Vulnerabilites related to novell - iprint
CVE-2011-1708 (GCVE-0-2011-1708)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025606 | vdb-entry, x_refsource_SECTRACK | |
http://zerodayinitiative.com/advisories/ZDI-11-180/ | x_refsource_MISC | |
http://download.novell.com/Download?buildid=6_bNby38ERg~ | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67882 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/44811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/48124 | vdb-entry, x_refsource_BID | |
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008731 | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/518274/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.459Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "novell-iprint-opprinterlistalljobs-cookie-bo(67882)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48124" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731" }, { "name": "20110606 ZDI-11-180: Novell iPrint op-printer-list-all-jobs cookie Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "novell-iprint-opprinterlistalljobs-cookie-bo(67882)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48124" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731" }, { "name": "20110606 ZDI-11-180: Novell iPrint op-printer-list-all-jobs cookie Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1708", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025606" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-11-180/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/" }, { "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "novell-iprint-opprinterlistalljobs-cookie-bo(67882)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882" }, { "name": "44811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48124" }, { "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731", "refsource": "CONFIRM", "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731" }, { "name": "20110606 ZDI-11-180: Novell iPrint op-printer-list-all-jobs cookie Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1708", "datePublished": "2011-06-09T21:00:00", "dateReserved": "2011-04-15T00:00:00", "dateUpdated": "2024-08-06T22:37:25.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1700 (GCVE-0-2011-1700)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://zerodayinitiative.com/advisories/ZDI-11-173/ | x_refsource_MISC | |
http://www.securitytracker.com/id?1025606 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/518267/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://download.novell.com/Download?buildid=6_bNby38ERg~ | x_refsource_CONFIRM | |
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008722 | x_refsource_CONFIRM | |
http://secunia.com/advisories/44811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/48124 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.337Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-173/" }, { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025606" }, { "name": "20110606 ZDI-11-173: Novell iPrint nipplib.dll profile-time Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518267/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008722" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48124" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted profile-time parameter in a printer-url." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-173/" }, { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025606" }, { "name": "20110606 ZDI-11-173: Novell iPrint nipplib.dll profile-time Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518267/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008722" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48124" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1700", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted profile-time parameter in a printer-url." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://zerodayinitiative.com/advisories/ZDI-11-173/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-11-173/" }, { "name": "1025606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025606" }, { "name": "20110606 ZDI-11-173: Novell iPrint nipplib.dll profile-time Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518267/100/0/threaded" }, { "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008722", "refsource": "CONFIRM", "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008722" }, { "name": "44811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48124" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1700", "datePublished": "2011-06-09T19:00:00", "dateReserved": "2011-04-15T00:00:00", "dateUpdated": "2024-08-06T22:37:25.337Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1701 (GCVE-0-2008-1701)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/41588 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1019750 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/29587 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2008/1074/references | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/28561 | vdb-entry, x_refsource_BID | |
https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:32:01.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "novell-netware-iprint-dos(41588)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41588" }, { "name": "1019750", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019750" }, { "name": "29587", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29587" }, { "name": "ADV-2008-1074", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1074/references" }, { "name": "28561", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28561" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Novell NetWare 6.5 allows attackers to cause a denial of service (ABEND) via a crafted Macintosh iPrint client request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "novell-netware-iprint-dos(41588)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41588" }, { "name": "1019750", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019750" }, { "name": "29587", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29587" }, { "name": "ADV-2008-1074", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1074/references" }, { "name": "28561", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28561" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1701", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Novell NetWare 6.5 allows attackers to cause a denial of service (ABEND) via a crafted Macintosh iPrint client request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "novell-netware-iprint-dos(41588)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41588" }, { "name": "1019750", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019750" }, { "name": "29587", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29587" }, { "name": "ADV-2008-1074", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1074/references" }, { "name": "28561", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28561" }, { "name": "https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html", "refsource": "CONFIRM", "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1701", "datePublished": "2008-04-08T18:00:00", "dateReserved": "2008-04-08T00:00:00", "dateUpdated": "2024-08-07T08:32:01.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3106 (GCVE-0-2010-3106)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://dvlabs.tippingpoint.com/advisory/TPTI-10-06 | x_refsource_MISC | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12044 | vdb-entry, signature, x_refsource_OVAL | |
http://download.novell.com/Download?buildid=ftwZBxEFjIg~ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:55:46.678Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-06" }, { "name": "oval:org.mitre.oval:def:12044", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12044" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-06" }, { "name": "oval:org.mitre.oval:def:12044", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12044" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3106", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-06", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-06" }, { "name": "oval:org.mitre.oval:def:12044", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12044" }, { "name": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3106", "datePublished": "2010-08-23T20:00:00", "dateReserved": "2010-08-23T00:00:00", "dateUpdated": "2024-08-07T02:55:46.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3109 (GCVE-0-2010-3109)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-10-140/ | x_refsource_MISC | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12046 | vdb-entry, signature, x_refsource_OVAL | |
http://download.novell.com/Download?buildid=ftwZBxEFjIg~ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:55:46.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-140/" }, { "name": "oval:org.mitre.oval:def:12046", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12046" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code via a long operation parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-140/" }, { "name": "oval:org.mitre.oval:def:12046", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12046" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3109", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code via a long operation parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-140/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-140/" }, { "name": "oval:org.mitre.oval:def:12046", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12046" }, { "name": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3109", "datePublished": "2010-08-23T20:00:00", "dateReserved": "2010-08-23T00:00:00", "dateUpdated": "2024-08-07T02:55:46.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0411 (GCVE-0-2012-0411)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/kb/doc.php?id=7008708 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:31.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7008708" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-12-24T18:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7008708" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0411", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/kb/doc.php?id=7008708", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7008708" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0411", "datePublished": "2012-12-24T18:00:00Z", "dateReserved": "2012-01-09T00:00:00Z", "dateUpdated": "2024-09-16T19:56:58.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2431 (GCVE-0-2008-2431)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/secunia_research/2008-27/advisory/ | x_refsource_MISC | |
http://secunia.com/advisories/30667 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44616 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/30813 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:58:02.379Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2008-27/advisory/" }, { "name": "30667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30667" }, { "name": "novell-iprint-getdriverfile-bo(44616)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44616" }, { "name": "30813", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Novell iPrint Client before 5.06 allow remote attackers to execute arbitrary code by calling the Novell iPrint ActiveX control (aka ienipp.ocx) with (1) a long third argument to the GetDriverFile method; a long first argument to the (2) GetPrinterURLList or (3) GetPrinterURLList2 method; (4) a long argument to the GetFileList method; a long argument to the (5) GetServerVersion, (6) GetResourceList, or (7) DeleteResource method, related to nipplib.dll; a long uploadPath argument to the (8) UploadPrinterDriver or (9) UploadResource method, related to URIs; (10) a long seventh argument to the UploadResource method; a long string in the (11) second, (12) third, or (13) fourth argument to the GetDriverSettings method, related to the IppGetDriverSettings function in nipplib.dll; or (14) a long eighth argument to the UploadResourceToRMS method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2008-27/advisory/" }, { "name": "30667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30667" }, { "name": "novell-iprint-getdriverfile-bo(44616)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44616" }, { "name": "30813", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30813" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2008-2431", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Novell iPrint Client before 5.06 allow remote attackers to execute arbitrary code by calling the Novell iPrint ActiveX control (aka ienipp.ocx) with (1) a long third argument to the GetDriverFile method; a long first argument to the (2) GetPrinterURLList or (3) GetPrinterURLList2 method; (4) a long argument to the GetFileList method; a long argument to the (5) GetServerVersion, (6) GetResourceList, or (7) DeleteResource method, related to nipplib.dll; a long uploadPath argument to the (8) UploadPrinterDriver or (9) UploadResource method, related to URIs; (10) a long seventh argument to the UploadResource method; a long string in the (11) second, (12) third, or (13) fourth argument to the GetDriverSettings method, related to the IppGetDriverSettings function in nipplib.dll; or (14) a long eighth argument to the UploadResourceToRMS method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/secunia_research/2008-27/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2008-27/advisory/" }, { "name": "30667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30667" }, { "name": "novell-iprint-getdriverfile-bo(44616)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44616" }, { "name": "30813", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30813" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2008-2431", "datePublished": "2008-11-26T01:00:00", "dateReserved": "2008-05-27T00:00:00", "dateUpdated": "2024-08-07T08:58:02.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1091 (GCVE-0-2013-1091)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/59612 | vdb-entry, x_refsource_BID | |
http://www.novell.com/support/kb/doc.php?id=7012344 | x_refsource_CONFIRM | |
https://bugzilla.novell.com/show_bug.cgi?id=800593 | x_refsource_CONFIRM | |
http://download.novell.com/Download?buildid=k6yH0sy992E~ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:49:20.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "59612", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/59612" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7012344" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-05-12T18:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "59612", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/59612" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7012344" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-1091", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "59612", "refsource": "BID", "url": "http://www.securityfocus.com/bid/59612" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7012344", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7012344" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=800593", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593" }, { "name": "http://download.novell.com/Download?buildid=k6yH0sy992E~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-1091", "datePublished": "2013-05-02T18:00:00", "dateReserved": "2013-01-11T00:00:00", "dateUpdated": "2024-08-06T14:49:20.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-5231 (GCVE-0-2008-5231)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/secunia_research/2008-27/advisory/ | x_refsource_MISC | |
http://secunia.com/advisories/30667 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/30813 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:49:12.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2008-27/advisory/" }, { "name": "30667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30667" }, { "name": "30813", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ExecuteRequest method in the Novell iPrint ActiveX control in ienipp.ocx in Novell iPrint Client 5.06 and earlier allows remote attackers to execute arbitrary code via a long target-frame option value, a different vulnerability than CVE-2008-2431." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2008-27/advisory/" }, { "name": "30667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30667" }, { "name": "30813", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30813" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5231", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the ExecuteRequest method in the Novell iPrint ActiveX control in ienipp.ocx in Novell iPrint Client 5.06 and earlier allows remote attackers to execute arbitrary code via a long target-frame option value, a different vulnerability than CVE-2008-2431." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/secunia_research/2008-27/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2008-27/advisory/" }, { "name": "30667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30667" }, { "name": "30813", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30813" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5231", "datePublished": "2008-11-26T01:00:00Z", "dateReserved": "2008-11-25T00:00:00Z", "dateUpdated": "2024-09-16T16:38:02.708Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1703 (GCVE-0-2011-1703)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025606 | vdb-entry, x_refsource_SECTRACK | |
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008727 | x_refsource_CONFIRM | |
http://download.novell.com/Download?buildid=6_bNby38ERg~ | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67878 | vdb-entry, x_refsource_XF | |
http://zerodayinitiative.com/advisories/ZDI-11-176/ | x_refsource_MISC | |
http://secunia.com/advisories/44811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/48124 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/518271/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:24.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008727" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "novell-iprint-driverversion-bo(67878)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67878" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-176/" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-176: Novell iPrint nipplib.dll driver-version Remote Code Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518271/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted driver-version parameter in a printer-url." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008727" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "novell-iprint-driverversion-bo(67878)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67878" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-176/" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-176: Novell iPrint nipplib.dll driver-version Remote Code Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518271/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1703", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted driver-version parameter in a printer-url." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025606" }, { "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008727", "refsource": "CONFIRM", "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008727" }, { "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "novell-iprint-driverversion-bo(67878)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67878" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-11-176/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-11-176/" }, { "name": "44811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-176: Novell iPrint nipplib.dll driver-version Remote Code Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518271/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1703", "datePublished": "2011-06-09T19:00:00", "dateReserved": "2011-04-15T00:00:00", "dateUpdated": "2024-08-06T22:37:24.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4187 (GCVE-0-2011-4187)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=7010143 | x_refsource_CONFIRM | |
http://www.novell.com/support/viewContent.do?externalId=7008708 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:01:51.258Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010143" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-20T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010143" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=7010143", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=7010143" }, { "name": "http://www.novell.com/support/viewContent.do?externalId=7008708", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4187", "datePublished": "2012-02-20T21:00:00Z", "dateReserved": "2011-10-25T00:00:00Z", "dateUpdated": "2024-09-16T18:08:04.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2432 (GCVE-0-2008-2432)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/30667 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/secunia_research/2008-30/advisory/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/30813 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:58:02.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "30667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30667" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2008-30/advisory/" }, { "name": "30813", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Insecure method vulnerability in the GetFileList method in an unspecified ActiveX control in Novell iPrint Client before 5.06 allows remote attackers to list the image files in an arbitrary directory via a directory name in the argument." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-26T01:00:00Z", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "30667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30667" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2008-30/advisory/" }, { "name": "30813", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30813" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2008-2432", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insecure method vulnerability in the GetFileList method in an unspecified ActiveX control in Novell iPrint Client before 5.06 allows remote attackers to list the image files in an arbitrary directory via a directory name in the argument." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "30667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30667" }, { "name": "http://secunia.com/secunia_research/2008-30/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2008-30/advisory/" }, { "name": "30813", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30813" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2008-2432", "datePublished": "2008-11-26T01:00:00Z", "dateReserved": "2008-05-27T00:00:00Z", "dateUpdated": "2024-09-17T02:01:41.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1699 (GCVE-0-2011-1699)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://zerodayinitiative.com/advisories/ZDI-11-172/ | x_refsource_MISC | |
http://www.securitytracker.com/id?1025606 | vdb-entry, x_refsource_SECTRACK | |
http://download.novell.com/Download?buildid=6_bNby38ERg~ | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/518266/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/44811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/48124 | vdb-entry, x_refsource_BID | |
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008720 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.689Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-172/" }, { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "20110606 ZDI-11-172: Novell iPrint nipplib.dll uri Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518266/100/0/threaded" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48124" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008720" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted uri parameter in a printer-url." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-172/" }, { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "20110606 ZDI-11-172: Novell iPrint nipplib.dll uri Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518266/100/0/threaded" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48124" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008720" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1699", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted uri parameter in a printer-url." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://zerodayinitiative.com/advisories/ZDI-11-172/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-11-172/" }, { "name": "1025606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025606" }, { "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "20110606 ZDI-11-172: Novell iPrint nipplib.dll uri Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518266/100/0/threaded" }, { "name": "44811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48124" }, { "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008720", "refsource": "CONFIRM", "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008720" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1699", "datePublished": "2011-06-09T19:00:00", "dateReserved": "2011-04-15T00:00:00", "dateUpdated": "2024-08-06T22:37:25.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1706 (GCVE-0-2011-1706)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025606 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67881 | vdb-entry, x_refsource_XF | |
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008730 | x_refsource_CONFIRM | |
http://download.novell.com/Download?buildid=6_bNby38ERg~ | x_refsource_CONFIRM | |
http://zerodayinitiative.com/advisories/ZDI-11-179/ | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/518273/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/44811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/48124 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025606" }, { "name": "novell-iprint-iprintclientconfiginfo-bo(67881)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008730" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-179/" }, { "name": "20110606 ZDI-11-179: Novell iPrint nipplib.dll iprint-client-config-info Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518273/100/0/threaded" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48124" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted iprint-client-config-info parameter in a printer-url." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025606" }, { "name": "novell-iprint-iprintclientconfiginfo-bo(67881)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008730" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-179/" }, { "name": "20110606 ZDI-11-179: Novell iPrint nipplib.dll iprint-client-config-info Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518273/100/0/threaded" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48124" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1706", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted iprint-client-config-info parameter in a printer-url." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025606" }, { "name": "novell-iprint-iprintclientconfiginfo-bo(67881)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67881" }, { "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008730", "refsource": "CONFIRM", "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008730" }, { "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-11-179/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-11-179/" }, { "name": "20110606 ZDI-11-179: Novell iPrint nipplib.dll iprint-client-config-info Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518273/100/0/threaded" }, { "name": "44811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48124" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1706", "datePublished": "2011-06-09T19:00:00", "dateReserved": "2011-04-15T00:00:00", "dateUpdated": "2024-08-06T22:37:25.657Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4186 (GCVE-0-2011-4186)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=7008708 | x_refsource_CONFIRM | |
http://www.novell.com/support/viewContent.do?externalId=7010145 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:01:51.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010145" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-20T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010145" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=7008708", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" }, { "name": "http://www.novell.com/support/viewContent.do?externalId=7010145", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=7010145" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4186", "datePublished": "2012-02-20T21:00:00Z", "dateReserved": "2011-10-25T00:00:00Z", "dateUpdated": "2024-09-17T00:46:13.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1701 (GCVE-0-2011-1701)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025606 | vdb-entry, x_refsource_SECTRACK | |
http://download.novell.com/Download?buildid=6_bNby38ERg~ | x_refsource_CONFIRM | |
http://secunia.com/advisories/44811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/48124 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67876 | vdb-entry, x_refsource_XF | |
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008723 | x_refsource_CONFIRM | |
http://zerodayinitiative.com/advisories/ZDI-11-174/ | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/518269/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48124" }, { "name": "novell-iprint-profilename-bo(67876)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008723" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-174/" }, { "name": "20110606 ZDI-11-174: Novell iPrint nipplib.dll profile-name Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518269/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted profile-name parameter in a printer-url." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48124" }, { "name": "novell-iprint-profilename-bo(67876)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008723" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-174/" }, { "name": "20110606 ZDI-11-174: Novell iPrint nipplib.dll profile-name Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518269/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1701", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted profile-name parameter in a printer-url." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025606" }, { "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "44811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48124" }, { "name": "novell-iprint-profilename-bo(67876)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67876" }, { "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008723", "refsource": "CONFIRM", "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008723" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-11-174/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-11-174/" }, { "name": "20110606 ZDI-11-174: Novell iPrint nipplib.dll profile-name Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518269/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1701", "datePublished": "2011-06-09T19:00:00", "dateReserved": "2011-04-15T00:00:00", "dateUpdated": "2024-08-06T22:37:25.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4314 (GCVE-0-2010-4314)
Vulnerability from cvelistv5
- buffer overflow
▼ | URL | Tags |
---|---|---|
https://www.novell.com/support/kb/doc.php?id=7006675 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Novell iPrint webrowser ActiveX plugin |
Version: Novell iPrint webrowser ActiveX plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:13.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.novell.com/support/kb/doc.php?id=7006675" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Novell iPrint webrowser ActiveX plugin", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Novell iPrint webrowser ActiveX plugin" } ] } ], "datePublic": "2017-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the \"name\" parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:39", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.novell.com/support/kb/doc.php?id=7006675" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "ID": "CVE-2010-4314", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Novell iPrint webrowser ActiveX plugin", "version": { "version_data": [ { "version_value": "Novell iPrint webrowser ActiveX plugin" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the \"name\" parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.novell.com/support/kb/doc.php?id=7006675", "refsource": "CONFIRM", "url": "https://www.novell.com/support/kb/doc.php?id=7006675" } ] } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2010-4314", "datePublished": "2017-03-11T06:46:00", "dateReserved": "2010-11-29T00:00:00", "dateUpdated": "2024-08-07T03:43:13.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1702 (GCVE-0-2011-1702)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/518270/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1025606 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67877 | vdb-entry, x_refsource_XF | |
http://download.novell.com/Download?buildid=6_bNby38ERg~ | x_refsource_CONFIRM | |
http://zerodayinitiative.com/advisories/ZDI-11-175/ | x_refsource_MISC | |
http://secunia.com/advisories/44811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/48124 | vdb-entry, x_refsource_BID | |
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008724 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.655Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110606 ZDI-11-175: Novell iPrint nipplib.dll file-date-time Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518270/100/0/threaded" }, { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025606" }, { "name": "novell-iprint-filedatetime-bo(67877)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67877" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-175/" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48124" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008724" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted file-date-time parameter in a printer-url." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20110606 ZDI-11-175: Novell iPrint nipplib.dll file-date-time Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518270/100/0/threaded" }, { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025606" }, { "name": "novell-iprint-filedatetime-bo(67877)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67877" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-175/" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48124" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008724" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1702", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted file-date-time parameter in a printer-url." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110606 ZDI-11-175: Novell iPrint nipplib.dll file-date-time Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518270/100/0/threaded" }, { "name": "1025606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025606" }, { "name": "novell-iprint-filedatetime-bo(67877)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67877" }, { "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-11-175/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-11-175/" }, { "name": "44811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48124" }, { "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008724", "refsource": "CONFIRM", "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008724" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1702", "datePublished": "2011-06-09T19:00:00", "dateReserved": "2011-04-15T00:00:00", "dateUpdated": "2024-08-06T22:37:25.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0935 (GCVE-0-2008-0935)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/0639 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/27939 | vdb-entry, x_refsource_BID | |
http://download.novell.com/Download?buildid=prBBH4JpImA~ | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1019489 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/27994 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-0639", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0639" }, { "name": "27939", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27939" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=prBBH4JpImA~" }, { "name": "1019489", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019489" }, { "name": "27994", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27994" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client before 4.34 allows remote attackers to execute arbitrary code via a long argument to the ExecuteRequest method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2008-0639", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0639" }, { "name": "27939", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27939" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=prBBH4JpImA~" }, { "name": "1019489", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019489" }, { "name": "27994", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27994" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0935", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client before 4.34 allows remote attackers to execute arbitrary code via a long argument to the ExecuteRequest method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-0639", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0639" }, { "name": "27939", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27939" }, { "name": "http://download.novell.com/Download?buildid=prBBH4JpImA~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=prBBH4JpImA~" }, { "name": "1019489", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019489" }, { "name": "27994", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27994" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0935", "datePublished": "2008-02-25T18:00:00", "dateReserved": "2008-02-25T00:00:00", "dateUpdated": "2024-08-07T08:01:40.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1707 (GCVE-0-2011-1707)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/67883 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1025606 | vdb-entry, x_refsource_SECTRACK | |
http://zerodayinitiative.com/advisories/ZDI-11-181/ | x_refsource_MISC | |
http://download.novell.com/Download?buildid=6_bNby38ERg~ | x_refsource_CONFIRM | |
http://secunia.com/advisories/44811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/48124 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/518275/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "novell-iprint-opprinterlistalljobs-bo(67883)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67883" }, { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-181/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-181: Novell iPrint op-printer-list-all-jobs url Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518275/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs parameter in a printer-url." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "novell-iprint-opprinterlistalljobs-bo(67883)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67883" }, { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-181/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-181: Novell iPrint op-printer-list-all-jobs url Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518275/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs parameter in a printer-url." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "novell-iprint-opprinterlistalljobs-bo(67883)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67883" }, { "name": "1025606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025606" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-11-181/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-11-181/" }, { "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "44811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-181: Novell iPrint op-printer-list-all-jobs url Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518275/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1707", "datePublished": "2011-06-09T19:00:00", "dateReserved": "2011-04-15T00:00:00", "dateUpdated": "2024-08-06T22:37:25.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-3708 (GCVE-0-2013-3708)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/kb/doc.php?id=7014184 | x_refsource_CONFIRM | |
https://bugzilla.novell.com/show_bug.cgi?id=848735 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:14:56.698Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7014184" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-11-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-01T17:26:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7014184" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3708", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/kb/doc.php?id=7014184", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7014184" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=848735", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3708", "datePublished": "2013-12-01T02:00:00", "dateReserved": "2013-05-30T00:00:00", "dateUpdated": "2024-08-06T16:14:56.698Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4185 (GCVE-0-2011-4185)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=7010144 | x_refsource_CONFIRM | |
http://www.novell.com/support/viewContent.do?externalId=7008708 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:01:50.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010144" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-20T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010144" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4185", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=7010144", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=7010144" }, { "name": "http://www.novell.com/support/viewContent.do?externalId=7008708", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4185", "datePublished": "2012-02-20T21:00:00Z", "dateReserved": "2011-10-25T00:00:00Z", "dateUpdated": "2024-09-16T23:51:50.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-1569 (GCVE-0-2009-1569)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://download.novell.com/Download?buildid=29T3EFRky18~ | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/508288/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2009/3429 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/37242 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/35004 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/secunia_research/2009-44/ | x_refsource_MISC | |
http://secunia.com/advisories/37169 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:20:34.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=29T3EFRky18~" }, { "name": "20091208 Secunia Research: Novell iPrint Client Date/Time Parsing Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/508288/100/0/threaded" }, { "name": "ADV-2009-3429", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3429" }, { "name": "37242", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37242" }, { "name": "35004", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35004" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2009-44/" }, { "name": "37169", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37169" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=29T3EFRky18~" }, { "name": "20091208 Secunia Research: Novell iPrint Client Date/Time Parsing Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/508288/100/0/threaded" }, { "name": "ADV-2009-3429", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3429" }, { "name": "37242", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37242" }, { "name": "35004", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35004" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2009-44/" }, { "name": "37169", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37169" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2009-1569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://download.novell.com/Download?buildid=29T3EFRky18~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=29T3EFRky18~" }, { "name": "20091208 Secunia Research: Novell iPrint Client Date/Time Parsing Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/508288/100/0/threaded" }, { "name": "ADV-2009-3429", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3429" }, { "name": "37242", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37242" }, { "name": "35004", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35004" }, { "name": "http://secunia.com/secunia_research/2009-44/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2009-44/" }, { "name": "37169", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37169" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2009-1569", "datePublished": "2009-12-08T23:00:00", "dateReserved": "2009-05-06T00:00:00", "dateUpdated": "2024-08-07T05:20:34.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3105 (GCVE-0-2010-3105)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/42576 | vdb-entry, x_refsource_BID | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11817 | vdb-entry, signature, x_refsource_OVAL | |
http://secunia.com/advisories/40805 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:55:46.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "42576", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42576" }, { "name": "oval:org.mitre.oval:def:11817", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11817" }, { "name": "40805", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40805" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The PluginGetDriverFile function in Novell iPrint Client before 5.44 interprets an uninitialized memory location as a pointer value, which allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "42576", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42576" }, { "name": "oval:org.mitre.oval:def:11817", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11817" }, { "name": "40805", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40805" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3105", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The PluginGetDriverFile function in Novell iPrint Client before 5.44 interprets an uninitialized memory location as a pointer value, which allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "42576", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42576" }, { "name": "oval:org.mitre.oval:def:11817", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11817" }, { "name": "40805", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40805" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3105", "datePublished": "2010-08-23T20:00:00", "dateReserved": "2010-08-23T00:00:00", "dateUpdated": "2024-08-07T02:55:46.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3107 (GCVE-0-2010-3107)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://dvlabs.tippingpoint.com/advisory/TPTI-10-05 | x_refsource_MISC | |
http://download.novell.com/Download?buildid=ftwZBxEFjIg~ | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12074 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:55:46.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "name": "oval:org.mitre.oval:def:12074", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12074" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "A certain ActiveX control in ienipp.ocx in the browser plugin in Novell iPrint Client before 5.42 does not properly restrict the set of files to be deleted, which allows remote attackers to cause a denial of service (recursive file deletion) via unspecified vectors related to a \"logic flaw\" in the CleanUploadFiles method in the nipplib.dll module." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "name": "oval:org.mitre.oval:def:12074", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12074" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A certain ActiveX control in ienipp.ocx in the browser plugin in Novell iPrint Client before 5.42 does not properly restrict the set of files to be deleted, which allows remote attackers to cause a denial of service (recursive file deletion) via unspecified vectors related to a \"logic flaw\" in the CleanUploadFiles method in the nipplib.dll module." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-05", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-05" }, { "name": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "name": "oval:org.mitre.oval:def:12074", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12074" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3107", "datePublished": "2010-08-23T20:00:00", "dateReserved": "2010-08-23T00:00:00", "dateUpdated": "2024-08-07T02:55:46.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1705 (GCVE-0-2011-1705)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025606 | vdb-entry, x_refsource_SECTRACK | |
http://download.novell.com/Download?buildid=6_bNby38ERg~ | x_refsource_CONFIRM | |
http://zerodayinitiative.com/advisories/ZDI-11-178/ | x_refsource_MISC | |
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008729 | x_refsource_CONFIRM | |
http://secunia.com/advisories/44811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/48124 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/518272/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67880 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-178/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008729" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-178: Novell iPrint nipplib.dll client-file-name Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518272/100/0/threaded" }, { "name": "novell-iprint-clientfilename-bo(67880)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67880" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-178/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008729" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-178: Novell iPrint nipplib.dll client-file-name Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518272/100/0/threaded" }, { "name": "novell-iprint-clientfilename-bo(67880)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67880" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1705", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025606" }, { "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-11-178/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-11-178/" }, { "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008729", "refsource": "CONFIRM", "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008729" }, { "name": "44811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-178: Novell iPrint nipplib.dll client-file-name Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518272/100/0/threaded" }, { "name": "novell-iprint-clientfilename-bo(67880)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67880" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1705", "datePublished": "2011-06-09T19:00:00", "dateReserved": "2011-04-15T00:00:00", "dateUpdated": "2024-08-06T22:37:25.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3176 (GCVE-0-2009-3176)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/36579 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/57922 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/36231 | vdb-entry, x_refsource_BID | |
http://intevydis.com/vd-list.shtml | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:14:56.429Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36579" }, { "name": "57922", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/57922" }, { "name": "36231", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36231" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://intevydis.com/vd-list.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the ActiveX control in Novell iPrint Client 4.38 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.1, \"Novell iPrint Client 4.38 ActiveX exploit.\" NOTE: as of 20090909, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-25T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "36579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36579" }, { "name": "57922", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/57922" }, { "name": "36231", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36231" }, { "tags": [ "x_refsource_MISC" ], "url": "http://intevydis.com/vd-list.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3176", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the ActiveX control in Novell iPrint Client 4.38 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.1, \"Novell iPrint Client 4.38 ActiveX exploit.\" NOTE: as of 20090909, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36579", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36579" }, { "name": "57922", "refsource": "OSVDB", "url": "http://www.osvdb.org/57922" }, { "name": "36231", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36231" }, { "name": "http://intevydis.com/vd-list.shtml", "refsource": "MISC", "url": "http://intevydis.com/vd-list.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3176", "datePublished": "2009-09-11T20:00:00", "dateReserved": "2009-09-11T00:00:00", "dateUpdated": "2024-08-07T06:14:56.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3108 (GCVE-0-2010-3108)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-10-139/ | x_refsource_MISC | |
http://download.novell.com/Download?buildid=ftwZBxEFjIg~ | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11915 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:55:46.741Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-139/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "name": "oval:org.mitre.oval:def:11915", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11915" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code by using EMBED elements to pass parameters with long names." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-139/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "name": "oval:org.mitre.oval:def:11915", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11915" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code by using EMBED elements to pass parameters with long names." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-139/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-139/" }, { "name": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "name": "oval:org.mitre.oval:def:11915", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11915" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3108", "datePublished": "2010-08-23T20:00:00", "dateReserved": "2010-08-23T00:00:00", "dateUpdated": "2024-08-07T02:55:46.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1527 (GCVE-0-2010-1527)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/61220 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/42576 | vdb-entry, x_refsource_BID | |
http://secunia.com/secunia_research/2010-104/ | x_refsource_MISC | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11973 | vdb-entry, signature, x_refsource_OVAL | |
http://www.novell.com/support/viewContent.do?externalId=7006679 | x_refsource_CONFIRM | |
http://secunia.com/advisories/40805 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.985Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "novell-iprint-callbackurl-bo(61220)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61220" }, { "name": "42576", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42576" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-104/" }, { "name": "oval:org.mitre.oval:def:11973", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11973" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7006679" }, { "name": "40805", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40805" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "novell-iprint-callbackurl-bo(61220)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61220" }, { "name": "42576", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42576" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-104/" }, { "name": "oval:org.mitre.oval:def:11973", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11973" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7006679" }, { "name": "40805", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40805" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-1527", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "novell-iprint-callbackurl-bo(61220)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61220" }, { "name": "42576", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42576" }, { "name": "http://secunia.com/secunia_research/2010-104/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-104/" }, { "name": "oval:org.mitre.oval:def:11973", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11973" }, { "name": "http://www.novell.com/support/viewContent.do?externalId=7006679", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=7006679" }, { "name": "40805", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40805" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-1527", "datePublished": "2010-08-23T20:00:00", "dateReserved": "2010-04-26T00:00:00", "dateUpdated": "2024-08-07T01:28:41.985Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1704 (GCVE-0-2011-1704)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025606 | vdb-entry, x_refsource_SECTRACK | |
http://download.novell.com/Download?buildid=6_bNby38ERg~ | x_refsource_CONFIRM | |
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008728 | x_refsource_CONFIRM | |
http://zerodayinitiative.com/advisories/ZDI-11-177/ | x_refsource_MISC | |
http://secunia.com/advisories/44811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/48124 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/518268/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67879 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.404Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008728" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-177/" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-177: Novell iPrint nipplib.dll core-package Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518268/100/0/threaded" }, { "name": "novell-iprint-corepackage-bo(67879)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67879" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted core-package parameter in a printer-url." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1025606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025606" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008728" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-11-177/" }, { "name": "44811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-177: Novell iPrint nipplib.dll core-package Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518268/100/0/threaded" }, { "name": "novell-iprint-corepackage-bo(67879)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67879" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1704", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted core-package parameter in a printer-url." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025606" }, { "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~", "refsource": "CONFIRM", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008728", "refsource": "CONFIRM", "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008728" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-11-177/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-11-177/" }, { "name": "44811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44811" }, { "name": "48124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48124" }, { "name": "20110606 ZDI-11-177: Novell iPrint nipplib.dll core-package Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518268/100/0/threaded" }, { "name": "novell-iprint-corepackage-bo(67879)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67879" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1704", "datePublished": "2011-06-09T19:00:00", "dateReserved": "2011-04-15T00:00:00", "dateUpdated": "2024-08-06T22:37:25.404Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 | |
novell | iprint | 5.60 | |
novell | iprint | 5.64 | |
novell | iprint | 5.68 | |
novell | iprint | 5.72 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5EF91A6-8930-4DAE-A1D9-BBB92D109282", "versionEndIncluding": "5.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*", "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*", "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*", "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*", "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436." }, { "lang": "es", "value": "El m\u00e9todo GetPrinterURLList2 en el control ActiveX del cliente de Novell iPrint Client anteriores a v5.78 en Windows permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2008-2431 y CVE-2008-2436." } ], "id": "CVE-2011-4185", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-21T13:31:34.923", "references": [ { "source": "cve@mitre.org", "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010144" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:client:*:*:*:*:*", "matchCriteriaId": "5DEEE521-1D76-4ED8-951E-058D9311C6BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the ActiveX control in Novell iPrint Client 4.38 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.1, \"Novell iPrint Client 4.38 ActiveX exploit.\" NOTE: as of 20090909, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes." }, { "lang": "es", "value": "El desbordamiento de b\u00fafer en el control ActiveX en Novell iPrint Client versi\u00f3n 4.38 permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo) y posiblemente ejecutar c\u00f3digo arbitrario por medio de vectores de ataque desconocidos, como es demostrado por un m\u00f3dulo en VulnDisco Pack Professional versi\u00f3n 8.1, \"Novell iPrint Client 4.38 ActiveX exploit \". NOTA: a partir de 09-09-2009, esta divulgaci\u00f3n no tiene informaci\u00f3n procesable. Sin embargo, debido a que el autor del VulnDisco Pack es un investigador confiable, al problema se le asigna un identificador de CVE para fines de rastreo." } ], "id": "CVE-2009-3176", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-09-11T20:30:01.110", "references": [ { "source": "cve@mitre.org", "url": "http://intevydis.com/vd-list.shtml" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36579" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/57922" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://intevydis.com/vd-list.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/57922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36231" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6C2CC44-FD77-4815-BB87-136BAF8CC18F", "versionEndIncluding": "5.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer basado en pila en iPrint de Novell Client antes de v5.44 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante un par\u00e1metro call-back-url demasiado largo en una acci\u00f3n op-client-interface-version." } ], "evaluatorSolution": "Fix is included in \"iPrint Client for Windows XP/Vista/Win7 5.44\"", "id": "CVE-2010-1527", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-23T22:00:02.000", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40805" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-104/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7006679" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/42576" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61220" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-104/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7006679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11973" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506", "versionEndIncluding": "5.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs parameter in a printer-url." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado op-printer-list-all-jobs en un printer-url." } ], "id": "CVE-2011-1707", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-09T19:55:01.807", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44811" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518275/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-181/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518275/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-181/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67883" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "583C6EB4-A372-4B15-8B3A-09A0D778ECA3", "versionEndIncluding": "5.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code by using EMBED elements to pass parameters with long names." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en el plugin para el navegador en Novell iPrint Client antes de v5.42 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante el uso de elementos EMBED para pasar par\u00e1metros con nombres largos." } ], "id": "CVE-2010-3108", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-23T22:00:03.547", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-139/" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-139/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11915" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 | |
novell | iprint | 5.60 | |
novell | iprint | 5.64 | |
novell | iprint | 5.68 | |
novell | iprint | 5.72 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5EF91A6-8930-4DAE-A1D9-BBB92D109282", "versionEndIncluding": "5.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*", "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*", "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*", "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*", "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705." }, { "lang": "es", "value": "Una vulnerabilidad de desbordamiento de pila basado en b\u00fafer en nipplib.dll en el cliente de Novell iPrint antes de v5.78 bajo Windows permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un par\u00e1metro client-file-name (nombre de archivo cliente) en una URL de impresora. Se trata de una vulnerabilidad diferente a CVE-2011-1705." } ], "id": "CVE-2011-4186", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-02-21T13:31:34.970", "references": [ { "source": "cve@mitre.org", "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010145" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:client:*:*:*:*:*", "matchCriteriaId": "5DEEE521-1D76-4ED8-951E-058D9311C6BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:client:*:*:*:*:*", "matchCriteriaId": "1949289F-4AAC-4B6F-8FAE-64BEFC4FB3D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en Novell iPrint Client v4.38, v5.30, y probablemente otras versiones anteriores a v5.32 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores relacionados con (1) Date y (2) Time." } ], "id": "CVE-2009-1569", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-12-08T23:30:00.280", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=29T3EFRky18~" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35004" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37169" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-44/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/508288/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/37242" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=29T3EFRky18~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-44/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/508288/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/37242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3429" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "583C6EB4-A372-4B15-8B3A-09A0D778ECA3", "versionEndIncluding": "5.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code via a long operation parameter." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer basado en pila en el complemento del navegador en Novell iPrint Client antes de v5.42 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante un par\u00e1metro operation excesivamente largo." } ], "id": "CVE-2010-3109", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-23T22:00:03.597", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-140/" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-140/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12046" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "583C6EB4-A372-4B15-8B3A-09A0D778ECA3", "versionEndIncluding": "5.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method." }, { "lang": "es", "value": "El control ActiveX ienipp.ocx en el plugin para el navegador en el cliente de Novell iPrint antes de v5.42 no valida correctamente el par\u00e1metro debug, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de memoria de pila) a trav\u00e9s de un par\u00e1metro value con una longitud modificada a mano. Se trata de una vulnerabilidad relacionada con el m\u00e9todo ExecuteRequest." } ], "id": "CVE-2010-3106", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-23T22:00:03.393", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-06" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12044" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506", "versionEndIncluding": "5.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted iprint-client-config-info parameter in a printer-url." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado iprint-client-config-info en un printer-url." } ], "id": "CVE-2011-1706", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-09T19:55:01.713", "references": [ { "source": "cve@mitre.org", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44811" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008730" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518273/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-179/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008730" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518273/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-179/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67881" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506", "versionEndIncluding": "5.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted profile-name parameter in a printer-url." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en nipplib.dll de Novell iPrint Client ,permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un par\u00e1metro profile-name manipulado en una url de impresora.\r\n" } ], "id": "CVE-2011-1701", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-09T19:55:01.463", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44811" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008723" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518269/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-174/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518269/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-174/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67876" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506", "versionEndIncluding": "5.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en nipplib.dll de Novell iPrint Client antes de v5.64, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una cookie manipulada en op-printer-list-all-jobs\r\n" } ], "id": "CVE-2011-1708", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-09T21:55:00.963", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44811" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint_client | 4.26 | |
novell | iprint_client | 4.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "01725CB1-8E95-40EB-BF15-5547E3E3353E", "versionEndIncluding": "4.32", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint_client:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "56815A72-7CEA-41D2-9823-6E2A56F28A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint_client:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "619AF5D5-6E9D-4B9A-A499-7203B2AAAF22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client before 4.34 allows remote attackers to execute arbitrary code via a long argument to the ExecuteRequest method." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el control Novell iPrint Control ActiveX de ienipp.ocx en Novell iPrint Client antes de 4.34 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un argumento largo al m\u00e9todo ExecuteRequest." } ], "id": "CVE-2008-0935", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-25T18:44:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=prBBH4JpImA~" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27994" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/27939" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1019489" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0639" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=prBBH4JpImA~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/27939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1019489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0639" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3267A41-1AE0-48B8-BD1F-DEC8A212851A", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E8BC92E-F848-4358-AA3C-89587F029303", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Novell NetWare 6.5 allows attackers to cause a denial of service (ABEND) via a crafted Macintosh iPrint client request." }, { "lang": "es", "value": "Novell NetWare 6.5 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ABEND) mediante una petici\u00f3n de cliente Macintosh iPrint manipulada." } ], "id": "CVE-2008-1701", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-08T18:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29587" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28561" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019750" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1074/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41588" }, { "source": "cve@mitre.org", "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1074/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5538B39-4C1E-42AE-9B93-6203C77A9C91", "versionEndIncluding": "5.04", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ExecuteRequest method in the Novell iPrint ActiveX control in ienipp.ocx in Novell iPrint Client 5.06 and earlier allows remote attackers to execute arbitrary code via a long target-frame option value, a different vulnerability than CVE-2008-2431." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el m\u00e9todo ExecuteRequest en el control ActiveX Novell iPrint en ienipp.ocx en Novell iPrint Client 5.06 y versiones anteriores, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un valor de opci\u00f3n largo \u0027target-frame\u0027." } ], "id": "CVE-2008-5231", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-11-26T01:30:00.420", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30667" }, { "source": "cve@mitre.org", "url": "http://secunia.com/secunia_research/2008-27/advisory/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/secunia_research/2008-27/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30813" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5538B39-4C1E-42AE-9B93-6203C77A9C91", "versionEndIncluding": "5.04", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Novell iPrint Client before 5.06 allow remote attackers to execute arbitrary code by calling the Novell iPrint ActiveX control (aka ienipp.ocx) with (1) a long third argument to the GetDriverFile method; a long first argument to the (2) GetPrinterURLList or (3) GetPrinterURLList2 method; (4) a long argument to the GetFileList method; a long argument to the (5) GetServerVersion, (6) GetResourceList, or (7) DeleteResource method, related to nipplib.dll; a long uploadPath argument to the (8) UploadPrinterDriver or (9) UploadResource method, related to URIs; (10) a long seventh argument to the UploadResource method; a long string in the (11) second, (12) third, or (13) fourth argument to the GetDriverSettings method, related to the IppGetDriverSettings function in nipplib.dll; or (14) a long eighth argument to the UploadResourceToRMS method." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en Novell iPrint Client anterior a v5.06; permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n al llamar al control ActiveX Novell iPrint (tambi\u00e9n conocido como ienipp.ocx) con (1) un tercer argumento largo al m\u00e9todo GetDriverFile; un primer argumento largo a los m\u00e9todos (2) GetPrinterURLList o (3) GetPrinterURLList2; (4) un argumento largo al m\u00e9todo GetFileList; un argumento largo a los m\u00e9todos (5) GetServerVersion, (6) GetResourceList o (7) DeleteResource relacionados con nipplib.dll; un argumento largo uploadPath a los m\u00e9todos (8) UploadPrinterDriver o (9) UploadResource relacionados con URIs; (10) un s\u00e9ptimo argumento largo al m\u00e9todo UploadResource; una cadena larga en los argumentos (11) segundo, (12) tercero o (13) cuarto al m\u00e9todo GetDriverSettings relacionado con la funci\u00f3n IppGetDriverSettings de nipplib.dll o (14) un octavo argumento largo al m\u00e9todo UploadResourceToRMS." } ], "id": "CVE-2008-2431", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-11-26T01:30:00.377", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30667" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-27/advisory/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/30813" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-27/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44616" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506", "versionEndIncluding": "5.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted core-package parameter in a printer-url." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado core-package en un printer-url." } ], "id": "CVE-2011-1704", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-09T19:55:01.587", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44811" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008728" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518268/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-177/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518268/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-177/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67879" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | * | |
novell | iprint | * | |
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 | |
novell | iprint | 5.60 | |
novell | iprint | 5.64 | |
novell | iprint | 5.68 | |
novell | iprint | 5.72 | |
novell | iprint | 5.74 | |
novell | iprint | 5.78 | |
novell | iprint | 5.82 | |
novell | iprint | 5.86 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_7:*:*", "matchCriteriaId": "FC81F285-9177-430C-AAA3-31996323365D", "versionEndIncluding": "5.90", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_8:*:*", "matchCriteriaId": "AF2922F3-33F6-4D2B-B5D6-9DBDD49D86FA", "versionEndIncluding": "5.90", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_vista:*:*", "matchCriteriaId": "A723CB81-D4F8-4DBA-B19F-E7522BE42D0D", "versionEndIncluding": "5.90", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_xp:*:*", "matchCriteriaId": "C5DEED0E-0EEB-4EB6-A802-6BB8E9E3FD4D", "versionEndIncluding": "5.90", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*", "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*", "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*", "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*", "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.74:*:*:*:*:*:*:*", "matchCriteriaId": "C2D610B2-32AB-40EF-8AE3-3AC3E407F69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.78:*:*:*:*:*:*:*", "matchCriteriaId": "736F04E7-4A34-4787-9C69-6ABB10AC7759", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.82:*:*:*:*:*:*:*", "matchCriteriaId": "ECE6F47E-BA31-4850-B7A8-11AFBC9B3BE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.86:*:*:*:*:*:*:*", "matchCriteriaId": "44E0B886-1A97-4B86-AD18-F7BECB1BEACD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors." }, { "lang": "es", "value": "La funci\u00f3n id1.GetPrinterURLList en Novell iPrint Client anterior a la versi\u00f3n 5.93 permite a atancantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-3708", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-01T04:31:49.630", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7014184" }, { "source": "cve@mitre.org", "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7014184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
microsoft | windows_7 | - | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "583C6EB4-A372-4B15-8B3A-09A0D778ECA3", "versionEndIncluding": "5.40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the \"name\" parameter." }, { "lang": "es", "value": "Atacantes remotos puede utilizar el plugin ActiveX del navegador web de iPrint en Novell iPrint Client en versiones anteriores a 5.42 para Windows XP/Vista/Win7 para ejecutar c\u00f3digo desbordando el par\u00e1metro \"name\"." } ], "id": "CVE-2010-4314", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-11T06:59:00.150", "references": [ { "source": "security@opentext.com", "url": "https://www.novell.com/support/kb/doc.php?id=7006675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.novell.com/support/kb/doc.php?id=7006675" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.novell.com/support/kb/doc.php?id=7008708 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/support/kb/doc.php?id=7008708 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 | |
novell | iprint | 5.60 | |
novell | iprint | 5.64 | |
novell | iprint | 5.68 | |
novell | iprint | 5.72 | |
novell | iprint | 5.74 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC0C14F8-AA34-48FC-BCF9-4EC84958E0B9", "versionEndIncluding": "5.78", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*", "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*", "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*", "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*", "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.74:*:*:*:*:*:*:*", "matchCriteriaId": "C2D610B2-32AB-40EF-8AE3-3AC3E407F69E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action." }, { "lang": "es", "value": "Una vulnerabilidad no especificada en el cliente de Novell iPrint antes de v5.82 Permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una acci\u00f3n op-client-interface-version.\r\n" } ], "id": "CVE-2012-0411", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-12-24T18:55:01.883", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7008708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7008708" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506", "versionEndIncluding": "5.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted profile-time parameter in a printer-url." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado profile-time en un printer-url." } ], "id": "CVE-2011-1700", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-09T19:55:01.417", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44811" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008722" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518267/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-173/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518267/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-173/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5538B39-4C1E-42AE-9B93-6203C77A9C91", "versionEndIncluding": "5.04", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure method vulnerability in the GetFileList method in an unspecified ActiveX control in Novell iPrint Client before 5.06 allows remote attackers to list the image files in an arbitrary directory via a directory name in the argument." }, { "lang": "es", "value": "Vulnerabilidad de m\u00e9todo inseguro en el m\u00e9todo GetFileList en un control ActiveX no especificado en Novell iPrint Client anterior a v5.06 permite a atacantes remotos listar los archivos de imagen en un directorio de su elecci\u00f3n mediante un nombre de directorio en el argumento." } ], "id": "CVE-2008-2432", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-11-26T01:30:00.390", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30667" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-30/advisory/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/30813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-30/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30813" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6C2CC44-FD77-4815-BB87-136BAF8CC18F", "versionEndIncluding": "5.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PluginGetDriverFile function in Novell iPrint Client before 5.44 interprets an uninitialized memory location as a pointer value, which allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." }, { "lang": "es", "value": "La funci\u00f3n PluginGetDriverFile en Novell iPrint Client antes de v5.44 interpreta una posici\u00f3n de memoria no inicializada como un valor de puntero, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados. NOTA: la procedencia de esta informaci\u00f3n es desconocida, los detalles se han obtenido \u00fanicamente de informaci\u00f3n de terceros." } ], "id": "CVE-2010-3105", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-23T22:00:03.283", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40805" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/42576" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11817" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11817" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506", "versionEndIncluding": "5.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted file-date-time parameter in a printer-url." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado file-date-time en un printer-url." } ], "id": "CVE-2011-1702", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-09T19:55:01.510", "references": [ { "source": "cve@mitre.org", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44811" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008724" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518270/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-175/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518270/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-175/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67877" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506", "versionEndIncluding": "5.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted driver-version parameter in a printer-url." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en nipplib.dll en Novell iPrint Client v5.64 ,permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un par\u00e1metro driver-version manipulado en una url de impresora.\r\n" } ], "id": "CVE-2011-1703", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-09T19:55:01.557", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44811" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008727" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518271/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-176/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518271/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-176/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67878" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 | |
novell | iprint | 5.60 | |
novell | iprint | 5.64 | |
novell | iprint | 5.68 | |
novell | iprint | 5.72 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5EF91A6-8930-4DAE-A1D9-BBB92D109282", "versionEndIncluding": "5.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*", "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*", "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*", "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*", "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en la funci\u00f3n GetDriverSettings en ??nipplib.dll en el cliente de Novell iPrint antes de v5.78 en Windows permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un campo de dominio de largo. Se trata de una vulnerabilidad diferente a CVE-2011-3173." } ], "id": "CVE-2011-4187", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-21T13:31:35.017", "references": [ { "source": "cve@mitre.org", "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/viewContent.do?externalId=7008708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7010143" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506", "versionEndIncluding": "5.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted uri parameter in a printer-url." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado uri en un printer-url." } ], "id": "CVE-2011-1699", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-09T19:55:01.367", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44811" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008720" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518266/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-172/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518266/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-172/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "583C6EB4-A372-4B15-8B3A-09A0D778ECA3", "versionEndIncluding": "5.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A certain ActiveX control in ienipp.ocx in the browser plugin in Novell iPrint Client before 5.42 does not properly restrict the set of files to be deleted, which allows remote attackers to cause a denial of service (recursive file deletion) via unspecified vectors related to a \"logic flaw\" in the CleanUploadFiles method in the nipplib.dll module." }, { "lang": "es", "value": "Un control ActiveX en ienipp.ocx en el plugin para el navegador del cliente de Novell iPrint antes de v5.42 no limita apropiadamente el conjunto de archivos que desea eliminar, lo que permite provocar a atacantes remotos una denegaci\u00f3n de servicio (mediante eliminaci\u00f3n de archivos de forma recursiva) a trav\u00e9s de vectores no especificados relacionados con \"fallo l\u00f3gico\" en el m\u00e9todo CleanUploadFiles en el m\u00f3dulo nipplib.dll." } ], "id": "CVE-2010-3107", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-23T22:00:03.440", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-05" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=ftwZBxEFjIg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12074" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 | |
novell | iprint | 5.60 | |
novell | iprint | 5.64 | |
novell | iprint | 5.68 | |
novell | iprint | 5.72 | |
novell | iprint | 5.74 | |
novell | iprint | 5.78 | |
novell | iprint | 5.82 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2BADD7E-3CBD-4A32-A881-6D3A51AD7B52", "versionEndIncluding": "5.86", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*", "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*", "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*", "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*", "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.74:*:*:*:*:*:*:*", "matchCriteriaId": "C2D610B2-32AB-40EF-8AE3-3AC3E407F69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.78:*:*:*:*:*:*:*", "matchCriteriaId": "736F04E7-4A34-4787-9C69-6ABB10AC7759", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.82:*:*:*:*:*:*:*", "matchCriteriaId": "ECE6F47E-BA31-4850-B7A8-11AFBC9B3BE0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento basado en pila en Novell iPrint Client anterior a v5.90 que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2013-1091", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-05-02T18:55:05.473", "references": [ { "source": "cve@mitre.org", "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7012344" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/59612" }, { "source": "cve@mitre.org", "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7012344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/59612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
novell | iprint | * | |
novell | iprint | 4.26 | |
novell | iprint | 4.27 | |
novell | iprint | 4.28 | |
novell | iprint | 4.30 | |
novell | iprint | 4.32 | |
novell | iprint | 4.34 | |
novell | iprint | 4.36 | |
novell | iprint | 4.38 | |
novell | iprint | 5.04 | |
novell | iprint | 5.12 | |
novell | iprint | 5.20b | |
novell | iprint | 5.30 | |
novell | iprint | 5.32 | |
novell | iprint | 5.40 | |
novell | iprint | 5.42 | |
novell | iprint | 5.44 | |
novell | iprint | 5.50 | |
novell | iprint | 5.52 | |
novell | iprint | 5.56 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506", "versionEndIncluding": "5.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado client-file-name en un printer-url." } ], "id": "CVE-2011-1705", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-09T19:55:01.633", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44811" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008729" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518272/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-178/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518272/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-178/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67880" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-200804-0065
Vulnerability from variot
Novell NetWare 6.5 allows attackers to cause a denial of service (ABEND) via a crafted Macintosh iPrint client request. Novell NetWare is prone to a denial-of-service vulnerability due to an unspecified error. Remote attackers can exploit this issue to deny service to legitimate users. The issue affects Novell NetWare 6.5; other versions may also be vulnerable. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
The vulnerability is caused due to an error when processing requests e.g.
The vulnerability is reported in version 6.5.
SOLUTION: Apply updates. http://download.novell.com/Download?buildid=u0MH4z5NQts~
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: Novell (3842033): https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200804-0065", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "iprint", "scope": "eq", "trust": 1.0, "vendor": "novell", "version": "6.5" }, { "model": "iprint client", "scope": "eq", "trust": 0.8, "vendor": "novell", "version": "6.5" }, { "model": "netware sp1.1", "scope": "eq", "trust": 0.6, "vendor": "novell", "version": "6.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.5.2" }, { "model": "netware sp7", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "netware sp6", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "netware sp5", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "netware sp4", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "netware sp3", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "netware sp2", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "netware sp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" } ], "sources": [ { "db": "BID", "id": "28561" }, { "db": "JVNDB", "id": "JVNDB-2008-004313" }, { "db": "CNNVD", "id": "CNNVD-200804-100" }, { "db": "NVD", "id": "CVE-2008-1701" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:novell:iprint", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-004313" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor", "sources": [ { "db": "BID", "id": "28561" }, { "db": "CNNVD", "id": "CNNVD-200804-100" } ], "trust": 0.9 }, "cve": "CVE-2008-1701", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2008-1701", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-31826", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-1701", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2008-1701", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200804-100", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-31826", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-31826" }, { "db": "JVNDB", "id": "JVNDB-2008-004313" }, { "db": "CNNVD", "id": "CNNVD-200804-100" }, { "db": "NVD", "id": "CVE-2008-1701" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Novell NetWare 6.5 allows attackers to cause a denial of service (ABEND) via a crafted Macintosh iPrint client request. Novell NetWare is prone to a denial-of-service vulnerability due to an unspecified error. \nRemote attackers can exploit this issue to deny service to legitimate users. \nThe issue affects Novell NetWare 6.5; other versions may also be vulnerable. ----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nThe vulnerability is caused due to an error when processing requests\ne.g. \n\nThe vulnerability is reported in version 6.5. \n\nSOLUTION:\nApply updates. \nhttp://download.novell.com/Download?buildid=u0MH4z5NQts~\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nNovell (3842033):\nhttps://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-1701" }, { "db": "JVNDB", "id": "JVNDB-2008-004313" }, { "db": "BID", "id": "28561" }, { "db": "VULHUB", "id": "VHN-31826" }, { "db": "PACKETSTORM", "id": "65094" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-1701", "trust": 2.8 }, { "db": "BID", "id": "28561", "trust": 2.0 }, { "db": "SECUNIA", "id": "29587", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-1074", "trust": 1.7 }, { "db": "SECTRACK", "id": "1019750", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2008-004313", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200804-100", "trust": 0.7 }, { "db": "XF", "id": "41588", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-31826", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "65094", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-31826" }, { "db": "BID", "id": "28561" }, { "db": "JVNDB", "id": "JVNDB-2008-004313" }, { "db": "PACKETSTORM", "id": "65094" }, { "db": "CNNVD", "id": "CNNVD-200804-100" }, { "db": "NVD", "id": "CVE-2008-1701" } ] }, "id": "VAR-200804-0065", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-31826" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:32:04.128000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.novell.com/home/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-004313" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-004313" }, { "db": "NVD", "id": "CVE-2008-1701" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://secure-support.novell.com/kanisaplatform/publishing/667/3842033_f.sal_public.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/28561" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1019750" }, { "trust": 1.7, "url": "http://secunia.com/advisories/29587" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/1074/references" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41588" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1701" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1701" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/41588" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1074/references" }, { "trust": 0.3, "url": "http://www.novell.com" }, { "trust": 0.1, "url": "http://secunia.com/advisories/29587/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://download.novell.com/download?buildid=u0mh4z5nqts~" }, { "trust": 0.1, "url": "http://secunia.com/product/78/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-31826" }, { "db": "BID", "id": "28561" }, { "db": "JVNDB", "id": "JVNDB-2008-004313" }, { "db": "PACKETSTORM", "id": "65094" }, { "db": "CNNVD", "id": "CNNVD-200804-100" }, { "db": "NVD", "id": "CVE-2008-1701" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-31826" }, { "db": "BID", "id": "28561" }, { "db": "JVNDB", "id": "JVNDB-2008-004313" }, { "db": "PACKETSTORM", "id": "65094" }, { "db": "CNNVD", "id": "CNNVD-200804-100" }, { "db": "NVD", "id": "CVE-2008-1701" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-04-08T00:00:00", "db": "VULHUB", "id": "VHN-31826" }, { "date": "2008-04-01T00:00:00", "db": "BID", "id": "28561" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-004313" }, { "date": "2008-04-03T04:45:58", "db": "PACKETSTORM", "id": "65094" }, { "date": "2008-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200804-100" }, { "date": "2008-04-08T18:05:00", "db": "NVD", "id": "CVE-2008-1701" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-08T00:00:00", "db": "VULHUB", "id": "VHN-31826" }, { "date": "2015-05-07T17:30:00", "db": "BID", "id": "28561" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-004313" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200804-100" }, { "date": "2024-11-21T00:45:07.990000", "db": "NVD", "id": "CVE-2008-1701" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200804-100" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Novell NetWare Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-004313" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200804-100" } ], "trust": 0.6 } }