Users of Novell iPrint please be advised of a Novell iPrint Client Browser Plugin ExecuteRequest debug Parameter Remote Code Execution vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
TPTI-10-06: TPTI-10-06: Novell iPrint Client Browser Plugin ExecuteRequest debug Parameter Remote Code Execution
Novell iPrint
Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of the Novell iPrint client. User interaction
is required to exploit this vulnerability in that the target must visit
a malicious page.
Read more at www.criticalwatch.com
See this Amp at http://bit.ly/9K8kDv

No comments:
Post a Comment