CVE-2023-47536
- EPSS 0.05%
- Veröffentlicht 13.12.2023 08:15:50
- Zuletzt bearbeitet 21.11.2024 08:30:24
An improper access control vulnerability [CWE-284] in FortiOS version 7.2.0, version 7.0.13 and below, version 6.4.14 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below may allow a remote unauthenticat...
CVE-2023-36639
- EPSS 0.17%
- Veröffentlicht 13.12.2023 07:15:12
- Zuletzt bearbeitet 21.11.2024 08:10:09
A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, FortiOS versions 7.4.0, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.15, 6.0.0 through 6.0.1...
CVE-2023-36641
- EPSS 0.47%
- Veröffentlicht 14.11.2023 18:15:49
- Zuletzt bearbeitet 21.11.2024 08:10:09
A numeric truncation error in Fortinet FortiProxy version 7.2.0 through 7.2.4, FortiProxy version 7.0.0 through 7.0.10, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1, all versions, FortiProxy 1.0 all versions, FortiOS vers...
CVE-2023-28002
- EPSS 0.01%
- Veröffentlicht 14.11.2023 18:15:29
- Zuletzt bearbeitet 21.11.2024 07:53:54
An improper validation of integrity check value vulnerability [CWE-354] in FortiOS 7.2.0 through 7.2.3, 7.0.0 through 7.0.12, 6.4 all versions, 6.2 all versions, 6.0 all versions and VMs may allow a local attacker with admin privileges to boot a mali...
CVE-2023-41675
- EPSS 0.4%
- Veröffentlicht 10.10.2023 17:15:12
- Zuletzt bearbeitet 21.11.2024 08:21:27
A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD ...
CVE-2023-29183
- EPSS 0.59%
- Veröffentlicht 13.09.2023 13:15:08
- Zuletzt bearbeitet 21.11.2024 07:56:40
An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10 and FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 ...
CVE-2023-33308
- EPSS 5.93%
- Veröffentlicht 26.07.2023 15:15:10
- Zuletzt bearbeitet 21.11.2024 08:05:23
A stack-based overflow vulnerability [CWE-124] in Fortinet FortiOS version 7.0.0 through 7.0.10 and 7.2.0 through 7.2.3 and FortiProxy version 7.0.0 through 7.0.9 and 7.2.0 through 7.2.2 allows a remote unauthenticated attacker to execute arbitrary c...
CVE-2021-43072
- EPSS 0.05%
- Veröffentlicht 18.07.2023 03:15:54
- Zuletzt bearbeitet 21.11.2024 06:28:38
A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiAnalyzer version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiManager version 7.0...
CVE-2023-33306
- EPSS 0.2%
- Veröffentlicht 16.06.2023 10:15:09
- Zuletzt bearbeitet 21.11.2024 08:05:22
A null pointer dereference in Fortinet FortiOS before 7.2.5, before 7.0.11 and before 6.4.13, FortiProxy before 7.2.4 and before 7.0.10 allows attacker to denial of sslvpn service via specifically crafted request in bookmark parameter.
CVE-2023-33307
- EPSS 0.07%
- Veröffentlicht 16.06.2023 10:15:09
- Zuletzt bearbeitet 21.11.2024 08:05:22
A null pointer dereference in Fortinet FortiOS before 7.2.5 and before 7.0.11, FortiProxy before 7.2.3 and before 7.0.9 allows attacker to denial of sslvpn service via specifically crafted request in network parameter.