cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2013-3705,https://securityvulnerability.io/vulnerability/CVE-2013-3705,,The VBA32 AntiRootKit component for Novell Client 2 SP3 before IR5 on Windows allows local users to cause a denial of service (bugcheck and BSOD) via an IOCTL call for an invalid IOCTL.,Novell,Client,,,0.0005699999746866524,false,false,false,false,,false,false,2013-12-22T15:00:00.000Z,0 CVE-2013-3697,https://securityvulnerability.io/vulnerability/CVE-2013-3697,,"Integer overflow in the NWFS.SYS kernel driver 4.91.5.8 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003 and the NCPL.SYS kernel driver in Novell Client 2 SP2 on Windows Vista and Windows Server 2008 and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 might allow local users to gain privileges via a crafted 0x1439EB IOCTL call.",Novell,Client,,,0.0005000000237487257,false,false,false,false,,false,false,2013-07-31T13:20:00.000Z,0 CVE-2013-3956,https://securityvulnerability.io/vulnerability/CVE-2013-3956,,"The NICM.SYS kernel driver 3.1.11.0 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003; Novell Client 2 SP2 on Windows Vista and Windows Server 2008; and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted 0x143B6B IOCTL call.",Novell,Client,,,0.009639999829232693,false,false,false,false,,false,false,2013-07-31T10:00:00.000Z,0 CVE-2010-4321,https://securityvulnerability.io/vulnerability/CVE-2010-4321,,"Stack-based buffer overflow in an ActiveX control in ienipp.ocx in Novell iPrint Client 5.52 allows remote attackers to execute arbitrary code via a long argument to (1) the GetDriverSettings2 method, as reachable by (2) the GetDriverSettings method.",Novell,Iprint Client,,,0.35416001081466675,false,false,false,false,,false,false,2010-12-30T18:00:00.000Z,0 CVE-2009-1568,https://securityvulnerability.io/vulnerability/CVE-2009-1568,,"Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter.",Novell,Iprint Client,,,0.9267200231552124,false,false,false,false,,false,false,2009-12-08T23:00:00.000Z,0 CVE-2008-2436,https://securityvulnerability.io/vulnerability/CVE-2008-2436,,"Multiple heap-based buffer overflows in the IppCreateServerRef function in nipplib.dll in Novell iPrint Client 4.x before 4.38 and 5.x before 5.08 allow remote attackers to execute arbitrary code via a long argument to the (1) GetPrinterURLList, (2) GetPrinterURLList2, or (3) GetFileList2 function in the Novell iPrint ActiveX control in ienipp.ocx.",Novell,Iprint Client,,,0.19446000456809998,false,false,false,false,,false,false,2008-09-05T16:00:00.000Z,0 CVE-2008-3158,https://securityvulnerability.io/vulnerability/CVE-2008-3158,,"Unspecified vulnerability in NWFS.SYS in Novell Client for Windows 4.91 SP4 has unknown impact and attack vectors, possibly related to IOCTL requests that overwrite arbitrary memory.",Novell,Novell Client For Windows,,,0.0012199999764561653,false,false,false,false,,false,false,2008-07-11T22:00:00.000Z,0 CVE-2008-2908,https://securityvulnerability.io/vulnerability/CVE-2008-2908,,"Multiple stack-based buffer overflows in a certain ActiveX control in ienipp.ocx in Novell iPrint Client for Windows before 4.36 allow remote attackers to execute arbitrary code via a long value of the (1) operation, (2) printer-url, or (3) target-frame parameter. NOTE: some of these details are obtained from third party information.",Novell,Iprint Client,,,0.8607000112533569,false,false,false,false,,false,false,2008-06-30T18:00:00.000Z,0 CVE-2008-2145,https://securityvulnerability.io/vulnerability/CVE-2008-2145,,"Stack-based buffer overflow in Novell Client 4.91 SP4 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long username in the ""forgotten password"" dialog.",Novell,Client,,,0.0005600000149570405,false,false,false,false,,false,false,2008-05-12T19:00:00.000Z,0 CVE-2008-0935,https://securityvulnerability.io/vulnerability/CVE-2008-0935,,Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client before 4.34 allows remote attackers to execute arbitrary code via a long argument to the ExecuteRequest method.,Novell,"Iprint Client,Iprint",,,0.9121800065040588,false,false,false,false,,false,false,2008-02-25T18:00:00.000Z,0 CVE-2007-6701,https://securityvulnerability.io/vulnerability/CVE-2007-6701,,"Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP4 for Windows allow remote attackers to execute arbitrary code via long arguments to multiple unspecified RPC functions, aka Novell bug 287919, a different vulnerability than CVE-2007-2954.",Novell,Client,,,0.4321199953556061,false,false,false,false,,false,false,2008-02-13T20:00:00.000Z,0 CVE-2008-0639,https://securityvulnerability.io/vulnerability/CVE-2008-0639,,"Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote attackers to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability than CVE-2006-5854. NOTE: this issue exists because of an incomplete fix for CVE-2007-6701.",Novell,Client,,,0.7862899899482727,false,false,false,false,,false,false,2008-02-13T20:00:00.000Z,0 CVE-2008-0663,https://securityvulnerability.io/vulnerability/CVE-2008-0663,,"Novell Challenge Response Client (LCM) 2.7.5 and earlier, as used with Novell Client for Windows 4.91 SP4, allows users with physical access to a locked system to obtain contents of the clipboard by pasting the contents into the Challenge Question field.",Novell,"Challenge Response Client,Novell Client For Windows",,,0.007259999867528677,false,false,false,false,,false,false,2008-02-08T01:00:00.000Z,0 CVE-2007-5762,https://securityvulnerability.io/vulnerability/CVE-2007-5762,,"NICM.SYS driver 3.0.0.4, as used in Novell NetWare Client 4.91 SP4, allows local users to execute arbitrary code by opening the \\.\nicm device and providing crafted kernel addresses via IOCTLs with the METHOD_NEITHER buffering mode.",Novell,Netware Client,,,0.0004199999966658652,false,false,false,false,,false,false,2008-01-09T22:00:00.000Z,0 CVE-2007-5667,https://securityvulnerability.io/vulnerability/CVE-2007-5667,,"NWFILTER.SYS in Novell Client 4.91 SP 1 through SP 4 for Windows 2000, XP, and Server 2003 makes the \.\nwfilter device available for arbitrary user-mode input via METHOD_NEITHER IOCTLs, which allows local users to gain privileges by passing a kernel address as an argument and overwriting kernel memory locations.",Novell,Client,,,0.0005099999834783375,false,false,false,false,,false,false,2007-11-14T01:00:00.000Z,0 CVE-2007-2954,https://securityvulnerability.io/vulnerability/CVE-2007-2954,,"Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2 through SP4 for Windows allow remote attackers to execute arbitrary code via certain long arguments to the (1) RpcAddPrinterDriver, (2) RpcGetPrinterDriverDirectory, and other unspecified RPC requests, aka Novell bug 300870, a different vulnerability than CVE-2006-5854.",Novell,Client,,,0.6787800192832947,false,false,false,false,,false,false,2007-08-31T22:00:00.000Z,0 CVE-2007-4526,https://securityvulnerability.io/vulnerability/CVE-2007-4526,,"The Client Login Extension (CLE) in Novell Identity Manager before 3.5.1 20070730 stores the username and password in a local file, which allows local users to obtain sensitive information by reading this file.",Novell,"Client Login Extension \(cle\),Identity Manager",,,0.0004799999878741801,false,false,false,false,,false,false,2007-08-25T00:00:00.000Z,0 CVE-2007-3207,https://securityvulnerability.io/vulnerability/CVE-2007-3207,,"Buffer overflow in the NFS mount daemon (XNFS.NLM) in Novell NetWare 6.5 SP6, and probably earlier, allows remote attackers to cause a denial of service (abend) via a long path in a mount request.",Novell,Client,,,0.04129000008106232,false,false,false,false,,false,false,2007-06-18T10:00:00.000Z,0 CVE-2007-0108,https://securityvulnerability.io/vulnerability/CVE-2007-0108,,"nwgina.dll in Novell Client 4.91 SP3 for Windows 2000/XP/2003 does not delete user profiles during a Terminal Service or Citrix session, which allows remote authenticated users to invoke alternate user profiles.",Novell,Client,,,0.006219999864697456,false,false,false,false,,false,false,2007-01-09T00:00:00.000Z,0 CVE-2006-6443,https://securityvulnerability.io/vulnerability/CVE-2006-6443,,Buffer overflow in the Novell Distributed Print Services (NDPS) Print Provider for Windows component (NDPPNT.DLL) in Novell Client 4.91 has unknown impact and remote attack vectors.,Novell,Client,,,0.007410000078380108,false,false,false,false,,false,false,2006-12-10T20:00:00.000Z,0 CVE-2006-6307,https://securityvulnerability.io/vulnerability/CVE-2006-6307,,srvloc.sys in Novell Client for Windows before 4.91 SP3 allows remote attackers to cause an unspecified denial of service via a crafted packet to port 427 that triggers an access of pageable or invalid addresses using a higher interrupt request level (IRQL) than necessary.,Novell,Client,,,0.03407999873161316,false,false,false,false,,false,false,2006-12-05T11:00:00.000Z,0 CVE-2006-6306,https://securityvulnerability.io/vulnerability/CVE-2006-6306,,Format string vulnerability in Novell Modular Authentication Services (NMAS) in the Novell Client 4.91 SP2 and SP3 allows users with physical access to read stack and memory contents via format string specifiers in the Username field of the logon window.,Novell,Client,,,0.11045999825000763,false,false,false,false,,false,false,2006-12-05T11:00:00.000Z,0 CVE-2006-5854,https://securityvulnerability.io/vulnerability/CVE-2006-5854,,Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 through 4.91 SP2 allow remote attackers to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.,Novell,Netware Client,,,0.9355800151824951,false,false,false,false,,false,false,2006-12-03T17:00:00.000Z,0 CVE-2006-2612,https://securityvulnerability.io/vulnerability/CVE-2006-2612,,"Novell Client for Windows 4.8 and 4.9 does not restrict access to the clipboard contents while a machine is locked, which allows users with physical access to read the current clipboard contents by pasting them into the ""User Name"" field on the login prompt.",Novell,Client,,,0.0034099998883903027,false,false,false,false,,false,false,2006-05-26T01:00:00.000Z,0 CVE-2006-2304,https://securityvulnerability.io/vulnerability/CVE-2006-2304,,"Multiple integer overflows in the DPRPC library (DPRPCW32.DLL) in Novell Client 4.83 SP3, 4.90 SP2 and 4.91 SP2 allow remote attackers to execute arbitrary code via an XDR encoded array with a field that specifies a large number of elements, which triggers the overflows in the ndps_xdr_array function. NOTE: this was originally reported to be a buffer overflow by Novell, but the original cause is an integer overflow.",Novell,Client,,,0.17679999768733978,false,false,false,false,,false,false,2006-05-11T10:00:00.000Z,0