Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet fortiweb vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2021-42756
Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the proxy daemon of FortiWeb 5.x all versions, 6.0.7 and below, 6.1.2 and below, 6.2.6 and below, 6.3.16 and below, 6.4 all versions may allow an unauthenticated remote malicious user to achieve arbitrary code exec...
Fortinet Fortiweb
1 Github repository
8.8
CVSSv3
CVE-2021-43073
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows malicious user to execute unauthorized code or commands via crafted HTTP r...
Fortinet Fortiweb
8.8
CVSSv3
CVE-2020-29018
A format string vulnerability in FortiWeb 6.3.0 up to and including 6.3.5 may allow an authenticated, remote malicious user to read the content of memory and retrieve sensitive data via the redir parameter.
Fortinet Fortiweb
4.9
CVSSv3
CVE-2016-5092
Directory traversal vulnerability in Fortinet FortiWeb prior to 5.5.3 allows remote authenticated administrators with read and write privileges to read arbitrary files by leveraging the autolearn feature.
Fortinet Fortiweb
9.8
CVSSv3
CVE-2021-42761
A condition for session fixation vulnerability [CWE-384] in the session management of FortiWeb versions 6.4 all versions, 6.3.0 up to and including 6.3.16, 6.2.0 up to and including 6.2.6, 6.1.0 up to and including 6.1.2, 6.0.0 up to and including 6.0.7, 5.9.0 up to and including...
Fortinet Fortiweb
6.1
CVSSv3
CVE-2019-5590
The URL part of the report message is not encoded in Fortinet FortiWeb 6.0.2 and below which may allow an malicious user to execute unauthorized code or commands (Cross Site Scripting) via attack reports generated in HTML form.
Fortinet Fortiweb
6.1
CVSSv3
CVE-2021-22122
An improper neutralization of input during web page generation in FortiWeb GUI interface 6.3.0 up to and including 6.3.7 and version prior to 6.2.4 may allow an unauthenticated, remote malicious user to perform a reflected cross site scripting attack (XSS) by injecting malicious ...
Fortinet Fortiweb
1 Github repository
8.8
CVSSv3
CVE-2021-36179
A stack-based buffer overflow in Fortinet FortiWeb version 6.3.14 and below, 6.2.4 and below allows malicious user to execute unauthorized code or commands via crafted parameters in CLI command execution
Fortinet Fortiweb
8.8
CVSSv3
CVE-2021-36182
A Improper neutralization of special elements used in a command ('Command Injection') in Fortinet FortiWeb version 6.3.13 and below allows malicious user to execute unauthorized code or commands via crafted HTTP requests
Fortinet Fortiweb
7.2
CVSSv3
CVE-2021-36193
Multiple stack-based buffer overflows in the command line interpreter of FortiWeb prior to 6.4.2 may allow an authenticated malicious user to achieve arbitrary code execution via specially crafted commands.
Fortinet Fortiweb
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
NEXT »