Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet fortios 5.0.3 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2016-1909
Fortinet FortiAnalyzer prior to 5.0.12 and 5.2.x prior to 5.2.5; FortiSwitch 3.3.x prior to 3.3.3; FortiCache 3.0.x prior to 3.0.8; and FortiOS 4.1.x prior to 4.1.11, 4.2.x prior to 4.2.16, 4.3.x prior to 4.3.17 and 5.0.x prior to 5.0.8 have a hardcoded passphrase for the Fortima...
Fortinet Fortios 5.0.2
Fortinet Fortios 5.0.6
Fortinet Fortios 5.0.7
Fortinet Fortios 5.0
Fortinet Fortios 5.0.1
Fortinet Fortios
Fortinet Fortios 5.0.3
Fortinet Fortios 5.0.4
Fortinet Fortios 5.0.5
Fortinet Fortios 5.0.0
1 EDB exploit
481
VMScore
CVE-2014-0351
The FortiManager protocol service in Fortinet FortiOS prior to 4.3.16 and 5.x prior to 5.0.8 on FortiGate devices does not prevent use of anonymous ciphersuites, which makes it easier for man-in-the-middle malicious users to obtain sensitive information or interfere with communic...
Fortinet Fortios 5.0.7
Fortinet Fortios 5.0.6
Fortinet Fortios 5.0.5
Fortinet Fortios 4.3.12
Fortinet Fortios 4.3.10
Fortinet Fortios 4.3.14
Fortinet Fortios 4.3.13
Fortinet Fortios 5.0.0
Fortinet Fortios
Fortinet Fortios 5.0.4
Fortinet Fortios 5.0.3
668
VMScore
CVE-2014-2216
The FortiManager protocol service in Fortinet FortiOS prior to 4.3.16 and 5.0.0 prior to 5.0.8 on FortiGate devices allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a crafted request.
Fortinet Fortios 5.0.4
Fortinet Fortios 5.0.5
Fortinet Fortios 4.3.10
Fortinet Fortios 5.0.0
Fortinet Fortios 5.0.3
Fortinet Fortios 4.3.13
Fortinet Fortios 4.3.12
Fortinet Fortios
Fortinet Fortios 4.3.14
Fortinet Fortios 5.0.6
Fortinet Fortios 5.0.7
570
VMScore
CVE-2015-2323
FortiOS 5.0.x prior to 5.0.12 and 5.2.x prior to 5.2.4 supports anonymous, export, RC4, and possibly other weak ciphers when using TLS to connect to FortiGuard servers, which allows man-in-the-middle malicious users to spoof TLS content by modifying packets.
Fortinet Fortios 5.0.5
Fortinet Fortios 5.0.6
Fortinet Fortios 5.2.1
Fortinet Fortios 5.2.2
Fortinet Fortios 5.0.2
Fortinet Fortios 5.0.3
Fortinet Fortios 5.0.4
Fortinet Fortios 5.0.11
Fortinet Fortios 5.2.0
Fortinet Fortios 5.0.7
Fortinet Fortios 5.0.8
Fortinet Fortios 5.2.3
Fortinet Fortios 5.0.0
Fortinet Fortios 5.0.1
Fortinet Fortios 5.0.9
Fortinet Fortios 5.0.10
383
VMScore
CVE-2016-3978
The Web User Interface (WebUI) in FortiOS 5.0.x prior to 5.0.13, 5.2.x prior to 5.2.3, and 5.4.x prior to 5.4.0 allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting (XSS) attacks via the "redirect" p...
Fortinet Fortios 5.0.1
Fortinet Fortios 5.0.0
Fortinet Fortios 5.2.2
Fortinet Fortios 5.2.1
Fortinet Fortios 5.0.10
Fortinet Fortios 5.0.9
Fortinet Fortios 5.0.8
Fortinet Fortios 5.0.7
Fortinet Fortios 5.0.11
Fortinet Fortios 5.0.6
Fortinet Fortios 5.0.4
Fortinet Fortios 5.0.2
Fortinet Fortios 5.2.0
Fortinet Fortios 5.0.12
Fortinet Fortios 5.0.5
Fortinet Fortios 5.0.3
Fortinet Fortios 5.4
312
VMScore
CVE-2017-3128
A stored XSS (Cross-Site-Scripting) vulnerability in Fortinet FortiOS allows malicious users to execute unauthorized code or commands via the policy global-label parameter.
Fortinet Fortios 5.2.4
Fortinet Fortios 5.2.5
Fortinet Fortios 5.0.1
Fortinet Fortios 5.0.2
Fortinet Fortios 5.0.9
Fortinet Fortios 5.0.10
Fortinet Fortios 5.2.0
Fortinet Fortios 5.2.8
Fortinet Fortios 5.2.9
Fortinet Fortios 5.0.5
Fortinet Fortios 5.0.6
Fortinet Fortios 5.0.13
Fortinet Fortios 5.0.14
Fortinet Fortios 5.2.6
Fortinet Fortios 5.2.7
Fortinet Fortios 5.0.3
Fortinet Fortios 5.0.4
Fortinet Fortios 5.0.11
Fortinet Fortios 5.0.12
Fortinet Fortios 5.2.1
Fortinet Fortios 5.2.2
Fortinet Fortios 5.2.3
383
VMScore
CVE-2016-7541
Long lived sessions in Fortinet FortiGate devices with FortiOS 5.x prior to 5.4.0 could violate a security policy during IPS signature updates when the FortiGate's IPSengine is configured in flow mode. All FortiGate versions with IPS configured in proxy mode (the default mod...
Fortinet Fortios 5.0.14
Fortinet Fortios 5.2.8
Fortinet Fortios 5.2.1
Fortinet Fortios 5.0.13
Fortinet Fortios 5.0.6
Fortinet Fortios 5.0.4
Fortinet Fortios 5.2.10
Fortinet Fortios 5.0.12
Fortinet Fortios 5.0.11
Fortinet Fortios 5.0.10
Fortinet Fortios 5.0.9
Fortinet Fortios 5.0.8
Fortinet Fortios 5.2.6
Fortinet Fortios 5.2.5
Fortinet Fortios 5.2.4
Fortinet Fortios 5.2.3
Fortinet Fortios 5.0.3
Fortinet Fortios 5.0.2
Fortinet Fortios 5.0.1
Fortinet Fortios 5.0.0
Fortinet Fortios 5.2.9
Fortinet Fortios 5.2.7
445
VMScore
CVE-2017-3130
An information disclosure vulnerability in Fortinet FortiOS 5.6.0, 5.4.4 and below versions allows malicious user to get FortiOS version info by inspecting FortiOS IKE VendorID packets.
Fortinet Fortios 5.4.2
Fortinet Fortios 5.4.3
Fortinet Fortios 5.4.4
Fortinet Fortios 5.0.0
Fortinet Fortios 5.0.13
Fortinet Fortios 5.0.14
Fortinet Fortios 5.2.0
Fortinet Fortios 5.2.1
Fortinet Fortios 5.6.0
Fortinet Fortios 5.4.1
Fortinet Fortios 5.0.1
Fortinet Fortios 5.0.3
Fortinet Fortios 5.0.10
Fortinet Fortios 5.0.12
Fortinet Fortios 5.2.2
Fortinet Fortios 5.2.4
Fortinet Fortios 5.2.6
Fortinet Fortios 5.0.5
Fortinet Fortios 5.0.6
Fortinet Fortios 5.0.7
Fortinet Fortios 5.0.8
Fortinet Fortios 5.2.7
578
VMScore
CVE-2013-4604
Fortinet FortiOS prior to 5.0.3 on FortiGate devices does not properly restrict Guest capabilities, which allows remote authenticated users to read, modify, or delete the records of arbitrary users by leveraging the Guest role.
Fortinet Fortios 5.0.1
Fortinet Fortios
383
VMScore
CVE-2013-7181
Cross-site scripting (XSS) vulnerability in user/ldap_user/add in Fortinet FortiOS 5.0.3 allows remote malicious users to inject arbitrary web script or HTML via the filter parameter.
Fortinet Fortiweb 5.0.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started