Vulnerabilities (CVE)

Filtered by vendor Zoneminder Subscribe
Filtered by product Zoneminder
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-7347 1 Zoneminder 1 Zoneminder 2020-08-24 6.0 MEDIUM 7.5 HIGH
A Time-of-check Time-of-use (TOCTOU) Race Condition exists in ZoneMinder through 1.32.3 as a session remains active for an authenticated user even after deletion from the users table. This allows a nonexistent user to access and modify records (add/delete Monitors, Users, etc.).
CVE-2019-7350 1 Zoneminder 1 Zoneminder 2019-02-05 4.9 MEDIUM 7.3 HIGH
Session fixation exists in ZoneMinder through 1.32.3, as an attacker can fixate his own session cookies to the next logged-in user, thereby hijacking the victim's account. This occurs because a set of multiple cookies (between 3 and 5) is being generated when a user successfully logs in, and these sets overlap for successive logins.
CVE-2019-7346 1 Zoneminder 1 Zoneminder 2019-02-05 6.8 MEDIUM 8.8 HIGH
A CSRF check issue exists in ZoneMinder through 1.32.3 as whenever a CSRF check fails, a callback function is called displaying a "Try again" button, which allows resending the failed request, making the CSRF attack successful.
CVE-2016-10205 1 Zoneminder 1 Zoneminder 2017-03-29 7.5 HIGH 7.3 HIGH
Session fixation vulnerability in Zoneminder 1.30 and earlier allows remote attackers to hijack web sessions via the ZMSESSID cookie.
CVE-2016-10206 1 Zoneminder 1 Zoneminder 2017-03-29 6.8 MEDIUM 8.8 HIGH
Cross-site request forgery (CSRF) vulnerability in Zoneminder 1.30 and earlier allows remote attackers to hijack the authentication of users for requests that change passwords and possibly have unspecified other impact as demonstrated by a crafted user action request to index.php.
CVE-2016-10140 1 Zoneminder 1 Zoneminder 2017-03-16 5.0 MEDIUM 7.5 HIGH
Information disclosure and authentication bypass vulnerability exists in the Apache HTTP Server configuration bundled with ZoneMinder v1.30 and v1.29, which allows a remote unauthenticated attacker to browse all directories in the web root, e.g., a remote unauthenticated attacker can view all CCTV images on the server via the /events URI.
CVE-2017-5368 1 Zoneminder 1 Zoneminder 2017-02-10 6.8 MEDIUM 8.8 HIGH
ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, is vulnerable to CSRF (Cross Site Request Forgery) which allows a remote attack to make changes to the web application as the current logged in victim. If the victim visits a malicious web page, the attacker can silently and automatically create a new admin user within the web application for remote persistence and further attacks. The URL is /zm/index.php and sample parameters could include action=user uid=0 newUser[Username]=attacker1 newUser[Password]=Password1234 conf_password=Password1234 newUser[System]=Edit (among others).