2 results (0.008 seconds)

CVSS: 7.5EPSS: 95%CPEs: 7EXPL: 2

Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests. • https://www.exploit-db.com/exploits/16815 https://www.exploit-db.com/exploits/1150 http://marc.info/?l=bugtraq&m=111645317713662&w=2 http://secunia.com/advisories/15433 http://securitytracker.com/id?1014005 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm http://www.rem0te.com/public/images/zen.pdf http://www.securityfocus.com/bid/13678 http://www.vupen.com/english/advisories/2005/0571 https://exchange.xforce.ibmcloud.com/vulnerabilities/20639 https: •

CVSS: 7.5EPSS: 4%CPEs: 4EXPL: 0

Buffer overflow in the portmapper service (PMAP.NLM) in Novell NetWare 6 SP3 and ZenWorks for Desktops 3.2 SP2 through 4.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown attack vectors. • http://secunia.com/advisories/10100 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10088194.htm http://www.securityfocus.com/bid/8907 https://exchange.xforce.ibmcloud.com/vulnerabilities/13564 •