CVE-2021-42757
- EPSS 0.07%
- Veröffentlicht 08.12.2021 11:15:11
- Zuletzt bearbeitet 16.10.2025 10:15:36
A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.
CVE-2021-32600
- EPSS 0.28%
- Veröffentlicht 17.11.2021 12:15:16
- Zuletzt bearbeitet 21.11.2024 06:07:21
An exposure of sensitive information to an unauthorized actor vulnerability in FortiOS CLI 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, 6.0.x and 5.6.x may allow a local and authenticated user assigned to a specific VDOM to retrieve other VDOMs i...
CVE-2021-41019
- EPSS 0.24%
- Veröffentlicht 02.11.2021 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:25:16
An improper validation of certificate with host mismatch [CWE-297] vulnerability in FortiOS versions 6.4.6 and below may allow the connection to a malicious LDAP server via options in GUI, leading to disclosure of sensitive information, such as AD cr...
CVE-2021-24018
- EPSS 0.12%
- Veröffentlicht 04.08.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 05:52:13
A buffer underwrite vulnerability in the firmware verification routine of FortiOS before 7.0.1 may allow an attacker located in the adjacent network to potentially execute arbitrary code via a specifically crafted firmware image.
CVE-2021-24012
- EPSS 0.21%
- Veröffentlicht 02.06.2021 13:15:12
- Zuletzt bearbeitet 21.11.2024 05:52:12
An improper following of a certificate's chain of trust vulnerability in FortiGate versions 6.4.0 to 6.4.4 may allow an LDAP user to connect to SSLVPN with any certificate that is signed by a trusted Certificate Authority.
CVE-2019-17656
- EPSS 2.8%
- Veröffentlicht 12.04.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 04:32:42
A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a ma...
CVE-2020-15938
- EPSS 0.45%
- Veröffentlicht 04.03.2021 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:06:29
When traffic other than HTTP/S (eg: SSH traffic, etc...) traverses the FortiGate in version below 6.2.5 and below 6.4.2 on port 80/443, it is not redirected to the transparent proxy policy for processing, as it doesn't have a valid HTTP header.
CVE-2020-15937
- EPSS 0.33%
- Veröffentlicht 03.03.2021 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:06:29
An improper neutralization of input vulnerability in FortiGate version 6.2.x below 6.2.5 and 6.4.x below 6.4.1 may allow a remote attacker to perform a stored cross site scripting attack (XSS) via the IPS and WAF logs dashboard.
CVE-2020-6648
- EPSS 0.22%
- Veröffentlicht 21.10.2020 14:15:20
- Zuletzt bearbeitet 21.11.2024 05:36:05
A cleartext storage of sensitive information vulnerability in FortiOS command line interface in versions 6.2.4 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an authenticated attacker to obtain sensitive information such as users passw...
CVE-2020-12818
- EPSS 0.28%
- Veröffentlicht 24.09.2020 15:15:13
- Zuletzt bearbeitet 21.11.2024 05:00:20
An insufficient logging vulnerability in FortiGate before 6.4.1 may allow the traffic from an unauthenticated attacker to Fortinet owned IP addresses to go unnoticed.