Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell iprint 5.32 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-3106
The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client prior to 5.42 does not properly validate the debug parameter, which allows remote malicious users to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value wi...
Novell Iprint 4.36
Novell Iprint 4.38
Novell Iprint 4.26
Novell Iprint 4.27
Novell Iprint 5.04
Novell Iprint 5.30
Novell Iprint 4.28
Novell Iprint 4.30
Novell Iprint 5.32
Novell Iprint 5.20b
Novell Iprint 4.32
Novell Iprint 4.34
Novell Iprint 5.12
Novell Iprint
2 EDB exploits
NA
CVE-2010-1527
Stack-based buffer overflow in Novell iPrint Client prior to 5.44 allows remote malicious users to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action.
Novell Iprint 4.34
Novell Iprint 4.36
Novell Iprint 5.40
Novell Iprint
Novell Iprint 4.26
Novell Iprint 4.38
Novell Iprint 5.04
Novell Iprint 4.27
Novell Iprint 4.28
Novell Iprint 5.30
Novell Iprint 5.32
Novell Iprint 4.30
Novell Iprint 4.32
Novell Iprint 5.20b
Novell Iprint 5.12
2 EDB exploits
NA
CVE-2009-1568
Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions prior to 5.32, allows remote malicious users to execute arbitrary code via a long target-frame parameter.
Novell Iprint Client 5.30
Novell Iprint Client 5.31
1 EDB exploit
NA
CVE-2009-1569
Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions prior to 5.32 allow remote malicious users to execute arbitrary code via vectors related to (1) Date and (2) Time.
Novell Iprint 4.38
Novell Iprint 5.30
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3