ZohoCorp ManageEngine Desktop Central 10.1.2119.7

CPE Details

ZohoCorp ManageEngine Desktop Central 10.1.2119.7
10.1.2119.7
2021-09-16
13h19 +00:00
2021-09-20
14h11 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:zohocorp:manageengine_desktop_central:10.1.2119.7:*:*:*:*:*:*:*

Informations

Vendor

zohocorp

Product

manageengine_desktop_central

Version

10.1.2119.7

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-23779 2022-03-02 13h31 +00:00 Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.
5.3
Moyen
CVE-2022-23863 2022-01-28 14h33 +00:00 Zoho ManageEngine Desktop Central before 10.1.2137.10 allows an authenticated user to change any user's login password.
6.5
Moyen
CVE-2021-44757 2022-01-18 08h21 +00:00 Zoho ManageEngine Desktop Central before 10.1.2137.9 and Desktop Central MSP before 10.1.2137.9 allow attackers to bypass authentication, and read sensitive information or upload an arbitrary ZIP archive to the server.
9.1
Critique
CVE-2020-8540 2020-03-11 15h15 +00:00 An XML external entity (XXE) vulnerability in Zoho ManageEngine Desktop Central before the 07-Mar-2020 update allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.
9.8
Critique
CVE-2018-11716 2018-07-16 12h00 +00:00 An issue was discovered in Zoho ManageEngine Desktop Central before 100230. There is unauthenticated remote access to all log files of a Desktop Central instance containing critical information (private information such as location of enrolled devices, cleartext passwords, patching level, etc.) via a GET request on port 8022, 8443, or 8444.
9.8
Critique
CVE-2018-11717 2018-07-16 12h00 +00:00 An issue was discovered in Zoho ManageEngine Desktop Central before 100251. By leveraging access to a log file, a context-dependent attacker can obtain (depending on the modules configured) the Base64 encoded Password/Username of AD accounts, the cleartext Password/Username and mail settings of the EAS account (an AD account used to send mail), the cleartext password of recovery_password of Android devices, the cleartext password of account "set", the location of devices enrolled in the platform (with UUID and information related to the name of the person at the location), critical information about all enrolled devices such as Serial Number, UUID, Model, Name, and auth_session_token (usable to spoof a terminal identity on the platform), etc.
9.8
Critique