Vulnerabilities
Vulnerable Software
Novell:  >> Zenworks Asset Management  Security Vulnerabilities
The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function.
CVSS Score
7.8
EPSS Score
0.784
Published
2012-10-20
Directory traversal vulnerability in the rtrlet component in Novell ZENworks Asset Management (ZAM) 7.5 allows remote attackers to execute arbitrary code by uploading an executable file.
CVSS Score
10.0
EPSS Score
0.868
Published
2011-12-08
Integer overflow in Msg.dll in Novell ZENworks 7 Asset Management (ZAM) before SP1 IR11 and the Collection client allows remote attackers to execute arbitrary code via crafted packets, which trigger a heap-based buffer overflow.
CVSS Score
10.0
EPSS Score
0.139
Published
2006-12-05


Contact Us

Shodan ® - All rights reserved