CVE-2023-40720
- EPSS 0.04%
- Veröffentlicht 14.05.2024 17:15:19
- Zuletzt bearbeitet 21.11.2024 08:20:01
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS r...
CVE-2023-37932
- EPSS 0.66%
- Veröffentlicht 10.01.2024 18:15:45
- Zuletzt bearbeitet 21.11.2024 08:12:29
An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in FortiVoiceEntreprise version 7.0.0 and before 6.4.7 allows an authenticated attacker to read arbitrary files from the system via sending craft...
CVE-2022-27488
- EPSS 0.44%
- Veröffentlicht 13.12.2023 07:15:10
- Zuletzt bearbeitet 21.11.2024 06:55:49
A cross-site request forgery (CSRF) in Fortinet FortiVoiceEnterprise version 6.4.x, 6.0.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.0 through 6.2.7, 6.0.x, FortiMail version 7.0.0 through 7.0.3, 6.4.0 through 6.4.6, 6.2.x, 6...
CVE-2021-42755
- EPSS 0.16%
- Veröffentlicht 18.07.2022 17:15:08
- Zuletzt bearbeitet 21.11.2024 06:28:06
An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0...
CVE-2021-42757
- EPSS 0.08%
- Veröffentlicht 08.12.2021 11:15:11
- Zuletzt bearbeitet 21.11.2024 06:28:06
A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.
CVE-2020-9294
- EPSS 80.13%
- Veröffentlicht 27.04.2020 17:15:13
- Zuletzt bearbeitet 21.11.2024 05:40:22
An improper authentication vulnerability in FortiMail 5.4.10, 6.0.7, 6.2.2 and earlier and FortiVoiceEntreprise 6.0.0 and 6.0.1 may allow a remote unauthenticated attacker to access the system as a legitimate user by requesting a password change via ...