Page 5 of 31 results (0.018 seconds)

CVSS: 1.2EPSS: 18%CPEs: 2EXPL: 0

Format string vulnerability in Novell Modular Authentication Services (NMAS) in the Novell Client 4.91 SP2 and SP3 allows users with physical access to read stack and memory contents via format string specifiers in the Username field of the logon window. Vulnerabilidad de cadena de formato en Novell Modular Authentication Services (NMAS) en Novell Client 4.91 SP2 y SP3 permite a usuarios con acceso físico leer el contenido de la memoria y de la pila mediante especificadores de cadenas de formato en el campo Username de la ventana de inicio de sesión. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051038.html http://secunia.com/advisories/23363 http://securityreason.com/securityalert/1970 http://securitytracker.com/id?1017377 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974872.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974876.htm http://www.layereddefense.com/Novell01DEC.html http://www.securityfocus.com/archive/1/453176/100/0/threaded http://www.vupen.com/english/advisories/2006/4 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 0

srvloc.sys in Novell Client for Windows before 4.91 SP3 allows remote attackers to cause an unspecified denial of service via a crafted packet to port 427 that triggers an access of pageable or invalid addresses using a higher interrupt request level (IRQL) than necessary. srvloc.sys en Novell Client para Windows anterior a 4.91 SP3 permite a atacantes remotos provocar una denegación de servicio mediante paquetes artesanales al puerto 427 que provoca un acceso a direcciones inválidas usando un nivel de petición de interrupción (IRQL) mayor que el necesario. • http://secunia.com/advisories/23244 http://www.securityfocus.com/bid/21430 http://www.vupen.com/english/advisories/2006/4840 https://secure-support.novell.com/KanisaPlatform/Publishing/859/3480790_f.SAL_Public.html •

CVSS: 7.5EPSS: 92%CPEs: 3EXPL: 2

Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 through 4.91 SP2 allow remote attackers to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions. Múltiples desbordamientos de búfer en el servicio de Spooler(nwspool.dll) en Novell Netware Client 4.91 hasta 4.91 SP2 permite a atacantes remotos ejecutar código de su elección a través de un gran argumentos a las funciones (1) EnumPrinters y (2) OpenPrinter. This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the Novell Netware Client. Authentication is not required to exploit this vulnerability. The specific flaw exists in a print provider installed by the Netware Client. The nwspool.dll library does not properly handle long arguments to the Win32 EnumPrinters() and OpenPrinter() functions. • https://www.exploit-db.com/exploits/3220 https://www.exploit-db.com/exploits/29146 http://secunia.com/advisories/23027 http://securitytracker.com/id?1017263 http://securitytracker.com/id?1017315 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm http://www.kb.cert.org/vuls/id/300636 http://www.kb.cert.org/vuls/id/653076 http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public http://www.securityfocus.com/archive/1/ •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Agnitum Outpost Firewall Pro 3.51.759.6511 (462), as used in (1) Lavasoft Personal Firewall 1.0.543.5722 (433) and (2) Novell BorderManager Novell Client Firewall 2.0, does not properly restrict user activities in application windows that run in a LocalSystem context, which allows local users to gain privileges and execute commands (a) via the "open folder" option when no instance of explorer.exe is running, possibly related to the ShellExecute API function; or (b) by overwriting a batch file through the "Save Configuration As" option. NOTE: this might be a vulnerability in Microsoft Windows and explorer.exe instead of the firewall. Agnitum Outpost Firewall Pro 3.51.759.6511 (462), tal y como se usa en (1) Lavasoft Personal Firewall 1.0.543.5722 (433) y (2) Novell BorderManager Novell Client Firewall 2.0, no restringe de forma adecuada las actividades de usuario para ganar privilegios y ejecutar comandos (a)a través de la opción "abrir carpeta" cuando una instancia de explorer.exe está funcionando, posiblemente relacionado con la función API ShellExecute, o (b) a través de la re-escritura de un fichero de proceso por lotes a través de la opción "Guardar configuración como". NOTA: esto podría estar relacionado con la vulnerabilidad en Microsoft Windows y la instnacia explorer.exe del firewall. • http://secunia.com/advisories/21088 http://secunia.com/advisories/21089 http://www.ben.goulding.com.au/secad.html http://www.osvdb.org/27349 http://www.securityfocus.com/archive/1/440426/100/0/threaded http://www.securityfocus.com/bid/19018 http://www.securityfocus.com/bid/19024 http://www.vupen.com/english/advisories/2006/2851 http://www.vupen.com/english/advisories/2006/2852 http://www.vupen.com/english/advisories/2007/0144 https://secure-support.novell.com/K • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Novell Client for Windows 4.8 and 4.9 does not restrict access to the clipboard contents while a machine is locked, which allows users with physical access to read the current clipboard contents by pasting them into the "User Name" field on the login prompt. • http://secunia.com/advisories/20194 http://securityreason.com/securityalert/961 http://www.osvdb.org/25760 http://www.securityfocus.com/archive/1/434704/100/0/threaded http://www.securityfocus.com/archive/1/434724/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/26595 •