Zenoss

Zenoss Core

20 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.55%
  • Published 15.12.2014 18:59:20
  • Last modified 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 allows remote attackers to obtain sensitive information by attempting a product-rename action with an invalid new name and then reading a stack trace, as demonstrated by internal URL information, aka ZEN-15382.

  • EPSS 1.86%
  • Published 15.12.2014 18:59:14
  • Last modified 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 does not properly implement the Check For Updates feature, which allows remote attackers to execute arbitrary code by (1) spoofing the callhome server or (2) deploying a crafted web site that is visited during a login ses...

  • EPSS 1.08%
  • Published 15.12.2014 18:59:13
  • Last modified 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 does not require a password for modifying the pager command string, which allows remote attackers to execute arbitrary commands or cause a denial of service (paging outage) by leveraging an unattended workstation, aka ZEN...

  • EPSS 0.59%
  • Published 15.12.2014 18:59:12
  • Last modified 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity ref...

  • EPSS 0.73%
  • Published 15.12.2014 18:59:11
  • Last modified 12.04.2025 10:46:40

An unspecified endpoint in Zenoss Core through 5 Beta 3 allows remote attackers to cause a denial of service (CPU consumption) by triggering an arbitrary regular-expression match attempt, aka ZEN-15411.

  • EPSS 0.37%
  • Published 15.12.2014 18:59:10
  • Last modified 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 allows remote attackers to bypass intended access restrictions by using a web-endpoint URL to invoke an object helper method, aka ZEN-15407.

  • EPSS 0.35%
  • Published 15.12.2014 18:59:09
  • Last modified 12.04.2025 10:46:40

Zenoss Core through 5 Beta 3 allows remote attackers to bypass intended access restrictions and place files in a directory with public (1) read or (2) execute access via a move action, aka ZEN-15386.

  • EPSS 0.53%
  • Published 15.12.2014 18:59:08
  • Last modified 12.04.2025 10:46:40

Open redirect vulnerability in the login form in Zenoss Core before 4.2.5 SP161 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the came_from parameter, aka ZEN-11998.

  • EPSS 0.62%
  • Published 15.12.2014 18:59:07
  • Last modified 12.04.2025 10:46:40

Multiple cross-site scripting (XSS) vulnerabilities in Zenoss Core through 5 Beta 3 allow remote attackers to inject arbitrary web script or HTML via an attribute in a (1) device name, (2) device detail, (3) report name, (4) report detail, or (5) por...

  • EPSS 0.12%
  • Published 15.12.2014 18:59:06
  • Last modified 12.04.2025 10:46:40

Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss Core through 5 Beta 3 allow remote attackers to hijack the authentication of arbitrary users, aka ZEN-12653.