Логотип exploitDog
bind:CVE-2010-0713
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2010-0713

Количество 3

Количество 3

nvd логотип

CVE-2010-0713

почти 16 лет назад

Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss 2.3.3, and other versions before 2.5, allow remote attackers to hijack the authentication of an administrator for (1) requests that reset user passwords via zport/dmd/ZenUsers/admin, and (2) requests that change user commands, which allows for remote execution of system commands via zport/dmd/userCommands/.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2010-0713

почти 16 лет назад

Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss 2 ...

CVSS2: 6.8
EPSS: Низкий
github логотип

GHSA-c67x-wr29-p7p6

почти 4 года назад

Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss 2.3.3, and other versions before 2.5, allow remote attackers to hijack the authentication of an administrator for (1) requests that reset user passwords via zport/dmd/ZenUsers/admin, and (2) requests that change user commands, which allows for remote execution of system commands via zport/dmd/userCommands/.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2010-0713

Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss 2.3.3, and other versions before 2.5, allow remote attackers to hijack the authentication of an administrator for (1) requests that reset user passwords via zport/dmd/ZenUsers/admin, and (2) requests that change user commands, which allows for remote execution of system commands via zport/dmd/userCommands/.

CVSS2: 6.8
6%
Низкий
почти 16 лет назад
debian логотип
CVE-2010-0713

Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss 2 ...

CVSS2: 6.8
6%
Низкий
почти 16 лет назад
github логотип
GHSA-c67x-wr29-p7p6

Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss 2.3.3, and other versions before 2.5, allow remote attackers to hijack the authentication of an administrator for (1) requests that reset user passwords via zport/dmd/ZenUsers/admin, and (2) requests that change user commands, which allows for remote execution of system commands via zport/dmd/userCommands/.

6%
Низкий
почти 4 года назад

Уязвимостей на страницу