
CVE-2020-27643
https://notcve.org/view.php?id=CVE-2020-27643
29 Dec 2020 — The %PROGRAMDATA%\1E\Client directory in 1E Client 5.0.0.745 and 4.1.0.267 allows remote authenticated users and local users to create and modify files in protected directories (where they would not normally have access to create or modify files) via the creation of a junction point to a system directory. This leads to partial privilege escalation. El directorio %PROGRAMDATA%\1E\Client en 1E Client versiones 5.0.0.745 y 4.1.0.267, permite a los usuarios autenticados remotos y a los usuarios locales crear y ... • https://help.1e.com/display/GI/1E+Security+Advisory-1E+Client+for+Windows%3A+CVE-2020-16268%2C+CVE-2020-27643%2C+CVE-2020-27644%2C+CVE-2020-27645 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2020-16268
https://notcve.org/view.php?id=CVE-2020-16268
29 Dec 2020 — The MSI installer in 1E Client 4.1.0.267 and 5.0.0.745 allows remote authenticated users and local users to gain elevated privileges via the repair option. This applies to installations that have a TRANSFORM (MST) with the option to disable the installation of the Nomad module. An attacker may craft a .reg file in a specific location that will be able to write to any registry key as an elevated user. El instalador MSI en 1E Client versiones 4.1.0.267 y 5.0.0.745, permite a los usuarios autenticados remotos ... • https://help.1e.com/display/GI/1E+Security+Advisory-1E+Client+for+Windows%3A+CVE-2020-16268%2C+CVE-2020-27643%2C+CVE-2020-27644%2C+CVE-2020-27645 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2013-3956 – Novell Client 2 SP3 - 'nicm.sys 3.1.11.0' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2013-3956
31 Jul 2013 — The NICM.SYS kernel driver 3.1.11.0 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003; Novell Client 2 SP2 on Windows Vista and Windows Server 2008; and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted 0x143B6B IOCTL call. El controlador del kernel NICM.SYS 3.1.11.0 en Novell Client 4.91 SP5 sobre Windows XP and Windows Server 2003; Novell Client 2 SP2 sobre Windows Vista y Windows Server 2008; y No... • https://www.exploit-db.com/exploits/27191 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-3697
https://notcve.org/view.php?id=CVE-2013-3697
31 Jul 2013 — Integer overflow in the NWFS.SYS kernel driver 4.91.5.8 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003 and the NCPL.SYS kernel driver in Novell Client 2 SP2 on Windows Vista and Windows Server 2008 and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 might allow local users to gain privileges via a crafted 0x1439EB IOCTL call. Desbordamiento de enterio en el controlador para el kernel NWFS.SYS 4.91.5.8 en Novell Client 4.91 SP5 sobre Windows XP y ... • http://pastebin.com/RcS2Bucg • CWE-189: Numeric Errors •

CVE-2008-3158 – Novell Client 4.91 SP4 - 'nwfs.sys' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2008-3158
11 Jul 2008 — Unspecified vulnerability in NWFS.SYS in Novell Client for Windows 4.91 SP4 has unknown impact and attack vectors, possibly related to IOCTL requests that overwrite arbitrary memory. Vulnerabilidad no especificada en NWFS.SYS de Novell Client para Windows 4.91 SP4 tiene un impacto y vectores de ataque desconocidos, posiblemente relacionado con peticiones IOCTL que sobrescriben memoria de su elección. • https://www.exploit-db.com/exploits/26418 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2008-1106
https://notcve.org/view.php?id=CVE-2008-1106
09 Jun 2008 — The management interface in Akamai Client (formerly Red Swoosh) 3322 and earlier allows remote attackers to bypass authentication via an HTTP request that contains (1) no Referer header, or (2) a spoofed Referer header that matches an approved domain, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and force the client to download and execute arbitrary files. La interfaz de administración de Akamai Client (formerly Red Swoosh) 3322 y versiones anteriores permite a atacante... • http://secunia.com/advisories/30135 • CWE-287: Improper Authentication CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2008-2145
https://notcve.org/view.php?id=CVE-2008-2145
12 May 2008 — Stack-based buffer overflow in Novell Client 4.91 SP4 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long username in the "forgotten password" dialog. Desbordamiento de búfer basado en pila en Novell Client 4.91 SP4 y anteriores permite a usuarios locales provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante un nombre de usuario (username) largo en el diálogo "forgotten password (contraseña olvidada)"... • http://secunia.com/advisories/30126 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-6701
https://notcve.org/view.php?id=CVE-2007-6701
13 Feb 2008 — Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP4 for Windows allow remote attackers to execute arbitrary code via long arguments to multiple unspecified RPC functions, aka Novell bug 287919, a different vulnerability than CVE-2007-2954. Múltiples desbordamientos de búfer basados en pila en el servicio Spooler (nwspool.dll) de Novell Client 4.91 SP4 para Windows permiten a atacantes remotos ejecutar código de su elección a través de argumentos largos de múl... • http://archives.neohapsis.com/archives/bugtraq/2007-08/0082.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2008-0639 – Novell Client NWSPOOL.DLL EnumPrinters Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2008-0639
11 Feb 2008 — Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote attackers to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability than CVE-2006-5854. NOTE: this issue exists because of an incomplete fix for CVE-2007-6701. Desbordamiento de búfer basado en pila en la función EnumPrinters del servicio Spooler en Novell Client 4.91 SP2, SP3 y SP4 para Windows, permite a ... • http://download.novell.com/Download?buildid=SszG22IIugM~ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2008-0663
https://notcve.org/view.php?id=CVE-2008-0663
08 Feb 2008 — Novell Challenge Response Client (LCM) 2.7.5 and earlier, as used with Novell Client for Windows 4.91 SP4, allows users with physical access to a locked system to obtain contents of the clipboard by pasting the contents into the Challenge Question field. Novell Challenge Response Client (LCM) 2.7.5 y versiones anteriores, como el usado en Novell Client 4.91 SP4 para Windows, permite a usuarios con acceso físico a un sistema bloqueado obtener contenidos del porta-papeles pegando los contenidos en el campo Ch... • http://secunia.com/advisories/28792 •