PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 449

of 23

Published:   Updated:

Vulnerability Type: Command injection

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.2

Zoho ManageEngine RecoveryManager Plus before 6070 allows admin users to execute arbitrary commands via proxy settings.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.

Published:   Updated:

Vulnerability Type: Server side request forgery (ssrf)

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

A SSRF vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0, specifically the /smtpConfig.do component. This vulnerability could allow an authenticated attacker to launch targeted attacks, such as a cross-port attack, service enumeration and other attacks via HTTP requests.

Published:   Updated:

Vulnerability Type: Crlf injection

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

A CRLF injection vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0. This vulnerability could allow a remote attacker to inject arbitrary HTTP headers and perform HTTP response splitting attacks via the fileName parameter in /STATE_ID/1613157927228/InvSWMetering.pdf.

Published:   Updated:

Vulnerability Type: Crlf injection

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

A CRLF injection vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0. This vulnerability could allow a remote attacker to inject arbitrary HTTP headers and perform HTTP response splitting attacks via the fileName parameter in /STATE_ID/1613157927228/InvSWMetering.csv.

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Zoho ManageEngine ADManager Plus before 7203 allows 2FA bypass (for AuthToken generation) in REST APIs.

Published:   Updated:

Vulnerability Type: Command injection

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.2

Zoho ManageEngine ADManager Plus before Build 7200 allows admin users to execute commands on the host machine.

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.8

ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of ManageEngine ADSelfService Plus. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Password Reset Portal used by the GINA client. The issue results from the lack of proper authentication of data received via HTTP. An attacker can leverage this vulnerability to bypass authentication and execute code in the context of SYSTEM. Was ZDI-CAN-17009.

Published:   Updated:

Vulnerability Type: Directory traversal

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.9

Zoho ManageEngine ADManager Plus through 7202 allows admin users to download any file from the server machine via directory traversal.

Published:   Updated:

Vulnerability Type: Spoofing

Vendor(s):  Zohocorp
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Zoho ManageEngine Active Directory 360 versions 4315 and below, ADAudit Plus 7202 and below, ADManager Plus 7200 and below, Asset Explorer 6993 and below and 7xxx 7002 and below, Cloud Security Plus 4161 and below, Data Security Plus 6110 and below, Eventlog Analyzer 12301 and below, Exchange Reporter Plus 5709 and below, Log360 5315 and below, Log360 UEBA 4045 and below, M365 Manager Plus 4529 and below, M365 Security Plus 4529 and below, Recovery Manager Plus 6061 and below, ServiceDesk Plus 14204 and below and 143xx 14302 and below, ServiceDesk Plus MSP 14300 and below, SharePoint Manager Plus 4402 and below, and Support Center Plus 14300 and below are vulnerable to 2FA bypass via a few TOTP authenticators. Note: A valid pair of username and password is required to leverage this vulnerability.

Published:   Updated:

Vulnerability Type: Default credentials

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Zoho ManageEngine ADManager Plus version 7182 and prior disclosed the default passwords for the account restoration of unauthorized domains to the authenticated users.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

Cross Site Scripting (XSS) vulnerability in Query Report feature in Zoho ManageEngine Password Manager Pro version 11001, allows remote attackers to execute arbitrary code and steal cookies via crafted JavaScript payload.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

Zoho ManageEngine Applications Manager through 16530 allows reflected XSS while logged in.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

The event analysis component in Zoho ManageEngine ADAudit Plus 7.1.1 allows an attacker to bypass audit detection by creating or renaming user accounts with a "$" symbol suffix.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Zoho ManageEngine ADManager Plus through 7201 allow authenticated users to take over another user's account via sensitive information disclosure.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

An issue was discovered in Zoho ManageEngine Network Configuration Manager 12.6.165. The WebSocket endpoint allows Cross-site WebSocket hijacking.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Zoho ManageEngine Support Center Plus 14001 and below is vulnerable to stored XSS in the products module.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Zoho ManageEngine ADAudit Plus before 7100 allows XSS via the username field.

Published:   Updated:

Vulnerability Type: Privilege escalation

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Zoho ManageEngine ServiceDesk Plus before 14202, ServiceDesk Plus MSP before 14300, and SupportCenter Plus before 14300 have a privilege escalation vulnerability in the Release module that allows unprivileged users to access the Reminders of a release ticket and make modifications.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Zohocorp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.9

Zoho ManageEngine ADManager Plus before 7183 allows admin users to exploit an XXE issue to view files.

of 23