Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell client 4.91 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-6306
Format string vulnerability in Novell Modular Authentication Services (NMAS) in the Novell Client 4.91 SP2 and SP3 allows users with physical access to read stack and memory contents via format string specifiers in the Username field of the logon window.
Novell Client 4.91
NA
CVE-2008-0639
Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote malicious users to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability th...
Novell Client 4.91
NA
CVE-2006-5854
Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 up to and including 4.91 SP2 allow remote malicious users to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
Novell Netware Client 4.91
2 EDB exploits
NA
CVE-2007-5762
NICM.SYS driver 3.0.0.4, as used in Novell NetWare Client 4.91 SP4, allows local users to execute arbitrary code by opening the \\.\nicm device and providing crafted kernel addresses via IOCTLs with the METHOD_NEITHER buffering mode.
Novell Netware Client 4.91
1 EDB exploit
NA
CVE-2008-3158
Unspecified vulnerability in NWFS.SYS in Novell Client for Windows 4.91 SP4 has unknown impact and attack vectors, possibly related to IOCTL requests that overwrite arbitrary memory.
Novell Novell Client For Windows 4.91 Sp4
1 EDB exploit
NA
CVE-2008-0663
Novell Challenge Response Client (LCM) 2.7.5 and previous versions, as used with Novell Client for Windows 4.91 SP4, allows users with physical access to a locked system to obtain contents of the clipboard by pasting the contents into the Challenge Question field.
Novell Challenge Response Client
Novell Novell Client For Windows 4.91 Sp4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2