Vulnerability Details CVE-2014-9245
Zenoss Core through 5 Beta 3 allows remote attackers to obtain sensitive information by attempting a product-rename action with an invalid new name and then reading a stack trace, as demonstrated by internal URL information, aka ZEN-15382.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 66.8%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2014-9245
-
cpe:2.3:a:zenoss:zenoss_core:*
-
cpe:2.3:a:zenoss:zenoss_core:2.4.0
-
cpe:2.3:a:zenoss:zenoss_core:2.4.5
-
cpe:2.3:a:zenoss:zenoss_core:2.5.0
-
cpe:2.3:a:zenoss:zenoss_core:2.5.1
-
cpe:2.3:a:zenoss:zenoss_core:2.5.2
-
cpe:2.3:a:zenoss:zenoss_core:3.0.0
-
cpe:2.3:a:zenoss:zenoss_core:3.0.1
-
cpe:2.3:a:zenoss:zenoss_core:3.0.2
-
cpe:2.3:a:zenoss:zenoss_core:3.0.3
-
cpe:2.3:a:zenoss:zenoss_core:3.1.0
-
cpe:2.3:a:zenoss:zenoss_core:3.2.0
-
cpe:2.3:a:zenoss:zenoss_core:3.2.1
-
cpe:2.3:a:zenoss:zenoss_core:4.2.0
-
cpe:2.3:a:zenoss:zenoss_core:4.2.3
-
cpe:2.3:a:zenoss:zenoss_core:4.2.4
-
cpe:2.3:a:zenoss:zenoss_core:4.2.5
-
cpe:2.3:a:zenoss:zenoss_core:5.0.0