Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet fortiwan vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2022-33869
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the management interface of FortiWAN 4.0.0 up to and including 4.5.9 may allow an authenticated malicious user to execute unauthorized commands via specifically crafted arguments to exi...
Fortinet Fortiwan 4.4.1
Fortinet Fortiwan 4.4.0
Fortinet Fortiwan 4.3.1
Fortinet Fortiwan 4.3.0
Fortinet Fortiwan 4.2.7
Fortinet Fortiwan 4.2.6
Fortinet Fortiwan 4.2.5
Fortinet Fortiwan 4.2.2
Fortinet Fortiwan 4.2.1
Fortinet Fortiwan 4.1.3
Fortinet Fortiwan 4.1.2
Fortinet Fortiwan 4.1.1
Fortinet Fortiwan
8.8
CVSSv3
CVE-2023-44251
** UNSUPPORTED WHEN ASSIGNED **A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in Fortinet FortiWAN version 5.2.0 up to and including 5.2.1 and version 5.1.1. up to and including 5.1.2 may allow an authenticated ma...
Fortinet Fortiwan 5.2.0
Fortinet Fortiwan 5.2.1
Fortinet Fortiwan 5.1.1
Fortinet Fortiwan 5.1.2
8.8
CVSSv3
CVE-2023-44252
** UNSUPPORTED WHEN ASSIGNED **An improper authentication vulnerability [CWE-287] in Fortinet FortiWAN version 5.2.0 up to and including 5.2.1 and version 5.1.1 up to and including 5.1.2 may allow an authenticated malicious user to escalate his privileges via HTTP or HTTPs reques...
Fortinet Fortiwan 5.2.0
Fortinet Fortiwan 5.2.1
Fortinet Fortiwan 5.1.1
Fortinet Fortiwan 5.1.2
6.1
CVSSv3
CVE-2016-4969
Cross-site scripting (XSS) vulnerability in Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote malicious users to inject arbitrary web script or HTML via the IP parameter to script/statistics/getconn.php.
Fortinet Fortiwan
7.5
CVSSv3
CVE-2021-26113
A use of a one-way hash with a predictable salt vulnerability [CWE-760] in FortiWAN prior to 4.5.9 may allow an attacker who has previously come in possession of the password file to potentially guess passwords therein stored.
Fortinet Fortiwan
9.8
CVSSv3
CVE-2021-26112
Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN prior to 4.5.9 may allow an unauthenticated malicious user to potentially corrupt control data in memory and execute arbitrary code via specifica...
Fortinet Fortiwan
6.5
CVSSv3
CVE-2021-32593
A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN prior to 4.5.9 may allow an unauthenticated remote malicious user to decrypt and forge protocol communication messages.
Fortinet Fortiwan
8.8
CVSSv3
CVE-2021-24009
Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in the Web GUI of FortiWAN prior to 4.5.9 may allow an authenticated malicious user to execute arbitrary commands on the underlying system's shell via specifically crafted HTT...
Fortinet Fortiwan
8.8
CVSSv3
CVE-2016-4965
Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote authenticated users with access to the nslookup functionality to execute arbitrary commands with root privileges via the graph parameter to diagnosis_control.php.
Fortinet Fortiwan
6.5
CVSSv3
CVE-2016-4966
The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) prior to 4.2.5 allows remote authenticated users to download PCAP files via vectors related to the UserName GET parameter.
Fortinet Fortiwan
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »