http://dvlabs.tippingpoint.com/advisory/TPTI-10-06
http://dvlabs.tippingpoint.com/advisory/TPTI-10-05
http://www.zerodayinitiative.com/advisories/ZDI-10-139
http://www.zerodayinitiative.com/advisories/ZDI-10-140
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0066.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0067.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0070.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0071.html
Severity: Medium
ID: 5647
Family: Web Clients
Published: 8/25/2010
Updated: 3/6/2019
Nessus ID: 48364
Risk Factor: High
Score: 7.4
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.6
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Risk Factor: Medium
Base Score: 5.6
Temporal Score: 5.2
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/a:novell:iprint
Patch Publication Date: 7/23/2010
Vulnerability Publication Date: 7/23/2010
Metasploit (Novell iPrint Client ActiveX Control ExecuteRequest debug Buffer Overflow)
CVE: CVE-2010-3106, CVE-2010-3107, CVE-2010-3108, CVE-2010-3109
BID: 42100