Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet fortiwan vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2021-24009
Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in the Web GUI of FortiWAN prior to 4.5.9 may allow an authenticated malicious user to execute arbitrary commands on the underlying system's shell via specifically crafted HTT...
Fortinet Fortiwan
9
CVSSv2
CVE-2016-4965
Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote authenticated users with access to the nslookup functionality to execute arbitrary commands with root privileges via the graph parameter to diagnosis_control.php.
Fortinet Fortiwan
7.5
CVSSv2
CVE-2021-26112
Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN prior to 4.5.9 may allow an unauthenticated malicious user to potentially corrupt control data in memory and execute arbitrary code via specifica...
Fortinet Fortiwan
7.5
CVSSv2
CVE-2021-26114
Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiWAN prior to 4.5.9 may allow an unauthenticated malicious user to execute unauthorized code or commands via specifically crafted HTTP requests.
Fortinet Fortiwan
6.4
CVSSv2
CVE-2021-32593
A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN prior to 4.5.9 may allow an unauthenticated remote malicious user to decrypt and forge protocol communication messages.
Fortinet Fortiwan
5
CVSSv2
CVE-2021-26113
A use of a one-way hash with a predictable salt vulnerability [CWE-760] in FortiWAN prior to 4.5.9 may allow an attacker who has previously come in possession of the password file to potentially guess passwords therein stored.
Fortinet Fortiwan
4.3
CVSSv2
CVE-2021-32585
An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiWAN prior to 4.5.9 may allow an malicious user to perform a stored cross-site scripting attack via specifically crafted HTTP requests.
Fortinet Fortiwan
4.3
CVSSv2
CVE-2016-4969
Cross-site scripting (XSS) vulnerability in Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote malicious users to inject arbitrary web script or HTML via the IP parameter to script/statistics/getconn.php.
Fortinet Fortiwan
4
CVSSv2
CVE-2016-4966
The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote authenticated users to download PCAP files via vectors related to the UserName GET parameter.
Fortinet Fortiwan
4
CVSSv2
CVE-2016-4967
Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote authenticated users to obtain sensitive information from (1) a backup of the device configuration via script/cfg_show.php or (2) PCAP files via script/system/tcpdump.php.
Fortinet Fortiwan
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »