I'm looking at the latest iprint tid and I see

1. ZDI-CAN-980: "iPrint Client call-back-url Remote Code Execution
Vulnerability." This vulnerability was discovered by TippingPoint DVLabs.
2. ZDI-CAN-981: "iPrint nipplib.dll IPP WideCharToMultiByte Remote Code
Execution Vulnerability." This vulnerability was discovered by
TippingPoint DVLabs.
3. ZDI-CAN-983: "Novell iPrint nipplib.dll IPP strcpy Remote Code
Execution Vulnerability." This vulnerability was discovered by
TippingPoint DVLabs.
4. ZDI-CAN-978: "iPrint nipplib.dll Location Header Remote Code
Execution Vulnerability." This vulnerability was discovered by
TippingPoint DVLabs.
5. ZDI-CAN-985: "Novell iPrint Client Netscape/ActiveX
printer-state-reasons Remote Code Execution Vulnerability" This
vulnerability was discovered by TippingPoint DVLabs.
6. ZDI-CAN-979: "Novell iPrint nipplib HTTP_CONNECTION Remote Code
Execution Vulnerability."
7. ZDI-CAN-959: "iPrint Activex GetDriverSettings Remote Code Execution
Vulnerability." This vulnerability was discovered by TippingPoint DVLabs.


So I guess we should be happy that people still take the time to try and
find exploits in Novell products thus giving it some recognition of
existence.