CVE-2021-26111
- EPSS 0.11%
- Veröffentlicht 01.06.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:55:53
A missing release of memory after effective lifetime vulnerability in FortiSwitch 6.4.0 to 6.4.6, 6.2.0 to 6.2.6, 6.0.0 to 6.0.6, 3.6.11 and below may allow an attacker on an adjacent network to exhaust available memory by sending specifically crafte...
CVE-2019-17657
- EPSS 0.39%
- Veröffentlicht 07.04.2020 18:15:13
- Zuletzt bearbeitet 21.11.2024 04:32:43
An Uncontrolled Resource Consumption vulnerability in Fortinet FortiSwitch below 3.6.11, 6.0.6 and 6.2.2, FortiAnalyzer below 6.2.3, FortiManager below 6.2.3 and FortiAP-S/W2 below 6.2.2 may allow an attacker to cause admin webUI denial of service (D...
- EPSS 7.63%
- Veröffentlicht 09.09.2016 14:05:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
Fortinet FortiSwitch FSW-108D-POE, FSW-124D, FSW-124D-POE, FSW-224D-POE, FSW-224D-FPOE, FSW-248D-POE, FSW-248D-FPOE, FSW-424D, FSW-424D-POE, FSW-424D-FPOE, FSW-448D, FSW-448D-POE, FSW-448D-FPOE, FSW-524D, FSW-524D-FPOE, FSW-548D, FSW-548D-FPOE, FSW-1...
- EPSS 71.56%
- Veröffentlicht 24.08.2016 16:30:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3 allows remote attackers to execute arbitrary code via a crafted HTTP request, aka EGREGIOUSBLUNDER.