209819 | Fortinet FortiWeb Buffer overflow in TFTP client library of CLI (FG-IR-21-173) | medium |
209818 | Fortinet Fortigate Buffer overflow in TFTP client library of CLI (FG-IR-21-173) | medium |
209817 | Fortinet FortiWeb - Multiple command injection vulnerabilities (FG-IR-21-157) | high |
209816 | Fortinet Fortigate Heap-based Buffer Overflow in firmware signature verification (FG-IR-21-115) | high |
209815 | Fortinet Fortigate Debug commands allow memory manipulation (FG-IR-21-091) | medium |
209808 | Fortinet FortiWeb OS command injection due to unsafe input validation function (FG-IR-21-166) | high |
209807 | Fortinet FortiWeb xss (FG-IR-20-122) | medium |
209806 | Fortinet FortiWeb ] Buffer overflow vulnerability in the cookie header (FG-IR-20-126) | medium |
209805 | Fortinet Fortigate Security Best Practice: Antivirus evasion via malformed RAR file (FG-IR-20-037) | medium |
209804 | Fortinet Fortigate xss (FG-IR-20-103) | medium |
209803 | Fortinet Fortigate MFA bypass by changing username case (FG-IR-19-283) | critical |
209802 | Fortinet Fortigate xss (FG-IR-21-230) | medium |
209801 | Fortinet FortiWeb Arbitrary file/directory deletion (FG-IR-21-158) | high |
209799 | Fortinet FortiWeb Open redirect in redir handler due to direct input interpolation (FG-IR-21-168) | medium |
209798 | Fortinet FortiWeb xss (FG-IR-21-122) | medium |
209797 | Fortinet FortiWeb Uncontrolled resource consumption (FG-IR-21-039) | high |
209760 | Fortinet FortiWeb ] Restricted user can execute arbitrary commands with root privileges (OS command Injection). (FG-IR-20-120) | high |
209759 | Fortinet Fortigate Missing certificate CN/SAN validation leads to information disclosure (FG-IR-21-074) | medium |
209758 | Fortinet Fortigate Disclosure of other VDOMs information through CLI commands (FG-IR-20-243) | low |
209757 | Fortinet FortiWeb OS Command Injection because of missing input parameter sanitization (FG-IR-21-047) | high |
209756 | Fortinet Fortigate ][Web filtering] Host header is vulnerable to an XSS vulnerability and redirection/injection (FG-IR-19-301) | medium |
209755 | Fortinet Fortigate Buffer Underwrite in firmware verification (FG-IR-21-046) | high |
209754 | Fortinet FortiWeb Buffer Underwrite in firmware verification (FG-IR-21-046) | high |
209753 | Fortinet FortiWeb OpenSSH Terrapin attack (CVE-2023-48795) (FG-IR-23-490) | critical |
209752 | Fortinet FortiWeb OS command injection vulnerability (FG-IR-21-116) | high |
209751 | Fortinet FortiWeb [FG-IR-21-014] Path traversal vulnerabilities (FG-IR-21-014) | medium |
209750 | Fortinet Fortigate Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification (FragAttacks) (FG-IR-21-071) | low |
209749 | Fortinet Fortigate IPS Engine evasion using custom TCP flags (FG-IR-23-090) | high |
209748 | Fortinet FortiWeb ] Stack-Based Buffer Overflow vulnerability using a crafted request (FG-IR-20-125) | critical |
209747 | Fortinet Fortigate fails to block malformed HTTP/S traffic when transparent proxy is enabled (FG-IR-20-172) | high |
209746 | Fortinet FortiWeb sqli (FG-IR-20-124) | critical |
209745 | Fortinet Fortigate ] Sensitive information is displayed in cleartext in the CLI window when using diagnose sys ha checksum command (FG-IR-20-009) | medium |
209744 | Fortinet Fortigate Stack-based buffer overflows via crafted CLI commands (FG-IR-21-206) | medium |
209742 | Fortinet Fortigate Integer overflow in SSLVPN allocator (FG-IR-21-049) | critical |
209741 | Fortinet FortiWeb Stack-based buffer overflow due to type mismatch (FG-IR-21-134) | high |
209740 | Fortinet Fortigate Improper Inter-VDOM access control (FG-IR-21-147) | medium |
209739 | Fortinet Fortigate Evasion by manipulating MIME attachment (FG-IR-22-074) | high |
209738 | Fortinet Fortigate Format string vulnerability in command line interpreter (FG-IR-21-235) | high |
209737 | Fortinet Fortigate (FG-IR-21-155) | medium |
209736 | Fortinet FortiWeb Confused deputy issue on SERVER_NAME causes open proxy flaw (FG-IR-21-123) | medium |
209735 | Fortinet FortiWeb - Path traversal in API controller (FG-IR-21-156) | medium |
209734 | Fortinet FortiWeb Multiple cryptographic flaws allow for full LDAP and RADIUS passwords compromise (FG-IR-20-222) | medium |
209733 | Fortinet FortiWeb Multiple vulnerabilities in the authentication mechanism of confd (FG-IR-21-130) | critical |
209732 | Fortinet Fortigate Privilege escalation vulnerability using the automation script feature (FG-IR-20-131) | high |
209731 | Fortinet Fortigate Path traversal vulnerability (FG-IR-21-181) | high |
209730 | Fortinet Fortigate Hardcoded SSLVPN cookie encryption key (FG-IR-21-051) | high |
209729 | Fortinet FortiWeb Stack-based buffer overflows in API controllers (FG-IR-21-152) | high |
209728 | Fortinet FortiWeb Heap-based buffer overflow in API v1.0 controller (FG-IR-21-188) | high |
209727 | Fortinet FortiWeb Unauthorized user is granted access to the Reports available in the Log & Report section (FG-IR-21-138) | medium |
209726 | Fortinet FortiWeb Incorrect handling of large requests leads to DoS (FG-IR-21-131) | high |