Page 12 of 58 results (0.005 seconds)

CVSS: 7.5EPSS: 95%CPEs: 1EXPL: 3

Multiple SQL injection vulnerabilities in Novell ZENworks Patch Management 6.x before 6.2.2.181 allow remote attackers to execute arbitrary SQL commands via the (1) Direction parameter to computers/default.asp, and the (2) SearchText, (3) StatusFilter, and (4) computerFilter parameters to reports/default.asp. • https://www.exploit-db.com/exploits/26430 https://www.exploit-db.com/exploits/26429 http://cirt.dk/advisories/cirt-39-advisory.pdf http://secunia.com/advisories/17358 http://securityreason.com/securityalert/124 http://securitytracker.com/id?1015116 http://support.novell.com/cgi-bin/search/searchtid.cgi?10099318.htm http://www.kb.cert.org/vuls/id/536300 http://www.osvdb.org/20362 http://www.osvdb.org/20363 http://www.securityfocus.com/archive/1/414880 http:// •

CVSS: 7.5EPSS: 95%CPEs: 7EXPL: 2

Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests. • https://www.exploit-db.com/exploits/16815 https://www.exploit-db.com/exploits/1150 http://marc.info/?l=bugtraq&m=111645317713662&w=2 http://secunia.com/advisories/15433 http://securitytracker.com/id?1014005 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm http://www.rem0te.com/public/images/zen.pdf http://www.securityfocus.com/bid/13678 http://www.vupen.com/english/advisories/2005/0571 https://exchange.xforce.ibmcloud.com/vulnerabilities/20639 https: •

CVSS: 7.5EPSS: 4%CPEs: 4EXPL: 0

Buffer overflow in the portmapper service (PMAP.NLM) in Novell NetWare 6 SP3 and ZenWorks for Desktops 3.2 SP2 through 4.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown attack vectors. • http://secunia.com/advisories/10100 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10088194.htm http://www.securityfocus.com/bid/8907 https://exchange.xforce.ibmcloud.com/vulnerabilities/13564 •