Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet fortiweb vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2023-34984
A protection mechanism failure in Fortinet FortiWeb 7.2.0 up to and including 7.2.1, 7.0.0 up to and including 7.0.6, 6.4.0 up to and including 6.4.3, 6.3.6 up to and including 6.3.23 allows malicious user to execute unauthorized code or commands via specially crafted HTTP reques...
Fortinet Fortiweb
8.8
CVSSv3
CVE-2023-23780
A stack-based buffer overflow in Fortinet FortiWeb version 7.0.0 up to and including 7.0.1, Fortinet FortiWeb version 6.3.6 up to and including 6.3.19, Fortinet FortiWeb 6.4 all versions allows malicious user to escalation of privilege via specifically crafted HTTP requests.
Fortinet Fortiweb
8.8
CVSSv3
CVE-2023-23781
A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below SAML server configuration may allow an authenticated malicious user to achieve arbitrary code execution via specifically crafted XML files.
Fortinet Fortiweb
7.8
CVSSv3
CVE-2023-23782
A heap-based buffer overflow in Fortinet FortiWeb version 7.0.0 up to and including 7.0.1, FortiWeb version 6.3.0 up to and including 6.3.19, FortiWeb 6.4 all versions, FortiWeb 6.2 all versions, FortiWeb 6.1 all versions allows malicious user to escalation of privilege via speci...
Fortinet Fortiweb
7.8
CVSSv3
CVE-2023-23783
A use of externally-controlled format string in Fortinet FortiWeb version 7.0.0 up to and including 7.0.1, FortiWeb 6.4 all versions allows malicious user to execute unauthorized code or commands via specially crafted command arguments.
Fortinet Fortiweb
6.5
CVSSv3
CVE-2023-23784
A relative path traversal in Fortinet FortiWeb version 7.0.0 up to and including 7.0.2, FortiWeb version 6.3.6 up to and including 6.3.20, FortiWeb 6.4 all versions allows malicious user to information disclosure via specially crafted web requests.
Fortinet Fortiweb
5.9
CVSSv3
CVE-2017-14191
An Improper Access Control vulnerability in Fortinet FortiWeb 5.6.0 up to but not including 6.1.0 under "Signed Security Mode", allows malicious user to bypass the signed user cookie protection by removing the FortiWeb own protection session cookie.
Fortinet Fortiweb
9.8
CVSSv3
CVE-2021-42756
Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the proxy daemon of FortiWeb 5.x all versions, 6.0.7 and below, 6.1.2 and below, 6.2.6 and below, 6.3.16 and below, 6.4 all versions may allow an unauthenticated remote malicious user to achieve arbitrary code exec...
Fortinet Fortiweb
1 Github repository
8.8
CVSSv3
CVE-2021-22123
An OS command injection vulnerability in FortiWeb's management interface 6.3.7 and below, 6.2.3 and below, 6.1.x, 6.0.x, 5.9.x may allow a remote authenticated malicious user to execute arbitrary commands on the system via the SAML server configuration page.
Fortinet Fortiweb
1 Github repository
4.9
CVSSv3
CVE-2016-5092
Directory traversal vulnerability in Fortinet FortiWeb prior to 5.5.3 allows remote authenticated administrators with read and write privileges to read arbitrary files by leveraging the autolearn feature.
Fortinet Fortiweb
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »