![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2012-4933 |
Description: | The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard- coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.902928 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-4933 CERT/CC vulnerability note: VU#332412 http://www.kb.cert.org/vuls/id/332412 https://community.rapid7.com/community/metasploit/blog/2012/10/15/cve-2012-4933-novell-zenworks http://www.securitytracker.com/id?1027682 XForce ISS Database: novell-zam-info-disclosure(79252) https://exchange.xforce.ibmcloud.com/vulnerabilities/79252 |