Novell

Iprint

30 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 10.66%
  • Published 09.06.2011 19:55:01
  • Last modified 11.04.2025 00:51:21

Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted iprint-client-config-info parameter in a printer-url.

  • EPSS 11.31%
  • Published 09.06.2011 19:55:01
  • Last modified 11.04.2025 00:51:21

Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url.

  • EPSS 11.31%
  • Published 09.06.2011 19:55:01
  • Last modified 11.04.2025 00:51:21

Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted core-package parameter in a printer-url.

  • EPSS 11.31%
  • Published 09.06.2011 19:55:01
  • Last modified 11.04.2025 00:51:21

Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted driver-version parameter in a printer-url.

  • EPSS 8.14%
  • Published 09.06.2011 19:55:01
  • Last modified 11.04.2025 00:51:21

Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted file-date-time parameter in a printer-url.

  • EPSS 24.49%
  • Published 09.06.2011 19:55:01
  • Last modified 11.04.2025 00:51:21

Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted profile-time parameter in a printer-url.

  • EPSS 24.49%
  • Published 09.06.2011 19:55:01
  • Last modified 11.04.2025 00:51:21

Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted uri parameter in a printer-url.

  • EPSS 7.53%
  • Published 23.08.2010 22:00:03
  • Last modified 11.04.2025 00:51:21

Stack-based buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code via a long operation parameter.

  • EPSS 7.53%
  • Published 23.08.2010 22:00:03
  • Last modified 11.04.2025 00:51:21

Buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code by using EMBED elements to pass parameters with long names.

  • EPSS 3.39%
  • Published 23.08.2010 22:00:03
  • Last modified 11.04.2025 00:51:21

A certain ActiveX control in ienipp.ocx in the browser plugin in Novell iPrint Client before 5.42 does not properly restrict the set of files to be deleted, which allows remote attackers to cause a denial of service (recursive file deletion) via unsp...