Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet fortiwlm 8.3.2 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2023-34991
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.0 up to and including 8.6.5 and 8.5.0 up to and including 8.5.4 and 8.4.0 up to and including 8.4.2 and 8.3.0 up to and including 8.3.2 and 8.2.2 allo...
Fortinet Fortiwlm 8.2.2
Fortinet Fortiwlm
Fortinet Fortiwlm 8.3.0
Fortinet Fortiwlm 8.3.1
Fortinet Fortiwlm 8.3.2
Fortinet Fortiwlm 8.4.0
Fortinet Fortiwlm 8.4.1
Fortinet Fortiwlm 8.4.2
8.8
CVSSv3
CVE-2021-43077
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.2 and below, version 8.5.2 and below, version 8.4.2 and below, version 8.3.2 and below allows malicious user to execute unauthorized code or commands ...
Fortinet Fortiwlm
8.8
CVSSv3
CVE-2021-43075
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.2 and below, version 8.5.2 and below, version 8.4.2 and below, version 8.3.2 and below allows malicious user to execute unauthorized code or com...
Fortinet Fortiwlm
7.5
CVSSv3
CVE-2023-42783
A relative path traversal in Fortinet FortiWLM version 8.6.0 up to and including 8.6.5 and 8.5.0 up to and including 8.5.4 and 8.4.2 up to and including 8.4.0 and 8.3.2 up to and including 8.3.0 and 8.2.2 allows malicious user to read arbitrary files via crafted http requests.
Fortinet Fortiwlm 8.2.2
Fortinet Fortiwlm
Fortinet Fortiwlm 8.3.0
Fortinet Fortiwlm 8.3.1
Fortinet Fortiwlm 8.3.2
Fortinet Fortiwlm 8.4.0
Fortinet Fortiwlm 8.4.1
Fortinet Fortiwlm 8.4.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started