Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell zenworks configuration management 10.3 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2011-3174
Buffer overflow in the DoFindReplace function in the ISGrid.Grid2.1 ActiveX control in InstallShield/ISGrid2.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote malicious users to execute arbitrary code via a long bstrReplaceT...
Novell Zenworks Configuration Management 11
Novell Zenworks Configuration Management 10.2
Novell Zenworks Configuration Management 10.3
4.3
CVSSv2
CVE-2013-6344
The ZCC page in Novell ZENworks Configuration Management (ZCM) prior to 11.2.4 allows malicious users to conduct cross-frame scripting attacks via unknown vectors.
Novell Zenworks Configuration Management 10.3.1
Novell Zenworks Configuration Management 10.3
Novell Zenworks Configuration Management 10.2
Novell Zenworks Configuration Management
Novell Zenworks Configuration Management 11.2
Novell Zenworks Configuration Management 11
Novell Zenworks Configuration Management 10.3.3
Novell Zenworks Configuration Management 10.3.2
4.3
CVSSv2
CVE-2012-2223
The xplat agent in Novell ZENworks Configuration Management (ZCM) 10.3.x prior to 10.3.4 and 11.x prior to 11.2 enables the HTTP TRACE method, which might make it easier for remote malicious users to conduct cross-site tracing (XST) attacks via unspecified vectors.
Novell Zenworks Configuration Management 11
Novell Zenworks Configuration Management 11.1
Novell Zenworks Configuration Management 10.3.2
Novell Zenworks Configuration Management 10.3.3
Novell Zenworks Configuration Management 11.1a
Novell Zenworks Configuration Management 10.3
Novell Zenworks Configuration Management 10.3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2