Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2018-1352
A format string vulnerability in Fortinet FortiOS 5.6.0 allows malicious user to execute unauthorized code or commands via the SSH username variable.
Fortinet Fortios 5.6.0
7.5
CVSSv2
CVE-2015-3616
SQL injection vulnerability in Fortinet FortiManager 5.0.x prior to 5.0.11, 5.2.x prior to 5.2.2 allows remote malicious users to execute arbitrary commands via unspecified parameters.
Fortinet Fortimanager Firmware 5.0.6
Fortinet Fortimanager Firmware 5.0.7
Fortinet Fortimanager Firmware 5.0.2
Fortinet Fortimanager Firmware 5.0.3
Fortinet Fortimanager Firmware 5.0.10
Fortinet Fortimanager Firmware 5.2.0
Fortinet Fortimanager Firmware 5.0.0
Fortinet Fortimanager Firmware 5.0.1
Fortinet Fortimanager Firmware 5.0.8
Fortinet Fortimanager Firmware 5.0.9
Fortinet Fortimanager Firmware 5.0.4
Fortinet Fortimanager Firmware 5.0.5
Fortinet Fortimanager Firmware 5.2.1
7.5
CVSSv2
CVE-2017-7336
A hard-coded account named 'upgrade' in Fortinet FortiWLM 8.3.0 and lower versions allows a remote malicious user to log-in and execute commands with 'upgrade' account privileges.
Fortinet Fortiwlm
7.5
CVSSv2
CVE-2015-2281
Stack-based buffer overflow in collectoragent.exe in Fortinet Single Sign On (FSSO) before build 164 allows remote malicious users to execute arbitrary code via a large PROCESS_HELLO message to the Message Dispatcher on TCP port 8000.
Fortinet Single Sign On 4.3
1 EDB exploit
7.5
CVSSv2
CVE-2015-1455
Fortinet FortiAuthenticator 3.0.0 has a password of (1) slony for the slony PostgreSQL user and (2) www-data for the www-data PostgreSQL user, which makes it easier for remote malicious users to obtain access via unspecified vectors.
Fortinet Fortiauthenticator 3.0.0
7.5
CVSSv2
CVE-2014-2216
The FortiManager protocol service in Fortinet FortiOS prior to 4.3.16 and 5.0.0 prior to 5.0.8 on FortiGate devices allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a crafted request.
Fortinet Fortios 5.0.4
Fortinet Fortios 5.0.5
Fortinet Fortios 4.3.10
Fortinet Fortios 5.0.0
Fortinet Fortios 5.0.3
Fortinet Fortios 4.3.13
Fortinet Fortios 4.3.12
Fortinet Fortios
Fortinet Fortios 4.3.14
Fortinet Fortios 5.0.6
Fortinet Fortios 5.0.7
7.5
CVSSv2
CVE-2008-7161
Fortinet FortiGuard Fortinet FortiGate-1000 3.00 build 040075,070111 allows remote malicious users to bypass URL filtering via fragmented GET or POST requests that use HTTP/1.0 without the Host header. NOTE: this issue might be related to CVE-2005-3058.
Fortinet Fortigate-1000 3.00
1 EDB exploit
7.5
CVSSv2
CVE-2005-3058
Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote malicious users to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field,...
Fortinet Fortios
Fortinet Fortigate 2.8
1 EDB exploit
7.5
CVSSv2
CVE-2005-1837
Fortinet firewall running FortiOS 2.x contains a hardcoded username with the password set to the serial number, which allows local users with console access to gain privileges.
Fortinet Fortinet Firewall
7.2
CVSSv2
CVE-2021-26104
Multiple OS command injection (CWE-78) vulnerabilities in the command line interface of FortiManager 6.2.7 and below, 6.4.5 and below and all versions of 6.2.x, 6.0.x and 5.6.x, FortiAnalyzer 6.2.7 and below, 6.4.5 and below and all versions of 6.2.x, 6.0.x and 5.6.x, and FortiPo...
Fortinet Fortimanager
Fortinet Fortianalyzer
Fortinet Fortiportal
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »