Page 5 of 27 results (0.003 seconds)

CVSS: 9.3EPSS: 19%CPEs: 14EXPL: 2

The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method. El control ActiveX ienipp.ocx en el plugin para el navegador en el cliente de Novell iPrint antes de v5.42 no valida correctamente el parámetro debug, lo que permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (por corrupción de memoria de pila) a través de un parámetro value con una longitud modificada a mano. Se trata de una vulnerabilidad relacionada con el método ExecuteRequest. • https://www.exploit-db.com/exploits/15073 https://www.exploit-db.com/exploits/16492 http://download.novell.com/Download?buildid=ftwZBxEFjIg~ http://dvlabs.tippingpoint.com/advisory/TPTI-10-06 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12044 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 94%CPEs: 15EXPL: 2

Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action. Un desbordamiento de búfer basado en pila en iPrint de Novell Client antes de v5.44 permite a atacantes remotos ejecutar código arbitrario mediante un parámetro call-back-url demasiado largo en una acción op-client-interface-version. • https://www.exploit-db.com/exploits/15042 https://www.exploit-db.com/exploits/15072 http://secunia.com/advisories/40805 http://secunia.com/secunia_research/2010-104 http://www.novell.com/support/viewContent.do?externalId=7006679 http://www.securityfocus.com/bid/42576 https://exchange.xforce.ibmcloud.com/vulnerabilities/61220 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11973 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 7%CPEs: 4EXPL: 0

Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the "name" parameter. Atacantes remotos puede utilizar el plugin ActiveX del navegador web de iPrint en Novell iPrint Client en versiones anteriores a 5.42 para Windows XP/Vista/Win7 para ejecutar código desbordando el parámetro "name". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Novell iPrint Client browser plugin. User interaction is required in that a target must visit a malicious web page. The specific flaw exists within handling plugin parameters. The application does not properly verify the name of parameters passed via <embed> tags. • https://www.novell.com/support/kb/doc.php?id=7006675 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 12%CPEs: 9EXPL: 0

Stack-based buffer overflow in the ExecuteRequest method in the Novell iPrint ActiveX control in ienipp.ocx in Novell iPrint Client 5.06 and earlier allows remote attackers to execute arbitrary code via a long target-frame option value, a different vulnerability than CVE-2008-2431. Desbordamiento de búfer basado en pila en el método ExecuteRequest en el control ActiveX Novell iPrint en ienipp.ocx en Novell iPrint Client 5.06 y versiones anteriores, permite a los atacantes remotos ejecutar código arbitrario a través de un valor de opción largo 'target-frame'. • http://secunia.com/advisories/30667 http://secunia.com/secunia_research/2008-27/advisory http://www.securityfocus.com/bid/30813 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 0

Insecure method vulnerability in the GetFileList method in an unspecified ActiveX control in Novell iPrint Client before 5.06 allows remote attackers to list the image files in an arbitrary directory via a directory name in the argument. Vulnerabilidad de método inseguro en el método GetFileList en un control ActiveX no especificado en Novell iPrint Client anterior a v5.06 permite a atacantes remotos listar los archivos de imagen en un directorio de su elección mediante un nombre de directorio en el argumento. • http://secunia.com/advisories/30667 http://secunia.com/secunia_research/2008-30/advisory http://www.securityfocus.com/bid/30813 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •