Page 5 of 24 results (0.009 seconds)

CVSS: 9.3EPSS: 19%CPEs: 14EXPL: 2

The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method. El control ActiveX ienipp.ocx en el plugin para el navegador en el cliente de Novell iPrint antes de v5.42 no valida correctamente el parámetro debug, lo que permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (por corrupción de memoria de pila) a través de un parámetro value con una longitud modificada a mano. Se trata de una vulnerabilidad relacionada con el método ExecuteRequest. • https://www.exploit-db.com/exploits/15073 https://www.exploit-db.com/exploits/16492 http://download.novell.com/Download?buildid=ftwZBxEFjIg~ http://dvlabs.tippingpoint.com/advisory/TPTI-10-06 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12044 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 94%CPEs: 15EXPL: 2

Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action. Un desbordamiento de búfer basado en pila en iPrint de Novell Client antes de v5.44 permite a atacantes remotos ejecutar código arbitrario mediante un parámetro call-back-url demasiado largo en una acción op-client-interface-version. • https://www.exploit-db.com/exploits/15042 https://www.exploit-db.com/exploits/15072 http://secunia.com/advisories/40805 http://secunia.com/secunia_research/2010-104 http://www.novell.com/support/viewContent.do?externalId=7006679 http://www.securityfocus.com/bid/42576 https://exchange.xforce.ibmcloud.com/vulnerabilities/61220 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11973 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 7%CPEs: 4EXPL: 0

Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the "name" parameter. Atacantes remotos puede utilizar el plugin ActiveX del navegador web de iPrint en Novell iPrint Client en versiones anteriores a 5.42 para Windows XP/Vista/Win7 para ejecutar código desbordando el parámetro "name". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Novell iPrint Client browser plugin. User interaction is required in that a target must visit a malicious web page. The specific flaw exists within handling plugin parameters. The application does not properly verify the name of parameters passed via <embed> tags. • https://www.novell.com/support/kb/doc.php?id=7006675 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 91%CPEs: 2EXPL: 1

Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time. Múltiples desbordamientos de búfer basados en pila en Novell iPrint Client v4.38, v5.30, y probablemente otras versiones anteriores a v5.32 permite a atacantes remotos ejecutar código de su elección a través de vectores relacionados con (1) Date y (2) Time. • https://www.exploit-db.com/exploits/16543 http://download.novell.com/Download?buildid=29T3EFRky18~ http://secunia.com/advisories/35004 http://secunia.com/advisories/37169 http://secunia.com/secunia_research/2009-44 http://www.securityfocus.com/archive/1/508288/100/0/threaded http://www.securityfocus.com/bid/37242 http://www.vupen.com/english/advisories/2009/3429 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •