Fortinet firewall running FortiOS 2.x contains a hardcoded username with the password set to the serial number, which allows local users with console access to gain privileges.
Max CVSS
7.5
EPSS Score
0.07%
Published
2005-06-01
Updated
2016-10-18
The FTP component in FortiGate 2.8 running FortiOS 2.8MR10 and v3beta, and other versions before 3.0 MR1, allows remote attackers to bypass the Fortinet FTP anti-virus engine by sending a STOR command and uploading a file before the FTP server response has been sent, as demonstrated using LFTP.
Max CVSS
10.0
EPSS Score
3.82%
Published
2005-12-31
Updated
2017-07-11
Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
Max CVSS
7.5
EPSS Score
5.40%
Published
2005-12-31
Updated
2018-10-19
The fortimon.sys device driver in Fortinet FortiClient Host Security 3.0 MR5 Patch 3 and earlier does not properly initialize its DeviceExtension, which allows local users to access kernel memory and execute arbitrary code via a crafted request.
Max CVSS
7.2
EPSS Score
0.04%
Published
2008-02-14
Updated
2018-10-15
Fortinet Antivirus 3.113.0.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Max CVSS
9.3
EPSS Score
0.69%
Published
2008-12-12
Updated
2018-10-11
Fortinet FortiGuard Fortinet FortiGate-1000 3.00 build 040075,070111 allows remote attackers to bypass URL filtering via fragmented GET or POST requests that use HTTP/1.0 without the Host header. NOTE: this issue might be related to CVE-2005-3058.
Max CVSS
7.5
EPSS Score
2.18%
Published
2009-09-04
Updated
2018-10-11
Format string vulnerability in Fortinet FortiClient 3.0.614, and possibly earlier, allows local users to execute arbitrary code via format string specifiers in the VPN connection name.
Max CVSS
7.2
EPSS Score
0.04%
Published
2009-04-07
Updated
2018-10-10
FortiGuard FortiAuthenticator before 3.0 allows remote administrators to gain privileges via the command line interface.
Max CVSS
9.0
EPSS Score
0.10%
Published
2014-04-30
Updated
2017-08-29
The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.0.0 before 5.0.8 on FortiGate devices allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted request.
Max CVSS
7.5
EPSS Score
7.63%
Published
2014-08-25
Updated
2017-08-29
In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect.
Max CVSS
9.0
EPSS Score
0.22%
Published
2020-03-19
Updated
2020-03-23
In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect.
Max CVSS
9.0
EPSS Score
0.22%
Published
2020-03-19
Updated
2020-03-23
In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect.
Max CVSS
9.0
EPSS Score
0.22%
Published
2020-03-19
Updated
2020-03-23
The Control and Provisioning of Wireless Access Points (CAPWAP) daemon in Fortinet FortiOS 5.0 Patch 7 build 4457 allows remote attackers to cause a denial of service (locked CAPWAP Access Controller) via a large number of ClientHello DTLS messages.
Max CVSS
7.8
EPSS Score
1.07%
Published
2015-02-02
Updated
2015-02-19
Fortinet FortiAuthenticator 3.0.0 has a password of (1) slony for the slony PostgreSQL user and (2) www-data for the www-data PostgreSQL user, which makes it easier for remote attackers to obtain access via unspecified vectors.
Max CVSS
7.5
EPSS Score
0.75%
Published
2015-02-03
Updated
2015-02-19
Stack-based buffer overflow in collectoragent.exe in Fortinet Single Sign On (FSSO) before build 164 allows remote attackers to execute arbitrary code via a large PROCESS_HELLO message to the Message Dispatcher on TCP port 8000.
Max CVSS
7.5
EPSS Score
91.36%
Published
2015-03-19
Updated
2018-10-09
A Command Injection vulnerability exists in FortiManager 5.2.1 and earlier and FortiManager 5.0.10 and earlier via unspecified vectors, which could let a malicious user run systems commands when executing a report.
Max CVSS
9.0
EPSS Score
0.29%
Published
2020-02-04
Updated
2020-02-05
A vulnerability exists in in FortiManager 5.2.1 and earlier and 5.0.10 and earlier in the WebUI FTP backup page
Max CVSS
9.8
EPSS Score
1.16%
Published
2020-02-04
Updated
2020-02-05
Fortinet FortiManager 5.0.x before 5.0.11, 5.2.x before 5.2.2 allows remote attackers to obtain arbitrary files via vectors involving another unspecified vulnerability.
Max CVSS
7.5
EPSS Score
0.20%
Published
2017-08-11
Updated
2017-08-26
SQL injection vulnerability in Fortinet FortiManager 5.0.x before 5.0.11, 5.2.x before 5.2.2 allows remote attackers to execute arbitrary commands via unspecified parameters.
Max CVSS
9.8
EPSS Score
0.14%
Published
2017-08-11
Updated
2017-08-26
Fortinet FortiManager 5.0 before 5.0.11 and 5.2 before 5.2.2 allow local users to gain privileges via crafted CLI commands.
Max CVSS
7.8
EPSS Score
0.04%
Published
2017-08-22
Updated
2017-08-29
The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient before 5.2.4 allow local users to write to arbitrary memory locations via a 0x226108 ioctl call.
Max CVSS
7.2
EPSS Score
0.04%
Published
2015-09-03
Updated
2018-10-09
The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.
Max CVSS
7.2
EPSS Score
0.06%
Published
2015-09-03
Updated
2018-10-09
The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, (4) mdare64_52.sys, and (5) Fortishield.sys drivers in Fortinet FortiClient before 5.2.4 do not properly restrict access to the API for management of processes and the Windows registry, which allows local users to obtain a privileged handle to a PID and possibly have unspecified other impact, as demonstrated by a 0x2220c8 ioctl call.
Max CVSS
7.2
EPSS Score
0.04%
Published
2015-09-03
Updated
2018-10-09
FortiOS 5.2.3, when configured to use High Availability (HA) and the dedicated management interface is enabled, does not require authentication for access to the ZebOS shell on the HA dedicated management interface, which allows remote attackers to obtain shell access via unspecified vectors.
Max CVSS
9.3
EPSS Score
0.72%
Published
2015-10-15
Updated
2016-12-03
Fortinet FortiClient Linux SSLVPN before build 2313, when installed on Linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program.
Max CVSS
7.8
EPSS Score
0.04%
Published
2016-01-08
Updated
2016-12-03
384 vulnerabilities found
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!