Page 5 of 25 results (0.009 seconds)

CVSS: 1.2EPSS: 18%CPEs: 2EXPL: 0

Format string vulnerability in Novell Modular Authentication Services (NMAS) in the Novell Client 4.91 SP2 and SP3 allows users with physical access to read stack and memory contents via format string specifiers in the Username field of the logon window. Vulnerabilidad de cadena de formato en Novell Modular Authentication Services (NMAS) en Novell Client 4.91 SP2 y SP3 permite a usuarios con acceso físico leer el contenido de la memoria y de la pila mediante especificadores de cadenas de formato en el campo Username de la ventana de inicio de sesión. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051038.html http://secunia.com/advisories/23363 http://securityreason.com/securityalert/1970 http://securitytracker.com/id?1017377 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974872.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974876.htm http://www.layereddefense.com/Novell01DEC.html http://www.securityfocus.com/archive/1/453176/100/0/threaded http://www.vupen.com/english/advisories/2006/4 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 0

srvloc.sys in Novell Client for Windows before 4.91 SP3 allows remote attackers to cause an unspecified denial of service via a crafted packet to port 427 that triggers an access of pageable or invalid addresses using a higher interrupt request level (IRQL) than necessary. srvloc.sys en Novell Client para Windows anterior a 4.91 SP3 permite a atacantes remotos provocar una denegación de servicio mediante paquetes artesanales al puerto 427 que provoca un acceso a direcciones inválidas usando un nivel de petición de interrupción (IRQL) mayor que el necesario. • http://secunia.com/advisories/23244 http://www.securityfocus.com/bid/21430 http://www.vupen.com/english/advisories/2006/4840 https://secure-support.novell.com/KanisaPlatform/Publishing/859/3480790_f.SAL_Public.html •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Novell Client for Windows 4.8 and 4.9 does not restrict access to the clipboard contents while a machine is locked, which allows users with physical access to read the current clipboard contents by pasting them into the "User Name" field on the login prompt. • http://secunia.com/advisories/20194 http://securityreason.com/securityalert/961 http://www.osvdb.org/25760 http://www.securityfocus.com/archive/1/434704/100/0/threaded http://www.securityfocus.com/archive/1/434724/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/26595 •

CVSS: 10.0EPSS: 16%CPEs: 3EXPL: 0

Multiple integer overflows in the DPRPC library (DPRPCW32.DLL) in Novell Client 4.83 SP3, 4.90 SP2 and 4.91 SP2 allow remote attackers to execute arbitrary code via an XDR encoded array with a field that specifies a large number of elements, which triggers the overflows in the ndps_xdr_array function. NOTE: this was originally reported to be a buffer overflow by Novell, but the original cause is an integer overflow. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046048.html http://secunia.com/advisories/20048 http://securitytracker.com/id?1016052 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973719.htm http://www.hustlelabs.com/novell_ndps_advisory.pdf http://www.osvdb.org/25429 http://www.securityfocus.com/archive/1/434017/100/0/threaded http://www.securityfocus.com/bid/17931 http://www.vupen.com/english/advisories/2006/1759 https://exchange.xforce.ibmcloud. •

CVSS: 10.0EPSS: 6%CPEs: 2EXPL: 0

Norton AntiVirus 5.00.01C with the Novell Netware client does not properly restart the auto-protection service after the first user has logged off of the system. • http://www.securityfocus.com/bid/1533 http://www.securityfocus.com/templates/archive.pike?list=1&msg=398222C5%40zathras.cc.vt.edu •