Page 2 of 10 results (0.002 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Client Firewall in NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to bypass firewall program execution rules by replacing an allowed program with an arbitrary program. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042640.html http://secunia.com/advisories/19082 http://www.securityfocus.com/archive/1/426480/100/0/threaded http://www.securityfocus.com/bid/16906 https://exchange.xforce.ibmcloud.com/vulnerabilities/25242 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to bypass security protections and configure privileged options via a long argument to ncpmon.exe, which provides access to alternate privileged menus, possibly due to a buffer overflow. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042640.html http://secunia.com/advisories/19082 http://www.securityfocus.com/archive/1/426480/100/0/threaded http://www.securityfocus.com/bid/16906 https://exchange.xforce.ibmcloud.com/vulnerabilities/25243 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to cause a denial of service (memory usage and cpu utilization) via a flood of arbitrary UDP datagrams to ports 0 to 65000. NOTE: this issue was reported as a buffer overflow, but that term usually does not apply in flooding attacks. NCP Network Communication Secure Client 8.11 Build 146 y posiblemente otras versiones, permite a usuarios locales provocar una denegación de servicio (uso de memoria y utilización de cpu) a través de una inundación de datagramas UDP arbitrarios de los puertos 0 a 65000. NOTA: este caso fue reportado como un desbordamiento de buffer, pero ese término no se aplica por lo general en ataques de inundación. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042640.html http://secunia.com/advisories/19082 http://www.securityfocus.com/archive/1/426480/100/0/threaded http://www.securityfocus.com/bid/16906 https://exchange.xforce.ibmcloud.com/vulnerabilities/25249 • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The ncprwsnt service in NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to execute arbitrary code by modifying the connect.bat script, which is automatically executed by the service after a connection is established. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042640.html http://secunia.com/advisories/19082 http://securityreason.com/securityalert/524 http://www.securityfocus.com/archive/1/426480/100/0/threaded http://www.securityfocus.com/bid/16906 https://exchange.xforce.ibmcloud.com/vulnerabilities/25251 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to cause a denial of service (CPU consumption) via a large number of arguments to ncprwsnt.exe, possibly due to a buffer overflow. NCP Network Communication Secure Client 8.11 Build 146 y posiblemente otras versiones, permite a usuarios locales provocar una denegación de servicio (consumo de CPU) a través de un número grande de argumentos para ncprwsnt.exe, posiblemente debido a un desbordamiento de buffer. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042640.html http://secunia.com/advisories/19082 http://www.securityfocus.com/archive/1/426480/100/0/threaded http://www.securityfocus.com/bid/16906 https://exchange.xforce.ibmcloud.com/vulnerabilities/25248 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-399: Resource Management Errors •