12.2014 18:59:23
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The default configuration of Zenoss Core before 5 allows remote attackers to read or modify database information by connecting to unspecified open ports, aka ZEN-15408.

  • EPSS 0.53%
  • Veröffentlicht 15.12.2014 18:59:22
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 does not require complex passwords, which makes it easier for remote attackers to obtain access via a brute-force attack, aka ZEN-15406.

  • EPSS 0.34%
  • Veröffentlicht 15.12.2014 18:59:21
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 allows remote authenticated users to obtain sensitive (1) user account, (2) e-mail address, and (3) role information by visiting the ZenUsers (aka User Manager) page, aka ZEN-15389.