Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet fortiwan vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-33869
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the management interface of FortiWAN 4.0.0 up to and including 4.5.9 may allow an authenticated malicious user to execute unauthorized commands via specifically crafted arguments to exi...
Fortinet Fortiwan 4.4.1
Fortinet Fortiwan 4.4.0
Fortinet Fortiwan 4.3.1
Fortinet Fortiwan 4.3.0
Fortinet Fortiwan 4.2.7
Fortinet Fortiwan 4.2.6
Fortinet Fortiwan 4.2.5
Fortinet Fortiwan 4.2.2
Fortinet Fortiwan 4.2.1
Fortinet Fortiwan 4.1.3
Fortinet Fortiwan 4.1.2
Fortinet Fortiwan 4.1.1
Fortinet Fortiwan
NA
CVE-2023-44251
** UNSUPPORTED WHEN ASSIGNED **A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in Fortinet FortiWAN version 5.2.0 up to and including 5.2.1 and version 5.1.1. up to and including 5.1.2 may allow an authenticated ma...
Fortinet Fortiwan 5.2.0
Fortinet Fortiwan 5.2.1
Fortinet Fortiwan 5.1.1
Fortinet Fortiwan 5.1.2
NA
CVE-2023-44252
** UNSUPPORTED WHEN ASSIGNED **An improper authentication vulnerability [CWE-287] in Fortinet FortiWAN version 5.2.0 up to and including 5.2.1 and version 5.1.1 up to and including 5.1.2 may allow an authenticated malicious user to escalate his privileges via HTTP or HTTPs reques...
Fortinet Fortiwan 5.2.0
Fortinet Fortiwan 5.2.1
Fortinet Fortiwan 5.1.1
Fortinet Fortiwan 5.1.2
4.3
CVSSv2
CVE-2021-32585
An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiWAN prior to 4.5.9 may allow an malicious user to perform a stored cross-site scripting attack via specifically crafted HTTP requests.
Fortinet Fortiwan
7.5
CVSSv2
CVE-2021-26112
Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN prior to 4.5.9 may allow an unauthenticated malicious user to potentially corrupt control data in memory and execute arbitrary code via specifica...
Fortinet Fortiwan
5
CVSSv2
CVE-2021-26113
A use of a one-way hash with a predictable salt vulnerability [CWE-760] in FortiWAN prior to 4.5.9 may allow an attacker who has previously come in possession of the password file to potentially guess passwords therein stored.
Fortinet Fortiwan
7.5
CVSSv2
CVE-2021-26114
Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiWAN prior to 4.5.9 may allow an unauthenticated malicious user to execute unauthorized code or commands via specifically crafted HTTP requests.
Fortinet Fortiwan
6.4
CVSSv2
CVE-2021-32593
A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN prior to 4.5.9 may allow an unauthenticated remote malicious user to decrypt and forge protocol communication messages.
Fortinet Fortiwan
9
CVSSv2
CVE-2021-24009
Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in the Web GUI of FortiWAN prior to 4.5.9 may allow an authenticated malicious user to execute arbitrary commands on the underlying system's shell via specifically crafted HTT...
Fortinet Fortiwan
9
CVSSv2
CVE-2016-4965
Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote authenticated users with access to the nslookup functionality to execute arbitrary commands with root privileges via the graph parameter to diagnosis_control.php.
Fortinet Fortiwan
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »