Page 8 of 82 results (0.008 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 3

06 Feb 2017 — Multiple reflected XSS vulnerabilities exist within form and link input parameters of ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, which allows a remote attacker to execute malicious scripts within an authenticated client's browser. The URL is /zm/index.php and sample parameters could include action=login&view=postlogin[XSS] view=console[XSS] view=groups[XSS] view=events&filter[terms][1][cnj]=and[XSS] view=events&filter%5Bterms%5D%5B1%5D%5Bcnj%5D=and[XSS] view=events&filter%5Bterm... • https://packetstorm.news/files/id/140927 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 3

06 Feb 2017 — ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, is vulnerable to CSRF (Cross Site Request Forgery) which allows a remote attack to make changes to the web application as the current logged in victim. If the victim visits a malicious web page, the attacker can silently and automatically create a new admin user within the web application for remote persistence and further attacks. The URL is /zm/index.php and sample parameters could include action=user uid=0 newUser[Username]=attacker1... • https://packetstorm.news/files/id/140927 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

13 Jan 2017 — Information disclosure and authentication bypass vulnerability exists in the Apache HTTP Server configuration bundled with ZoneMinder v1.30 and v1.29, which allows a remote unauthenticated attacker to browse all directories in the web root, e.g., a remote unauthenticated attacker can view all CCTV images on the server via the /events URI. La vulnerabilidad de desvío de autenticación y divulgación de información existe en la configuración del servidor HTTP de Apache incluida con ZoneMinder v1.30 y v1.29, que... • https://packetstorm.news/files/id/140927 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 2

20 Mar 2013 — Multiple directory traversal vulnerabilities in ZoneMinder 1.24.x before 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) view, (2) request, or (3) action parameter. Múltiples vulnerabilidades de salto de directorio en ZoneMinder v1.24.x anterior a v1.24.4 permite a atacantes remotos leer ficheros de su elección a través de un .. (punto punto) en los parámetros (1) "view", (2) "request", o (3) "action". • https://www.exploit-db.com/exploits/17593 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 68%CPEs: 6EXPL: 3

20 Mar 2013 — includes/functions.php in ZoneMinder Video Server 1.24.0, 1.25.0, and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) runState parameter in the packageControl function; or (2) key or (3) command parameter in the setDeviceStatusX10 function. includes/functions.php en ZoneMinder Video Server 1v.24.0, v1.25.0, y anteriores permite a atacantes remotos ejecutar comandos arbitarios mediante una shell de metacaracteres en el parámetro (1) "runState" de la función "... • https://www.exploit-db.com/exploits/24310 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

27 Apr 2009 — ZoneMinder 1.23.3 on Gentoo Linux uses 0644 permissions for /etc/zm.conf, which allows local users to obtain the database username and password by reading this file. ZoneMinder v1.23.3 en Gentoo Linux utiliza permisos 0644 para el archivo /etc/zm.conf, lo que permite a los usuarios locales obtener el usuario y contraseña de la base de datos mediante la lectura de este archivo. • http://bugs.gentoo.org/show_bug.cgi?id=250715 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

27 Apr 2009 — ZoneMinder 1.23.3 on Fedora 10 sets the ownership of /etc/zm.conf to the apache user account, and sets the permissions to 0600, which makes it easier for remote attackers to modify this file by accessing it through a (1) PHP or (2) CGI script. ZoneMinder v1.23.3 en Fedora 10 establece la propiedad de /etc/zm.conf a la cuenta de usuario de apache, y establece los permisos a 0600, lo cual facilita a los atacantes remotos la modificación de este archivo para acceder a él a través de un archivo de secuencias de... • https://bugzilla.redhat.com/show_bug.cgi?id=476529 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 37EXPL: 0

02 Sep 2008 — SQL injection vulnerability in zm_html_view_event.php in ZoneMinder 1.23.3 and earlier allows remote attackers to execute arbitrary SQL commands via the filter array parameter. Vulnerabilidad de inyección SQL en zm_html_view_event.php de ZoneMinder 1.23.3 y anteriores, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro filter del array. • http://secunia.com/advisories/31636 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 0%CPEs: 37EXPL: 0

02 Sep 2008 — Multiple cross-site scripting (XSS) vulnerabilities in ZoneMinder 1.23.3 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified "zm_html_view_*.php" files. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en ZoneMinder versión 1.23.3 y anteriores, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio de archivos "zm_html_view_*.php" no especificados. • http://secunia.com/advisories/31636 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 37EXPL: 0

02 Sep 2008 — Unspecified "Command Injection" vulnerability in ZoneMinder 1.23.3 and earlier allows remote attackers to execute arbitrary commands via (1) the executeFilter function in zm_html_view_events.php and (2) the run_state parameter to zm_html_view_state.php. Una vulnerabilidad de "Command Injection" no especificada en ZoneMinder versión 1.23.3 y anteriores, permite a atacantes remotos ejecutar comandos arbitrarios por medio de (1) la función executeFilter en el archivo zm_html_view_events.php y (2) el parámetro ... • http://secunia.com/advisories/31636 • CWE-94: Improper Control of Generation of Code ('Code Injection') •