16 results (0.026 seconds)

CVSS: 5.0EPSS: 0%CPEs: 31EXPL: 0

The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors. La función id1.GetPrinterURLList en Novell iPrint Client anterior a la versión 5.93 permite a atancantes remotos provocar una denegación de servicio a través de vectores no especificados. • http://www.novell.com/support/kb/doc.php?id=7014184 https://bugzilla.novell.com/show_bug.cgi?id=848735 •

CVSS: 10.0EPSS: 64%CPEs: 27EXPL: 0

Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors. Desbordamiento basado en pila en Novell iPrint Client anterior a v5.90 que permite a atacantes remotos ejecutar código arbitrario a través de vectores desconocidos. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of functions that take a URI as a parameter. The issue lies in the failure to validate the size of received data prior to copying it into a fixed size buffer. • http://download.novell.com/Download?buildid=k6yH0sy992E~ http://www.novell.com/support/kb/doc.php?id=7012344 http://www.securityfocus.com/bid/59612 https://bugzilla.novell.com/show_bug.cgi?id=800593 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 11%CPEs: 25EXPL: 0

Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action. Una vulnerabilidad no especificada en el cliente de Novell iPrint antes de v5.82 Permite a atacantes remotos ejecutar código de su elección a través de una acción op-client-interface-version. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ienipp.ocx ActiveX object. A vulnerability exists in the op-client-interface-version operation, which takes two strings as parameters. • http://www.novell.com/support/kb/doc.php?id=7008708 •

CVSS: 10.0EPSS: 2%CPEs: 25EXPL: 0

The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436. El método GetPrinterURLList2 en el control ActiveX del cliente de Novell iPrint Client anteriores a v5.78 en Windows permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de vectores no especificados, una vulnerabilidad diferente a CVE-2008-2431 y CVE-2008-2436. • http://www.novell.com/support/viewContent.do?externalId=7008708 http://www.novell.com/support/viewContent.do?externalId=7010144 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 3%CPEs: 25EXPL: 0

Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705. Una vulnerabilidad de desbordamiento de pila basado en búfer en nipplib.dll en el cliente de Novell iPrint antes de v5.78 bajo Windows permite a atacantes remotos ejecutar código de su elección a través de un parámetro client-file-name (nombre de archivo cliente) en una URL de impresora. Se trata de una vulnerabilidad diferente a CVE-2011-1705. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the nipplib component which is used by both the ActiveX and Netscape compatible browser plugins as well as the Microsoft Windows spooler service. • http://www.novell.com/support/viewContent.do?externalId=7008708 http://www.novell.com/support/viewContent.do?externalId=7010145 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •