Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lumension patchlink update server 6.2.0.181 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2006-3425
FastPatch for (a) PatchLink Update Server (PLUS) prior to 6.1 P1 and 6.2.x prior to 6.2 SR1 P1, and (b) Novell ZENworks 6.2 SR1 and previous versions, does not require authentication for dagent/proxyreg.asp, which allows remote malicious users to list, add, or delete PatchLink Di...
Lumension Patchlink Update Server 6.2.0.189
Novell Zenworks
Lumension Patchlink Update Server 6.1
Lumension Patchlink Update Server 6.2.0.181
445
VMScore
CVE-2006-3426
Directory traversal vulnerability in (a) PatchLink Update Server (PLUS) prior to 6.1 P1 and 6.2.x prior to 6.2 SR1 P1 and (b) Novell ZENworks 6.2 SR1 and previous versions allows remote malicious users to overwrite arbitrary files and directories via a .. (dot dot) sequence in th...
Lumension Patchlink Update Server 6.2.0.181
Lumension Patchlink Update Server 6.2.0.189
Novell Zenworks
Lumension Patchlink Update Server 6.1
668
VMScore
CVE-2006-3430
SQL injection vulnerability in checkprofile.asp in (1) PatchLink Update Server (PLUS) prior to 6.1 P1 and 6.2.x prior to 6.2 SR1 P1 and (2) Novell ZENworks 6.2 SR1 and previous versions, allows remote malicious users to execute arbitrary SQL commands via the agentid parameter.
Lumension Patchlink Update Server 6.1
Novell Zenworks
Lumension Patchlink Update Server 6.2.0.181
Lumension Patchlink Update Server 6.2.0.189
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started