[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:1250
The host is installed with Novell iPrint Client and is prone to stack-based buffer overflow vulnerability. A flaw is present in nipplib.dll where the process blindly copies user supplied data into a fixed-length buffer on the stack. Successful exploitation allows remote attacker to execute arbitrary ...

oval:org.secpod.oval:def:1252
The host is installed with Novell iPrint Client and is prone to heap-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the client-file-name parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the ...

oval:org.secpod.oval:def:1251
The host is installed with Novell iPrint Client and is prone to stack-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the iprint-client-config-info parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buf ...

oval:org.secpod.oval:def:1254
The host is installed with Novell iPrint Client and is prone to heap-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the driver-version parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the h ...

oval:org.secpod.oval:def:1253
The host is installed with Novell iPrint Client and is prone to heap-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the core-package parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the hea ...

oval:org.secpod.oval:def:1256
The host is installed with Novell iPrint Client and is prone to heap-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the profile-name parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the hea ...

oval:org.secpod.oval:def:1255
The host is installed with Novell iPrint Client and is prone to heap-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the file-date-time parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the h ...

oval:org.secpod.oval:def:1258
The host is installed with Novell iPrint Client and is prone to Heap-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the uri parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the heap. Succes ...

oval:org.secpod.oval:def:1257
The host is installed with Novell iPrint Client and is prone to heap-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the profile-time parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the hea ...

oval:org.secpod.oval:def:4181
The host is installed with Novell iPrint client before 5.78 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long realm field. Successful exploitation allows remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:4182
The host is installed with Novell iPrint client before 5.78 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted client-file-name parameter in a printer-url. Successful exploitation allows remote attackers to execute ...

oval:org.secpod.oval:def:4183
The host is installed with Novell iPrint client before 5.78 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

oval:org.secpod.oval:def:10882
The host is installed with Novell iPrint Client before 5.90 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle specially crafted data. Successful exploitation allows attackers to execute arbitrary code.

oval:org.secpod.oval:def:1249
The host is installed with Novell iPrint Client an dis prone to stack-based buffer overflow vulnerbility. A flaw is present in nipplib.dll where the process blindly copies user supplied data into a fixed-length buffer on the stack. Successful exploitation allows remote attacker to execute arbitrary ...

oval:org.mitre.oval:def:12074
A certain ActiveX control in ienipp.ocx in the browser plugin in Novell iPrint Client before 5.42 does not properly restrict the set of files to be deleted, which allows remote attackers to cause a denial of service (recursive file deletion) via unspecified vectors related to a "logic flaw" in the C ...

oval:org.mitre.oval:def:11915
Buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code by using EMBED elements to pass parameters with long names.

oval:org.mitre.oval:def:11817
The PluginGetDriverFile function in Novell iPrint Client before 5.44 interprets an uninitialized memory location as a pointer value, which allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely ...

oval:org.mitre.oval:def:12044
The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related ...

oval:org.mitre.oval:def:11973
Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action.

oval:org.secpod.oval:def:8253
The host is installed with Novell iPrint Client before 5.82 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle an op-client-interface-version action. Successful exploitation allows remote attackers to execute arbitrary code.

oval:org.mitre.oval:def:12046
Stack-based buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code via a long operation parameter.

CVE    26
CVE-2011-1701
CVE-2011-1700
CVE-2011-1705
CVE-2011-1704
...
*CPE
cpe:/a:novell:iprint:4.32

© SecPod Technologies