Download
| Alert*
oval:org.secpod.oval:def:10882
The host is installed with Novell iPrint Client before 5.90 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle specially crafted data. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:4181 The host is installed with Novell iPrint client before 5.78 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long realm field. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:4182 The host is installed with Novell iPrint client before 5.78 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted client-file-name parameter in a printer-url. Successful exploitation allows remote attackers to execute ... oval:org.secpod.oval:def:4183 The host is installed with Novell iPrint client before 5.78 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service. oval:org.secpod.oval:def:8253 The host is installed with Novell iPrint Client before 5.82 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle an op-client-interface-version action. Successful exploitation allows remote attackers to execute arbitrary code. |