Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet fortinac 9.1.0 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2021-41021
A privilege escalation vulnerability in FortiNAC versions 8.8.8 and below and 9.1.2 and below may allow an admin user to escalate the privileges to root via the sudo command.
Fortinet Fortinac 9.1.2
Fortinet Fortinac 9.1.1
Fortinet Fortinac 9.1.0
Fortinet Fortinac 8.8.8
Fortinet Fortinac 8.8.7
Fortinet Fortinac 8.8.6
Fortinet Fortinac 8.8.5
Fortinet Fortinac 8.8.4
Fortinet Fortinac 8.8.3
Fortinet Fortinac 8.8.0
Fortinet Fortinac 8.8.1
Fortinet Fortinac 8.8.2
NA
CVE-2022-39953
A improper privilege management in Fortinet FortiNAC version 9.4.0 up to and including 9.4.1, FortiNAC version 9.2.0 up to and including 9.2.6, FortiNAC version 9.1.0 up to and including 9.1.8, FortiNAC all versions 8.8, FortiNAC all versions 8.7, FortiNAC all versions 8.6, Forti...
Fortinet Fortinac
Fortinet Fortinac 8.3.7
Fortinet Fortinac 9.4.0
Fortinet Fortinac 9.4.1
NA
CVE-2022-40678
An insufficiently protected credentials in Fortinet FortiNAC versions 9.4.0, 9.2.0 up to and including 9.2.5, 9.1.0 up to and including 9.1.7, 8.8.0 up to and including 8.8.11, 8.7.0 up to and including 8.7.6, 8.6.0 up to and including 8.6.5, 8.5.0 up to and including 8.5.4, 8.3....
Fortinet Fortinac
Fortinet Fortinac 8.3.7
Fortinet Fortinac 9.4.0
NA
CVE-2022-40676
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiNAC versions 9.4.0, 9.2.0 up to and including 9.2.5, 9.1.0 up to and including 9.1.8, 8.8.0 up to and including 8.8.11, 8.7.0 up to and including 8.7.6, 8.6.0 up to a...
Fortinet Fortinac
Fortinet Fortinac 8.3.7
Fortinet Fortinac 9.4.0
NA
CVE-2022-40677
A improper neutralization of argument delimiters in a command ('argument injection') in Fortinet FortiNAC versions 9.4.0, 9.2.0 up to and including 9.2.5, 9.1.0 up to and including 9.1.7, 8.8.0 up to and including 8.8.11, 8.7.0 up to and including 8.7.6, 8.6.0 up to and...
Fortinet Fortinac
Fortinet Fortinac 8.3.7
Fortinet Fortinac 9.4.0
NA
CVE-2022-40675
Some cryptographic issues in Fortinet FortiNAC versions 9.4.0 up to and including 9.4.1, 9.2.0 up to and including 9.2.7, 9.1.0 up to and including 9.1.8, 8.8.0 up to and including 8.8.11, 8.7.0 up to and including 8.7.6, 8.6.0 up to and including 8.6.5, 8.5.0 up to and including...
Fortinet Fortinac-f
Fortinet Fortinac
NA
CVE-2023-26206
An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiNAC 9.4.0 - 9.4.2, 9.2.0 - 9.2.8, 9.1.0 - 9.1.10 and 7.2.0 allows an malicious user to execute unauthorized code or commands via the name fields observed in the poli...
Fortinet Fortinac
Fortinet Fortinac 7.2.0
NA
CVE-2022-39954
An improper restriction of xml external entity reference in Fortinet FortiNAC version 9.4.0 up to and including 9.4.1, FortiNAC version 9.2.0 up to and including 9.2.7, FortiNAC version 9.1.0 up to and including 9.1.8, FortiNAC version 8.8.0 up to and including 8.8.11, FortiNAC v...
Fortinet Fortinac-f
Fortinet Fortinac
NA
CVE-2022-45858
A use of a weak cryptographic algorithm vulnerability [CWE-327] in FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.0 all versions, 8.8.0 all versions, 8.7.0 all versions may increase the chances of an malicious user to have access to sensitive information or to perform man-in-the-...
Fortinet Fortinac
NA
CVE-2022-39952
A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 up to and including 9.2.5, 9.1.0 up to and including 9.1.7, 8.8.0 up to and including 8.8.11, 8.7.0 up to and including 8.7.6, 8.6.0 up to and including 8.6.5, 8.5.0 up to and including 8.5.4, 8.3....
Fortinet Fortinac
4 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
XXE
CVE-2024-34490
SQL injection
CVE-2024-34488
CVE-2024-4507
CVE-2023-7028
CVE-2024-23187
TCP
CVE-2024-4439
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started