Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2005-1837
Fortinet firewall running FortiOS 2.x contains a hardcoded username with the password set to the serial number, which allows local users with console access to gain privileges.
Fortinet Fortinet Firewall
641
VMScore
CVE-2021-26104
Multiple OS command injection (CWE-78) vulnerabilities in the command line interface of FortiManager 6.2.7 and below, 6.4.5 and below and all versions of 6.2.x, 6.0.x and 5.6.x, FortiAnalyzer 6.2.7 and below, 6.4.5 and below and all versions of 6.2.x, 6.0.x and 5.6.x, and FortiPo...
Fortinet Fortimanager
Fortinet Fortianalyzer
Fortinet Fortiportal
641
VMScore
CVE-2021-43065
A incorrect permission assignment for critical resource in Fortinet FortiNAC version 9.2.0, version 9.1.3 and below, version 8.8.9 and below allows malicious user to gain higher privileges via the access to sensitive system data.
Fortinet Fortinac 9.2.0
Fortinet Fortinac
641
VMScore
CVE-2021-42759
A violation of secure design principles in Fortinet Meru AP version 8.6.1 and below, version 8.5.5 and below allows malicious user to execute unauthorized code or commands via crafted cli commands.
Fortinet Meru Firmware
641
VMScore
CVE-2021-41021
A privilege escalation vulnerability in FortiNAC versions 8.8.8 and below and 9.1.2 and below may allow an admin user to escalate the privileges to root via the sudo command.
Fortinet Fortinac 9.1.2
Fortinet Fortinac 9.1.1
Fortinet Fortinac 9.1.0
Fortinet Fortinac 8.8.8
Fortinet Fortinac 8.8.7
Fortinet Fortinac 8.8.6
Fortinet Fortinac 8.8.5
Fortinet Fortinac 8.8.4
Fortinet Fortinac 8.8.3
Fortinet Fortinac 8.8.0
Fortinet Fortinac 8.8.1
Fortinet Fortinac 8.8.2
641
VMScore
CVE-2021-36183
An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged malicious user to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates.
Fortinet Forticlient
641
VMScore
CVE-2021-26089
An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase.
Fortinet Forticlient
641
VMScore
CVE-2019-15708
A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig comman...
Fortinet Fortiap
Fortinet Fortiap-s
Fortinet Fortiap-s 6.2.0
Fortinet Fortiap-s 6.2.1
Fortinet Fortiap-u
Fortinet Fortiap-w2
Fortinet Fortiap-w2 6.2.0
Fortinet Fortiap-w2 6.2.1
641
VMScore
CVE-2019-15711
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
Fortinet Forticlient
641
VMScore
CVE-2019-17650
An Improper Neutralization of Special Elements used in a Command vulnerability in one of FortiClient for Mac OS root processes, may allow a local user of the system on which FortiClient is running to execute unauthorized code as root by bypassing a security check.
Fortinet Forticlient
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »