Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell client 4.91 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-0639
Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote malicious users to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability th...
Novell Client 4.91
6
CVSSv2
CVE-2007-0108
nwgina.dll in Novell Client 4.91 SP3 for Windows 2000/XP/2003 does not delete user profiles during a Terminal Service or Citrix session, which allows remote authenticated users to invoke alternate user profiles.
Novell Client 4.91
7.2
CVSSv2
CVE-2007-5762
NICM.SYS driver 3.0.0.4, as used in Novell NetWare Client 4.91 SP4, allows local users to execute arbitrary code by opening the \\.\nicm device and providing crafted kernel addresses via IOCTLs with the METHOD_NEITHER buffering mode.
Novell Netware Client 4.91
1 EDB exploit
7.5
CVSSv2
CVE-2006-5854
Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 up to and including 4.91 SP2 allow remote malicious users to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
Novell Netware Client 4.91
2 EDB exploits
6.9
CVSSv2
CVE-2008-3158
Unspecified vulnerability in NWFS.SYS in Novell Client for Windows 4.91 SP4 has unknown impact and attack vectors, possibly related to IOCTL requests that overwrite arbitrary memory.
Novell Novell Client For Windows 4.91 Sp4
1 EDB exploit
2.1
CVSSv2
CVE-2008-0663
Novell Challenge Response Client (LCM) 2.7.5 and previous versions, as used with Novell Client for Windows 4.91 SP4, allows users with physical access to a locked system to obtain contents of the clipboard by pasting the contents into the Challenge Question field.
Novell Challenge Response Client
Novell Novell Client For Windows 4.91 Sp4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2