Page 103 of 671 results (0.010 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in the Novell Distributed Print Services (NDPS) Print Provider for Windows component (NDPPNT.DLL) in Novell Client 4.91 has unknown impact and remote attack vectors. Desbordamiento de búfer en Novell Distributed Print Services (NDPS) Print Provider para componentes de Windows (NDPPNT.DLL) en Novell Client 4.91 tiene impacto desconocido y ataques de vectores remotos. • http://secunia.com/advisories/23271 http://support.novell.com/docs/Readmes/InfoDocument/2974843.html http://www.securityfocus.com/bid/21479 http://www.vupen.com/english/advisories/2006/4862 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 0

srvloc.sys in Novell Client for Windows before 4.91 SP3 allows remote attackers to cause an unspecified denial of service via a crafted packet to port 427 that triggers an access of pageable or invalid addresses using a higher interrupt request level (IRQL) than necessary. srvloc.sys en Novell Client para Windows anterior a 4.91 SP3 permite a atacantes remotos provocar una denegación de servicio mediante paquetes artesanales al puerto 427 que provoca un acceso a direcciones inválidas usando un nivel de petición de interrupción (IRQL) mayor que el necesario. • http://secunia.com/advisories/23244 http://www.securityfocus.com/bid/21430 http://www.vupen.com/english/advisories/2006/4840 https://secure-support.novell.com/KanisaPlatform/Publishing/859/3480790_f.SAL_Public.html •

CVSS: 1.2EPSS: 18%CPEs: 2EXPL: 0

Format string vulnerability in Novell Modular Authentication Services (NMAS) in the Novell Client 4.91 SP2 and SP3 allows users with physical access to read stack and memory contents via format string specifiers in the Username field of the logon window. Vulnerabilidad de cadena de formato en Novell Modular Authentication Services (NMAS) en Novell Client 4.91 SP2 y SP3 permite a usuarios con acceso físico leer el contenido de la memoria y de la pila mediante especificadores de cadenas de formato en el campo Username de la ventana de inicio de sesión. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051038.html http://secunia.com/advisories/23363 http://securityreason.com/securityalert/1970 http://securitytracker.com/id?1017377 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974872.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974876.htm http://www.layereddefense.com/Novell01DEC.html http://www.securityfocus.com/archive/1/453176/100/0/threaded http://www.vupen.com/english/advisories/2006/4 •

CVSS: 10.0EPSS: 12%CPEs: 1EXPL: 0

Integer overflow in Msg.dll in Novell ZENworks 7 Asset Management (ZAM) before SP1 IR11 and the Collection client allows remote attackers to execute arbitrary code via crafted packets, which trigger a heap-based buffer overflow. Desbordamiento de entero en Msg.dll en Novell ZENworks 7 Asset Management (ZAM) anterior al SP1 IR11 y el cliente Collection permiten a atacantes remotos ejecutar código de su elección mediante paquetes artesanales, que provocan un desbordamiento de búfer basado en pila. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=447 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=448 http://secunia.com/advisories/23157 http://securitytracker.com/id?1017326 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974824.htm http://www.securityfocus.com/bid/21395 http://www.securityfocus.com/bid/21400 http://www.vupen.com/english/advisories/2006/4829 https://exchange.xforce.ibmcloud.com/vulnerabilities/30665 •

CVSS: 7.5EPSS: 93%CPEs: 3EXPL: 2

Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 through 4.91 SP2 allow remote attackers to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions. Múltiples desbordamientos de búfer en el servicio de Spooler(nwspool.dll) en Novell Netware Client 4.91 hasta 4.91 SP2 permite a atacantes remotos ejecutar código de su elección a través de un gran argumentos a las funciones (1) EnumPrinters y (2) OpenPrinter. This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the Novell Netware Client. Authentication is not required to exploit this vulnerability. The specific flaw exists in a print provider installed by the Netware Client. The nwspool.dll library does not properly handle long arguments to the Win32 EnumPrinters() and OpenPrinter() functions. • https://www.exploit-db.com/exploits/3220 https://www.exploit-db.com/exploits/29146 http://secunia.com/advisories/23027 http://securitytracker.com/id?1017263 http://securitytracker.com/id?1017315 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm http://www.kb.cert.org/vuls/id/300636 http://www.kb.cert.org/vuls/id/653076 http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public http://www.securityfocus.com/archive/1/ •