Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell file reporter 1.0.2 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2012-4956
Heap-based buffer overflow in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote malicious users to execute arbitrary code via a large number of VOL elements in an SRS record.
Novell File Reporter 1.0.2
1000
VMScore
CVE-2012-4959
Directory traversal vulnerability in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote malicious users to upload and execute files via a 130 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record.
Novell File Reporter 1.0.2
2 EDB exploits
890
VMScore
CVE-2011-0994
Stack-based buffer overflow in NFRAgent.exe in Novell File Reporter (NFR) prior to 1.0.2 allows remote malicious users to execute arbitrary code via unspecified XML data.
Novell File Reporter
785
VMScore
CVE-2012-4957
Absolute path traversal vulnerability in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote malicious users to read arbitrary files via a /FSF/CMD request with a full pathname in a PATH element of an SRS record.
Novell File Reporter 1.0.2
1 EDB exploit
785
VMScore
CVE-2012-4958
Directory traversal vulnerability in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote malicious users to read arbitrary files via a 126 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record.
Novell File Reporter 1.0.2
1 EDB exploit
540
VMScore
CVE-2011-2750
NFRAgent.exe in Novell File Reporter 1.0.4.2 and previous versions allows remote malicious users to delete arbitrary files via a full pathname in an SRS OPERATION 4 CMD 5 request to /FSF/CMD.
Novell File Reporter 1.0.2
Novell File Reporter
Novell File Reporter 1.0.1.1
Novell File Reporter 1.0.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started