Page 2 of 6 results (0.002 seconds)

CVSS: 7.5EPSS: 95%CPEs: 7EXPL: 2

Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests. • https://www.exploit-db.com/exploits/16815 https://www.exploit-db.com/exploits/1150 http://marc.info/?l=bugtraq&m=111645317713662&w=2 http://secunia.com/advisories/15433 http://securitytracker.com/id?1014005 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm http://www.rem0te.com/public/images/zen.pdf http://www.securityfocus.com/bid/13678 http://www.vupen.com/english/advisories/2005/0571 https://exchange.xforce.ibmcloud.com/vulnerabilities/20639 https: •