Vulnerabilities > Zenoss

DATE CVE VULNERABILITY TITLE RISK
2014-12-15 CVE-2014-9248 Credentials Management vulnerability in Zenoss Core
Zenoss Core through 5 Beta 3 does not require complex passwords, which makes it easier for remote attackers to obtain access via a brute-force attack, aka ZEN-15406.
network
low complexity
zenoss CWE-255
5.0
2014-12-15 CVE-2014-9247 Information Exposure vulnerability in Zenoss Core
Zenoss Core through 5 Beta 3 allows remote authenticated users to obtain sensitive (1) user account, (2) e-mail address, and (3) role information by visiting the ZenUsers (aka User Manager) page, aka ZEN-15389.
network
low complexity
zenoss CWE-200
4.0
2014-12-15 CVE-2014-9245 Information Exposure vulnerability in Zenoss Core
Zenoss Core through 5 Beta 3 allows remote attackers to obtain sensitive information by attempting a product-rename action with an invalid new name and then reading a stack trace, as demonstrated by internal URL information, aka ZEN-15382.
network
low complexity
zenoss CWE-200
5.0
2014-12-15 CVE-2014-6261 Code Injection vulnerability in Zenoss Core
Zenoss Core through 5 Beta 3 does not properly implement the Check For Updates feature, which allows remote attackers to execute arbitrary code by (1) spoofing the callhome server or (2) deploying a crafted web site that is visited during a login session, aka ZEN-12657.
network
zenoss CWE-94
critical
9.3
2014-12-15 CVE-2014-6260 Command Injection vulnerability in Zenoss Core
Zenoss Core through 5 Beta 3 does not require a password for modifying the pager command string, which allows remote attackers to execute arbitrary commands or cause a denial of service (paging outage) by leveraging an unattended workstation, aka ZEN-15412.
network
zenoss CWE-77
6.8
2014-12-15 CVE-2014-6259 Resource Management Errors vulnerability in Zenoss Core
Zenoss Core through 5 Beta 3 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, aka ZEN-15414, a similar issue to CVE-2003-1564.
network
low complexity
zenoss CWE-399
5.0
2014-12-15 CVE-2014-6258 Resource Management Errors vulnerability in Zenoss Core
An unspecified endpoint in Zenoss Core through 5 Beta 3 allows remote attackers to cause a denial of service (CPU consumption) by triggering an arbitrary regular-expression match attempt, aka ZEN-15411.
network
low complexity
zenoss CWE-399
5.0
2014-12-15 CVE-2014-6257 Permissions, Privileges, and Access Controls vulnerability in Zenoss Core
Zenoss Core through 5 Beta 3 allows remote attackers to bypass intended access restrictions by using a web-endpoint URL to invoke an object helper method, aka ZEN-15407.
network
low complexity
zenoss CWE-264
5.0
2014-12-15 CVE-2014-6256 Permissions, Privileges, and Access Controls vulnerability in Zenoss Core
Zenoss Core through 5 Beta 3 allows remote attackers to bypass intended access restrictions and place files in a directory with public (1) read or (2) execute access via a move action, aka ZEN-15386.
network
low complexity
zenoss CWE-264
7.5
2014-12-15 CVE-2014-6255 Open Redirection vulnerability in Zenoss
Open redirect vulnerability in the login form in Zenoss Core before 4.2.5 SP161 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the came_from parameter, aka ZEN-11998.
network
low complexity
zenoss
6.4