Known Vulnerabilities for Manageengine Desktop Central by Zohocorp

Listed below are 10 of the newest known vulnerabilities associated with "Manageengine Desktop Central" by "Zohocorp".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-48362 Zoho ManageEngine Desktop Central and Desktop Central MSP before 10.1.2137.2 allow directory traversal via computerName to Ag... Not Provided 2023-02-25 2023-03-14
CVE-2022-23863 Zoho ManageEngine Desktop Central before 10.1.2137.10 allows an authenticated user to change any user's login password. 6.5 - MEDIUM 2022-01-28 2022-02-02
CVE-2022-23779 Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can b... 5.3 - MEDIUM 2022-03-02 2022-03-09
CVE-2021-37414 Zoho ManageEngine DesktopCentral before 10.0.709 allows anyone to get a valid user's APIKEY without authentication. 7.5 - HIGH 2021-09-10 2021-12-20
CVE-2020-15589 A design issue was discovered in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate in the clie... 8.1 - HIGH 2020-10-02 2021-12-06
CVE-2020-15588 An issue was discovered in the client side of Zoho ManageEngine Desktop Central 10.0.552.W. An attacker-controlled server can... 9.8 - CRITICAL 2020-07-29 2022-04-28
CVE-2020-10859 Zoho ManageEngine Desktop Central before 10.0.484 allows authenticated arbitrary file writes during ZIP archive extraction vi... 6.5 - MEDIUM 2020-05-05 2020-05-12
CVE-2020-10189 Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data i... 9.8 - CRITICAL 2020-03-06 2022-10-07
CVE-2020-9367 The MPS Agent in Zoho ManageEngine Desktop Central MSP build MSP build 10.0.486 is vulnerable to DLL Hijacking: dcinventory.e... 7.8 - HIGH 2021-03-18 2021-03-25
CVE-2020-8540 An XML external entity (XXE) vulnerability in Zoho ManageEngine Desktop Central before the 07-Mar-2020 update allows remote u... 9.8 - CRITICAL 2020-03-11 2021-07-21

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationZohocorpManageengine Desktop Central9.1.0AllAllAll
ApplicationZohocorpManageengine Desktop Central9.0AllAllAll
ApplicationZohocorpManageengine Desktop Central9.0AllAllAll
ApplicationZohocorpManageengine Desktop Central8.0.0AllAllAll
ApplicationZohocorpManageengine Desktop Central7.0.1AllAllAll
ApplicationZohocorpManageengine Desktop Central7.0.0AllAllAll
ApplicationZohocorpManageengine Desktop Central2020-03-27AllAllAll
ApplicationZohocorpManageengine Desktop Central2020-03-07AllAllAll
ApplicationZohocorpManageengine Desktop Central100251AllAllAll
ApplicationZohocorpManageengine Desktop Central100230AllAllAll
ApplicationZohocorpManageengine Desktop Central10.0.552.wAllAllAll
ApplicationZohocorpManageengine Desktop Central10.0.533AllAllAll
ApplicationZohocorpManageengine Desktop Central10.0.484AllAllAll
ApplicationZohocorpManageengine Desktop Central10.0.430AllAllAll
ApplicationZohocorpManageengine Desktop Central10.0.380AllAllAll
ApplicationZohocorpManageengine Desktop Central10.0.290AllAllAll
ApplicationZohocorpManageengine Desktop Central10.0.289AllAllAll
ApplicationZohocorpManageengine Desktop Central10.0.271AllAllAll
ApplicationZohocorpManageengine Desktop Central10.0.184AllAllAll
ApplicationZohocorpManageengine Desktop Central10.0.124AllAllAll

Popular searches for Manageengine Desktop Central

ManageEngine - IT Operations and Service Management Software

www.manageengine.com

@ www.manageengine.com/eu www.manageengine.com/za buzz.manageengine.com administrators.blogsky.com/dailylink/?go=http%3A%2F%2Fwww.manageengine.com%2F&id=2 www.manageengine.eu www.manageengine.com/index.html ManageEngine AssetExplorer Information technology Information technology management Service management Software Active Directory Operations management Project management software Shareware Computer security Business High availability Magic Quadrant Desktop computer Unified Endpoint Management Application software Download Enterprise software ITIL User (computing)

Patch Management | Automated Patch Management System - ManageEngine Desktop Central

www.manageengine.com/products/desktop-central/patch-management.html

W SPatch Management | Automated Patch Management System - ManageEngine Desktop Central Patch Management refers to the process of detecting, downloading, testing & installing missing software patches on all the software applications. Try Desktop Central 2 0 .'s automated patch management system for free!

www.manageengine.com/products/desktop-central/patch-management.html?opd= www.manageengine.com/products/desktop-central/patch-management.html?osr= www.manageengine.com.au/products/desktop-central/patch-management.html www.manageengine.co.uk/products/desktop-central/patch-management.html www.manageengine.com/eu/products/desktop-central/patch-management.html www.manageengine.com/au/products/desktop-central/patch-management.html manageengine.co.uk/products/desktop-central/patch-management.html www.manageengine.eu/products/desktop-central/patch-management.html www.manageengine.com/za/products/desktop-central/patch-management.html Patch (computing) Desktop computer Application software ManageEngine AssetExplorer Software deployment Installation (computer programs) Vulnerability (computing) Automation Software testing Server (computing) Computer network Desktop environment Process (computing) File synchronization Test automation Vulnerability database Software repository Software Image scanner Download

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report