Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file reporter vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2015-2874
Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware prior to 3.4.1.105 have a default password of root for the root account, which allows remote malicious users to obtain administrative access via a...
Seagate Wireless Plus Mobile Storage
Seagate Wireless Mobile Storage
Lacie Lac9000464u Firmware
Lacie Lac9000436u Firmware
Seagate Goflex Sattelite
10
CVSSv2
CVE-2012-4956
Heap-based buffer overflow in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote malicious users to execute arbitrary code via a large number of VOL elements in an SRS record.
Novell File Reporter 1.0.2
10
CVSSv2
CVE-2012-4959
Directory traversal vulnerability in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote malicious users to upload and execute files via a 130 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record.
Novell File Reporter 1.0.2
2 EDB exploits
10
CVSSv2
CVE-2012-3811
Unrestricted file upload vulnerability in ImageUpload.ashx in the Wallboard application in Avaya IP Office Customer Call Reporter 7.0 prior to 7.0.5.8 Q1 2012 Maintenance Release and 8.0 prior to 8.0.9.13 Q1 2012 Maintenance Release allows remote malicious users to execute arbitr...
Avaya Ip Office Customer Call Reporter 8.0
Avaya Ip Office Customer Call Reporter 7.0
1 EDB exploit
10
CVSSv2
CVE-2011-2220
Stack-based buffer overflow in NFREngine.exe in Novell File Reporter Engine prior to 1.0.2.53, as used in Novell File Reporter and other products, allows remote malicious users to execute arbitrary code via a crafted RECORD element.
Novell File Reporter Engine
Novell File Reporter
10
CVSSv2
CVE-2011-0994
Stack-based buffer overflow in NFRAgent.exe in Novell File Reporter (NFR) prior to 1.0.2 allows remote malicious users to execute arbitrary code via unspecified XML data.
Novell File Reporter
10
CVSSv2
CVE-2009-3027
VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA up to and including 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA up to and including 6.6; Veritas Storage Foundation (SF) 3.5; V...
Symantec Veritas Backup Exec 11d
Symantec Veritas Backup Exec 12.0
Symantec Veritas Storage Foundation For Sybase 5.0
Symantec Veritas Storage Foundation For Oracle Real Application Cluster 5.0
Symantec Veritas Storage Foundation For Oracle Real Application Cluster 4.1
Symantec Veritas Storage Foundation For Windows High Availability 4.3mp2
Symantec Veritas Netbackup Operations Manager 6.5.5
Symantec Veritas Netbackup Reporter 6.0 Ga
Symantec Veritas Storage Foundation For Windows High Availability 5.1
Symantec Veritas Storage Foundation For Windows High Availability 5.0rp2
Symantec Veritas Storage Foundation For Db2 4.1
Symantec Veritas Storage Foundation Manager 1.1
Symantec Veritas Storage Foundation Manager 1.1.1ux
Symantec Veritas Cluster Server 4.1
Symantec Veritas Cluster Server One 2.0.2
Symantec Veritas Application Director 1.1
Symantec Veritas Storage Foundation Cluster File System 5.0
Symantec Veritas Storage Foundation Cluster File System 4.1
Symantec Veritas Storage Foundation Cluster File System 4.0
Symantec Veritas Command Central Enterprise Reporter 5.0mp1
Symantec Veritas Command Central Enterprise Reporter 5.0mp1rp1
Symantec Veritas Netbackup Reporter 6.6
9.3
CVSSv2
CVE-2016-9949
An issue exists in Apport prior to 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote malicious users to execute arbitrary Python code.
Apport Project Apport
Canonical Ubuntu Linux
1 EDB exploit
1 Github repository
1 Article
9.3
CVSSv2
CVE-2016-9950
An issue exists in Apport prior to 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory...
Apport Project Apport
Canonical Ubuntu Linux
1 EDB exploit
1 Github repository
1 Article
9
CVSSv2
CVE-2016-4965
Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote authenticated users with access to the nslookup functionality to execute arbitrary commands with root privileges via the graph parameter to diagnosis_control.php.
Fortinet Fortiwan
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »