3 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 31EXPL: 0

The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors. La función id1.GetPrinterURLList en Novell iPrint Client anterior a la versión 5.93 permite a atancantes remotos provocar una denegación de servicio a través de vectores no especificados. • http://www.novell.com/support/kb/doc.php?id=7014184 https://bugzilla.novell.com/show_bug.cgi?id=848735 •

CVSS: 10.0EPSS: 64%CPEs: 27EXPL: 0

Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors. Desbordamiento basado en pila en Novell iPrint Client anterior a v5.90 que permite a atacantes remotos ejecutar código arbitrario a través de vectores desconocidos. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of functions that take a URI as a parameter. The issue lies in the failure to validate the size of received data prior to copying it into a fixed size buffer. • http://download.novell.com/Download?buildid=k6yH0sy992E~ http://www.novell.com/support/kb/doc.php?id=7012344 http://www.securityfocus.com/bid/59612 https://bugzilla.novell.com/show_bug.cgi?id=800593 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 11%CPEs: 25EXPL: 0

Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action. Una vulnerabilidad no especificada en el cliente de Novell iPrint antes de v5.82 Permite a atacantes remotos ejecutar código de su elección a través de una acción op-client-interface-version. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ienipp.ocx ActiveX object. A vulnerability exists in the op-client-interface-version operation, which takes two strings as parameters. • http://www.novell.com/support/kb/doc.php?id=7008708 •