cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2012-4933,https://securityvulnerability.io/vulnerability/CVE-2012-4933,,"The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function.",Novell,Zenworks Asset Management,,,0.9687600135803223,false,false,false,false,,false,false,2012-10-20T18:00:00.000Z,0 CVE-2011-2653,https://securityvulnerability.io/vulnerability/CVE-2011-2653,,Directory traversal vulnerability in the rtrlet component in Novell ZENworks Asset Management (ZAM) 7.5 allows remote attackers to execute arbitrary code by uploading an executable file.,Novell,Zenworks Asset Management,,,0.9703099727630615,false,false,false,false,,false,false,2011-12-08T11:55:00.000Z,0 CVE-2006-6299,https://securityvulnerability.io/vulnerability/CVE-2006-6299,,"Integer overflow in Msg.dll in Novell ZENworks 7 Asset Management (ZAM) before SP1 IR11 and the Collection client allows remote attackers to execute arbitrary code via crafted packets, which trigger a heap-based buffer overflow.",Novell,Zenworks Asset Management,,,0.12820999324321747,false,false,false,false,,false,false,2006-12-05T11:00:00.000Z,0