Fortinet

Fortiadc

43 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 19.73%
  • Veröffentlicht 02.11.2022 12:15:54
  • Zuletzt bearbeitet 21.11.2024 07:16:20

A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiADC 7.0.0 - 7.0.2 and 6.2.0 - 6.2.4 allows an attacker to execute unauthorized code or commands via the URL and User fields observed in the traffi...

  • EPSS 0.27%
  • Veröffentlicht 02.11.2022 12:15:54
  • Zuletzt bearbeitet 21.11.2024 07:16:21

An improper handling of malformed request vulnerability [CWE-228] exists in FortiADC 5.0 all versions, 6.0.0 all versions, 6.1.0 all versions, 6.2.0 through 6.2.3, and 7.0.0 through 7.0.2. This may allow a remote attacker without privileges to bypass...

  • EPSS 0.84%
  • Veröffentlicht 02.11.2022 12:15:53
  • Zuletzt bearbeitet 21.11.2024 07:11:49

An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiADC management interface 7.1.0 may allow a remote and authenticated attacker to trigger a stored cross site scripting (XSS) attack via configuring a special...

  • EPSS 0.14%
  • Veröffentlicht 06.09.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:28:38

An improper privilege management vulnerability [CWE-269] in FortiADC versions 6.2.1 and below, 6.1.5 and below, 6.0.4 and below, 5.4.5 and below and 5.3.7 and below may allow a remote authenticated attacker with restricted user profile to modify the ...

  • EPSS 0.2%
  • Veröffentlicht 05.08.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:35

A format string vulnerability [CWE-134] in the command line interpreter of FortiADC version 6.0.0 through 6.0.4, FortiADC version 6.1.0 through 6.1.5, FortiADC version 6.2.0 through 6.2.1, FortiProxy version 1.0.0 through 1.0.7, FortiProxy version 1....

  • EPSS 0.13%
  • Veröffentlicht 03.08.2022 14:15:08
  • Zuletzt bearbeitet 21.11.2024 06:55:49

A unverified password change in Fortinet FortiADC version 6.2.0 through 6.2.3, 6.1.x, 6.0.x, 5.x.x allows an authenticated attacker to bypass the Old Password check in the password change form via a crafted HTTP request.

  • EPSS 0.63%
  • Veröffentlicht 18.07.2022 18:15:09
  • Zuletzt bearbeitet 21.11.2024 06:53:28

Multiple improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerabilities [CWE-89] in FortiADC management interface 7.0.0 through 7.0.1, 5.0.0 through 6.2.2 may allow an authenticated attacker to execute unauthoriz...

  • EPSS 0.39%
  • Veröffentlicht 08.12.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 06:07:20

A missing cryptographic steps vulnerability in the function that encrypts users' LDAP and RADIUS credentials in FortiSandbox before 4.0.1, FortiWeb before 6.3.12, FortiADC before 6.2.1, FortiMail 7.0.1 and earlier may allow an attacker in possession ...

  • EPSS 0.07%
  • Veröffentlicht 08.12.2021 11:15:11
  • Zuletzt bearbeitet 16.10.2025 10:15:36

A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.

  • EPSS 0.08%
  • Veröffentlicht 02.11.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 05:06:29

A cleartext storage of sensitive information in GUI in FortiADC versions 5.4.3 and below, 6.0.0 and below may allow a remote authenticated attacker to retrieve some sensitive information such as users LDAP passwords and RADIUS shared secret by deobfu...