Page 2 of 31 results (0.016 seconds)

CVSS: 9.3EPSS: 28%CPEs: 5EXPL: 0

Multiple heap-based buffer overflows in the IppCreateServerRef function in nipplib.dll in Novell iPrint Client 4.x before 4.38 and 5.x before 5.08 allow remote attackers to execute arbitrary code via a long argument to the (1) GetPrinterURLList, (2) GetPrinterURLList2, or (3) GetFileList2 function in the Novell iPrint ActiveX control in ienipp.ocx. Múltiples desbordamientos de búfer basados en pila en la función nipplib.dll de Novell iPrint Client 4.x anteriores a la 4.38 y 5.x anteriores a la 5.08, permite a atacantes remotos ejecutar código arbitrariamente a través de un argumento largo a las funciones (1) GetPrinterURLList, (2) GetPrinterURLList2, o (3) GetFileList2 en el control ActiveX iPrint de Novell en ienipp.ocx. • http://secunia.com/advisories/31370 http://secunia.com/secunia_research/2008-33/advisory http://securityreason.com/securityalert/4228 http://www.securityfocus.com/archive/1/495940/100/0/threaded http://www.securityfocus.com/bid/30986 http://www.securitytracker.com/id?1020806 http://www.vupen.com/english/advisories/2008/2481 https://exchange.xforce.ibmcloud.com/vulnerabilities/44853 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 1

Unspecified vulnerability in NWFS.SYS in Novell Client for Windows 4.91 SP4 has unknown impact and attack vectors, possibly related to IOCTL requests that overwrite arbitrary memory. Vulnerabilidad no especificada en NWFS.SYS de Novell Client para Windows 4.91 SP4 tiene un impacto y vectores de ataque desconocidos, posiblemente relacionado con peticiones IOCTL que sobrescriben memoria de su elección. • https://www.exploit-db.com/exploits/26418 http://secunia.com/advisories/30904 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5028543.html http://www.securityfocus.com/bid/30001 http://www.securitytracker.com/id?1020385 http://www.vupen.com/english/advisories/2008/1968/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43460 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 47%CPEs: 1EXPL: 1

Multiple stack-based buffer overflows in a certain ActiveX control in ienipp.ocx in Novell iPrint Client for Windows before 4.36 allow remote attackers to execute arbitrary code via a long value of the (1) operation, (2) printer-url, or (3) target-frame parameter. NOTE: some of these details are obtained from third party information. Múltiples desbordamientos de búfer basados en pila en un determinado control ActiveX de ienipp.ocx en Novell iPrint Client para Windows versiones anteriores a 4.36 permiten a atacantes remotos ejecutar código de su elección a través un valor largo de los parámetros (1) operation, (2) printer-url, o (3) target-frame. NOTA: algunos de estos detalles han sido obtenidos a partir de la información de terceros. • https://www.exploit-db.com/exploits/16508 http://secunia.com/advisories/30709 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5028061.html http://www.kb.cert.org/vuls/id/145313 http://www.securityfocus.com/bid/29736 http://www.securitytracker.com/id?1020303 http://www.vupen.com/english/advisories/2008/1837/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43085 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Stack-based buffer overflow in Novell Client 4.91 SP4 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long username in the "forgotten password" dialog. Desbordamiento de búfer basado en pila en Novell Client 4.91 SP4 y anteriores permite a usuarios locales provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante un nombre de usuario (username) largo en el diálogo "forgotten password (contraseña olvidada)". • http://secunia.com/advisories/30126 http://securityreason.com/securityalert/3868 http://www.securityfocus.com/archive/1/491814/100/0/threaded http://www.securityfocus.com/bid/29109 http://www.securitytracker.com/id?1020020 http://www.vupen.com/english/advisories/2008/1503 https://exchange.xforce.ibmcloud.com/vulnerabilities/42359 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 54%CPEs: 3EXPL: 1

Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client before 4.34 allows remote attackers to execute arbitrary code via a long argument to the ExecuteRequest method. Desbordamiento de búfer basado en pila en el control Novell iPrint Control ActiveX de ienipp.ocx en Novell iPrint Client antes de 4.34 permite a atacantes remotos ejecutar código de su elección a través de un argumento largo al método ExecuteRequest. • https://www.exploit-db.com/exploits/16514 http://download.novell.com/Download?buildid=prBBH4JpImA~ http://secunia.com/advisories/27994 http://www.securityfocus.com/bid/27939 http://www.securitytracker.com/id?1019489 http://www.vupen.com/english/advisories/2008/0639 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •