Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell client 4.91 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-0639
Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote malicious users to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability th...
Novell Client 4.91
10
CVSSv2
CVE-2007-6701
Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP4 for Windows allow remote malicious users to execute arbitrary code via long arguments to multiple unspecified RPC functions, aka Novell bug 287919, a different vulnerability than ...
Novell Client 4.91
10
CVSSv2
CVE-2007-2954
Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2 through SP4 for Windows allow remote malicious users to execute arbitrary code via certain long arguments to the (1) RpcAddPrinterDriver, (2) RpcGetPrinterDriverDirectory, and oth...
Novell Client 4.91
10
CVSSv2
CVE-2006-6443
Buffer overflow in the Novell Distributed Print Services (NDPS) Print Provider for Windows component (NDPPNT.DLL) in Novell Client 4.91 has unknown impact and remote attack vectors.
Novell Client 4.91
10
CVSSv2
CVE-2006-2304
Multiple integer overflows in the DPRPC library (DPRPCW32.DLL) in Novell Client 4.83 SP3, 4.90 SP2 and 4.91 SP2 allow remote malicious users to execute arbitrary code via an XDR encoded array with a field that specifies a large number of elements, which triggers the overflows in ...
Novell Client 4.83
Novell Client 4.90
Novell Client 4.91
7.5
CVSSv2
CVE-2006-5854
Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 up to and including 4.91 SP2 allow remote malicious users to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
Novell Netware Client 4.91
2 EDB exploits
7.2
CVSSv2
CVE-2013-3697
Integer overflow in the NWFS.SYS kernel driver 4.91.5.8 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003 and the NCPL.SYS kernel driver in Novell Client 2 SP2 on Windows Vista and Windows Server 2008 and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Win...
Novell Client 4.91
Novell Client 2.0
7.2
CVSSv2
CVE-2013-3956
The NICM.SYS kernel driver 3.1.11.0 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003; Novell Client 2 SP2 on Windows Vista and Windows Server 2008; and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 allows local users t...
Novell Client 4.91
Novell Client 2.0
2 EDB exploits
7.2
CVSSv2
CVE-2008-2145
Stack-based buffer overflow in Novell Client 4.91 SP4 and previous versions allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long username in the "forgotten password" dialog.
Novell Client 4.91
7.2
CVSSv2
CVE-2007-5762
NICM.SYS driver 3.0.0.4, as used in Novell NetWare Client 4.91 SP4, allows local users to execute arbitrary code by opening the \\.\nicm device and providing crafted kernel addresses via IOCTLs with the METHOD_NEITHER buffering mode.
Novell Netware Client 4.91
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »