Page 2 of 7 results (0.003 seconds)

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Novell ZENworks for Desktops 4.0.1, ZENworks for Servers 3.0.2, and ZENworks 6.5 Desktop Management does not restrict access to Remote Diagnostics, which allows local users to bypass security policies by using Console One. • http://secunia.com/advisories/17700 http://securitytracker.com/id?1015260 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098818.htm http://www.securityfocus.com/bid/15540 http://www.vupen.com/english/advisories/2005/2544 •

CVSS: 7.5EPSS: 95%CPEs: 7EXPL: 2

Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests. • https://www.exploit-db.com/exploits/16815 https://www.exploit-db.com/exploits/1150 http://marc.info/?l=bugtraq&m=111645317713662&w=2 http://secunia.com/advisories/15433 http://securitytracker.com/id?1014005 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm http://www.rem0te.com/public/images/zen.pdf http://www.securityfocus.com/bid/13678 http://www.vupen.com/english/advisories/2005/0571 https://exchange.xforce.ibmcloud.com/vulnerabilities/20639 https: •