3 results (0.004 seconds)

CVSS: 7.8EPSS: 96%CPEs: 1EXPL: 1

The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function. La aplicación web rtrlet en la consola Web de Novell ZENworks Asset Management (ZAM) v7.5 utiliza un nombre de usuario no modificable de Ivanhoe y una contraseña codificada de Scott para operaciones (1) GetFile_Password y (2) GetConfigInfo_Password, lo que permite a atacantes remotos obtener información sensible a través de una solicitud rtrlet/rtr modificada de la función HandleMaintenanceCalls. • http://www.kb.cert.org/vuls/id/332412 http://www.securitytracker.com/id?1027682 https://community.rapid7.com/community/metasploit/blog/2012/10/15/cve-2012-4933-novell-zenworks https://exchange.xforce.ibmcloud.com/vulnerabilities/79252 • CWE-255: Credentials Management Errors •

CVSS: 10.0EPSS: 97%CPEs: 1EXPL: 1

Directory traversal vulnerability in the rtrlet component in Novell ZENworks Asset Management (ZAM) 7.5 allows remote attackers to execute arbitrary code by uploading an executable file. Vulnerabilidad de salto de directorio en el componente rtrlet en Novell ZENworks Asset Management (ZAM) v7.5, permite a atacantes remotos ejecutar comandos de su elección subiendo un archivo ejecutable. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks Asset Management. Authentication is not required to exploit this vulnerability. The flaw exists within the rtrlet component. This process listens on TCP port 8080. • https://www.exploit-db.com/exploits/20502 http://download.novell.com/Download?buildid=hPvHtXeNmCU~ http://zerodayinitiative.com/advisories/ZDI-11-342 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 12%CPEs: 1EXPL: 0

Integer overflow in Msg.dll in Novell ZENworks 7 Asset Management (ZAM) before SP1 IR11 and the Collection client allows remote attackers to execute arbitrary code via crafted packets, which trigger a heap-based buffer overflow. Desbordamiento de entero en Msg.dll en Novell ZENworks 7 Asset Management (ZAM) anterior al SP1 IR11 y el cliente Collection permiten a atacantes remotos ejecutar código de su elección mediante paquetes artesanales, que provocan un desbordamiento de búfer basado en pila. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=447 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=448 http://secunia.com/advisories/23157 http://securitytracker.com/id?1017326 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974824.htm http://www.securityfocus.com/bid/21395 http://www.securityfocus.com/bid/21400 http://www.vupen.com/english/advisories/2006/4829 https://exchange.xforce.ibmcloud.com/vulnerabilities/30665 •