Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-6595 | Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user. |
Thu, 20 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:zenoss:zenoss_core:3*:*:*:*:*:*:*:* |
Tue, 12 Aug 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenoss
Zenoss zenoss Core |
|
| Vendors & Products |
Zenoss
Zenoss zenoss Core |
Fri, 08 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 Aug 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user. | |
| Title | Zenoss 3.x showDaemonXMLConfig Command Execution | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:02:42.565Z
Reserved: 2025-08-08T15:55:24.499Z
Link: CVE-2012-10048
Updated: 2025-08-08T18:41:47.571Z
Status : Deferred
Published: 2025-08-08T19:15:34.890
Modified: 2026-04-15T00:35:42.020
Link: CVE-2012-10048
No data.
OpenCVE Enrichment
Updated: 2025-08-12T07:47:58Z
EUVD