Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-32589

Summary
Assigner-fortinet
Assigner Org ID-6abe59d8-c742-4dff-8ce8-9b0ca1073da8
Published At-19 Dec, 2024 | 12:22
Updated At-20 Dec, 2024 | 21:55
Rejected At-
Credits

A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:fortinet
Assigner Org ID:6abe59d8-c742-4dff-8ce8-9b0ca1073da8
Published At:19 Dec, 2024 | 12:22
Updated At:20 Dec, 2024 | 21:55
Rejected At:
▼CVE Numbering Authority (CNA)

A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.

Affected Products
Vendor
Fortinet, Inc.Fortinet
Product
FortiManager
CPEs
  • cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.10:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.9:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.8:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:6.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.10:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.9:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.8:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.4.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.4.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.4.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.4.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.4.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.10:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.9:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.8:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.12:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.11:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.10:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.9:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.8:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortimanager:5.0.0:*:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • 7.0.0
  • From 6.4.0 through 6.4.5 (semver)
  • From 6.2.0 through 6.2.7 (semver)
  • From 6.0.0 through 6.0.10 (semver)
  • From 5.6.0 through 5.6.10 (semver)
  • From 5.4.0 through 5.4.7 (semver)
  • From 5.2.0 through 5.2.10 (semver)
  • From 5.0.0 through 5.0.12 (semver)
Vendor
Fortinet, Inc.Fortinet
Product
FortiAnalyzer
CPEs
  • cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.10:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.9:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.8:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:6.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.10:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.9:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.8:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.4.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.4.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.4.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.4.4:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.4.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.3.11:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.2.10:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.2.9:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.2.8:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.2.7:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.2.5:*:*:*:*:*:*:*
  • cpe:2.3:o:fortinet:fortianalyzer:5.2.4:*:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • 7.0.0
  • From 6.4.0 through 6.4.5 (semver)
  • From 6.2.0 through 6.2.7 (semver)
  • From 6.0.0 through 6.0.10 (semver)
  • From 5.6.0 through 5.6.10 (semver)
  • From 5.4.0 through 5.4.7 (semver)
  • 5.3.11
  • From 5.2.4 through 5.2.10 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-416Execute unauthorized code or commands
Type: CWE
CWE ID: CWE-416
Description: Execute unauthorized code or commands
Metrics
VersionBase scoreBase severityVector
3.17.7HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
Version: 3.1
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Please upgrade to FortiPortal version 6.0.6 or above Please upgrade to FortiPortal version 5.3.7 or above Please upgrade to FortiManager version 7.0.1 or above Please upgrade to FortiManager version 6.4.6 or above Please upgrade to FortiManager version 6.2.8 or above Please upgrade to FortiManager version 6.0.11 or above Please upgrade to FortiManager version 5.6.11 or above Please upgrade to FortiAnalyzer version 7.0.1 or above Please upgrade to FortiAnalyzer version 6.4.6 or above Please upgrade to FortiAnalyzer version 6.2.8 or above Please upgrade to FortiAnalyzer version 6.0.11 or above Please upgrade to FortiAnalyzer version 5.6.11 or above

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://fortiguard.fortinet.com/psirt/FG-IR-21-067
N/A
Hyperlink: https://fortiguard.fortinet.com/psirt/FG-IR-21-067
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@fortinet.com
Published At:19 Dec, 2024 | 13:15
Updated At:31 Jan, 2025 | 17:42

A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.1HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Fortinet, Inc.
fortinet
>>fortianalyzer>>Versions from 5.2.4(inclusive) to 5.6.11(exclusive)
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortianalyzer>>Versions from 6.0.0(inclusive) to 6.0.11(exclusive)
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortianalyzer>>Versions from 6.2.0(inclusive) to 6.2.8(exclusive)
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortianalyzer>>Versions from 6.4.0(inclusive) to 6.4.6(exclusive)
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortianalyzer>>7.0.0
cpe:2.3:a:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortimanager>>Versions from 5.0.0(inclusive) to 5.6.11(exclusive)
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortimanager>>Versions from 6.0.0(inclusive) to 6.0.11(exclusive)
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortimanager>>Versions from 6.2.0(inclusive) to 6.2.8(exclusive)
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortimanager>>Versions from 6.4.0(inclusive) to 6.4.6(exclusive)
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortimanager>>7.0.0
cpe:2.3:a:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortiportal>>Versions from 4.0.0(inclusive) to 5.3.7(exclusive)
cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortiportal>>Versions from 6.0.0(inclusive) to 6.0.6(exclusive)
cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Secondarypsirt@fortinet.com
CWE ID: CWE-416
Type: Secondary
Source: psirt@fortinet.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://fortiguard.fortinet.com/psirt/FG-IR-21-067psirt@fortinet.com
Vendor Advisory
Hyperlink: https://fortiguard.fortinet.com/psirt/FG-IR-21-067
Source: psirt@fortinet.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

454Records found

CVE-2022-38375
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-8.6||HIGH
EPSS-0.22% / 44.16%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 18:06
Updated-23 Oct, 2024 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper authorization vulnerability [CWE-285]  in Fortinet FortiNAC version 9.4.0 through 9.4.1 and before 9.2.6 allows an unauthenticated user to perform some administrative operations over the FortiNAC instance via crafted HTTP POST requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortinacfortinac-fFortiNAC
CWE ID-CWE-285
Improper Authorization
CVE-2022-35846
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-8.1||HIGH
EPSS-0.38% / 58.65%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-25 Oct, 2024 | 13:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper restriction of excessive authentication attempts vulnerability [CWE-307] in FortiTester Telnet port 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated attacker to guess the credentials of an admin user via a brute force attack.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortitesterFortinet FortiTester
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2022-35843
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-7.7||HIGH
EPSS-0.06% / 17.20%
||
7 Day CHG~0.00%
Published-06 Dec, 2022 | 16:00
Updated-07 Nov, 2023 | 03:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 7.2.0, 7.0.0 through 7.0.7, 6.4.0 through 6.4.9, 6.2 all versions, 6.0 all versions and FortiProxy SSH login component 7.0.0 through 7.0.5, 2.0.0 through 2.0.10, 1.2.0 all versions may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyfortiosFortiOSFortiProxy
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2022-33872
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.60% / 80.93%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-25 Oct, 2024 | 13:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in Telnet login components of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated remote attacker to execute arbitrary command in the underlying shell.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortitesterFortinet FortiTester
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-33874
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.60% / 80.93%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-25 Oct, 2024 | 13:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in SSH login components of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated remote attacker to execute arbitrary command in the underlying shell.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortitesterFortinet FortiTester
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-33873
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-6.8||MEDIUM
EPSS-2.23% / 83.87%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-25 Oct, 2024 | 13:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in Console login components of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated attacker to execute arbitrary command in the underlying shell.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortitesterFortinet FortiTester
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-29016
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.94% / 82.68%
||
7 Day CHG~0.00%
Published-14 Jan, 2021 | 16:04
Updated-25 Oct, 2024 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability in FortiWeb 6.3.0 through 6.3.5 and version before 6.2.4 may allow an unauthenticated, remote attacker to overwrite the content of the stack and potentially execute arbitrary code by sending a crafted request with a large certname.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwebFortinet FortiWeb
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-32756
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-12.09% / 93.53%
||
7 Day CHG-1.28%
Published-13 May, 2025 | 14:46
Updated-25 Aug, 2025 | 02:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-06-04||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, 6.4.0 through 6.4.10, FortiRecorder versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.5, 6.4.0 through 6.4.5, FortiMail versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.8, FortiNDR versions 7.6.0, 7.4.0 through 7.4.7, 7.2.0 through 7.2.4, 7.0.0 through 7.0.6, FortiCamera versions 2.1.0 through 2.1.3, 2.0 all versions, 1.1 all versions, allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortirecorderforticameraforticamera_firmwarefortivoicefortimailfortindrFortiVoiceFortiCameraFortiMailFortiNDRFortiRecorderMultiple Products
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-30307
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-3.9||LOW
EPSS-0.18% / 40.08%
||
7 Day CHG~0.00%
Published-02 Nov, 2022 | 00:00
Updated-22 Oct, 2024 | 20:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A key management error vulnerability [CWE-320] affecting the RSA SSH host key in FortiOS 7.2.0 and below, 7.0.6 and below, 6.4.9 and below may allow an unauthenticated attacker to perform a man in the middle attack.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosFortinet FortiOS
CVE-2015-3613
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.28% / 84.02%
||
7 Day CHG~0.00%
Published-04 Feb, 2020 | 19:28
Updated-06 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in in FortiManager 5.2.1 and earlier and 5.0.10 and earlier in the WebUI FTP backup page

Action-Not Available
Vendor-n/aFortinet, Inc.
Product-fortimanagern/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2022-29060
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-8.1||HIGH
EPSS-0.48% / 64.09%
||
7 Day CHG~0.00%
Published-18 Jul, 2022 | 16:35
Updated-25 Oct, 2024 | 13:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use of hard-coded cryptographic key vulnerability [CWE-321] in FortiDDoS API 5.5.0 through 5.5.1, 5.4.0 through 5.4.2, 5.3.0 through 5.3.1, 5.2.0, 5.1.0 may allow an attacker who managed to retrieve the key from one device to sign JWT tokens for any device.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiddosFortinet FortiDDoS
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2021-36166
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.47% / 63.80%
||
7 Day CHG~0.00%
Published-01 Mar, 2022 | 18:10
Updated-25 Oct, 2024 | 13:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper authentication vulnerability in FortiMail before 7.0.1 may allow a remote attacker to efficiently guess one administrative account's authentication token by means of the observation of certain system's properties.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortimailFortinet FortiMail
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2025-25256
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-18.91% / 95.07%
||
7 Day CHG+2.45%
Published-12 Aug, 2025 | 18:59
Updated-16 Aug, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisiemFortiSIEM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-25257
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-47.71% / 97.62%
||
7 Day CHG+1.92%
Published-17 Jul, 2025 | 15:10
Updated-30 Jul, 2025 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-08-08||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and below 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwebFortiWebFortiWeb
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-24472
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-8.1||HIGH
EPSS-5.53% / 89.88%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 16:50
Updated-08 Aug, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-04-08||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote unauthenticated attacker with prior knowledge of upstream and downstream devices serial numbers to gain super-admin privileges on the downstream device, if the Security Fabric is enabled, via crafted CSF proxy requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosfortiproxyFortiProxyFortiOSFortiOS and FortiProxy
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2024-21762
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-92.35% / 99.72%
||
7 Day CHG+0.05%
Published-09 Feb, 2024 | 08:14
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-02-16||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyfortiosFortiOSFortiProxyfortiproxyfortiosFortiOS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-13379
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.1||CRITICAL
EPSS-94.47% / 100.00%
||
7 Day CHG~0.00%
Published-04 Jun, 2019 | 20:18
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-03||Apply updates per vendor instructions.

An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyfortiosFortinet FortiOS, FortiProxyFortiOS
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-48788
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.3||CRITICAL
EPSS-94.18% / 99.91%
||
7 Day CHG~0.00%
Published-12 Mar, 2024 | 15:09
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-04-15||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlient_enterprise_management_serverFortiClientEMSforticlient_enterprise_management_serverFortiClient EMS
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2020-29015
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.50% / 80.42%
||
7 Day CHG~0.00%
Published-14 Jan, 2021 | 16:07
Updated-25 Oct, 2024 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A blind SQL injection in the user interface of FortiWeb 6.3.0 through 6.3.7 and version before 6.2.4 may allow an unauthenticated, remote attacker to execute arbitrary SQL queries or commands by sending a request with a crafted Authorization header containing a malicious SQL statement.

Action-Not Available
Vendor-n/aFortinet, Inc.
Product-fortiwebFortinet FortiWeb
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-22252
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9||CRITICAL
EPSS-0.10% / 28.97%
||
7 Day CHG~0.00%
Published-28 May, 2025 | 07:55
Updated-29 May, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.

Action-Not Available
Vendor-Fortinet, Inc.
Product-FortiProxyFortiSwitchManagerFortiOS
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-25610
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.3||CRITICAL
EPSS-18.37% / 94.97%
||
7 Day CHG~0.00%
Published-24 Mar, 2025 | 15:39
Updated-24 Mar, 2025 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer underwrite ('buffer underflow') vulnerability in the administrative interface of Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.6, version 6.4.0 through 6.4.11 and version 6.2.12 and below, FortiProxy version 7.2.0 through 7.2.2, version 7.0.0 through 7.0.8, version 2.0.12 and below and FortiOS-6K7K version 7.0.5, version 6.4.0 through 6.4.10 and version 6.2.0 through 6.2.10 and below allows a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-FortiOS-6K7KFortiAnalyzerFortiProxyFortiWebFortiOSFortiSwitchManagerFortiManager
CWE ID-CWE-124
Buffer Underwrite ('Buffer Underflow')
CVE-2020-12812
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-45.38% / 97.52%
||
7 Day CHG~0.00%
Published-24 Jul, 2020 | 22:28
Updated-30 Jul, 2025 | 01:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-03||Apply updates per vendor instructions.

An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username.

Action-Not Available
Vendor-n/aFortinet, Inc.
Product-fortiosFortinet FortiOSFortiOS
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-178
Improper Handling of Case Sensitivity
CVE-2023-33299
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-9.99% / 92.75%
||
7 Day CHG~0.00%
Published-23 Jun, 2023 | 07:46
Updated-23 Oct, 2024 | 14:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A deserialization of untrusted data in Fortinet FortiNAC below 7.2.1, below 9.4.3, below 9.2.8 and all earlier versions of 8.x allows attacker to execute unauthorized code or commands via specifically crafted request on inter-server communication port. Note FortiNAC versions 8.x will not be fixed.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortinacFortiNAC
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2019-6698
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.00% / 76.07%
||
7 Day CHG~0.00%
Published-23 Aug, 2019 | 19:58
Updated-25 Oct, 2024 | 14:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Hard-coded Credentials vulnerability in FortiRecorder all versions below 2.7.4 may allow an unauthenticated attacker with knowledge of the aforementioned credentials and network access to FortiCameras to take control of those, provided they are managed by a FortiRecorder device.

Action-Not Available
Vendor-n/aFortinet, Inc.
Product-fortirecorder_200dfortirecorder_firmwarefortirecorder_100dfortirecorder_400dFortinet FortiRecorder
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-37936
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-0.28% / 50.63%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 14:09
Updated-31 Jan, 2025 | 17:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use of hard-coded cryptographic key in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via crafted requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiswitchFortiSwitch
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-36547
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-1.41% / 79.69%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 16:51
Updated-19 Sep, 2024 | 20:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwlmFortiWLMfortiwlm
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-36548
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-1.41% / 79.69%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 16:51
Updated-19 Sep, 2024 | 14:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwlmFortiWLM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-34991
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.3||CRITICAL
EPSS-8.02% / 91.74%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:07
Updated-22 Oct, 2024 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.0 through 8.4.2 and 8.3.0 through 8.3.2 and 8.2.2 allows attacker to execute unauthorized code or commands via a crafted http request.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwlmFortiWLM
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2023-34993
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-87.31% / 99.41%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 16:51
Updated-19 Sep, 2024 | 19:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwlmFortiWLMfortiwlm
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-34990
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-28.79% / 96.37%
||
7 Day CHG~0.00%
Published-18 Dec, 2024 | 12:44
Updated-05 Jun, 2025 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwlmFortiWLM
CWE ID-CWE-23
Relative Path Traversal
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-34992
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-77.87% / 98.96%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 16:50
Updated-02 Aug, 2024 | 16:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisiemFortiSIEMfortisiem
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-33303
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-7.7||HIGH
EPSS-0.08% / 24.78%
||
7 Day CHG~0.00%
Published-13 Oct, 2023 | 14:32
Updated-22 Oct, 2024 | 20:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A insufficient session expiration in Fortinet FortiEDR version 5.0.0 through 5.0.1 allows attacker to execute unauthorized code or commands via api request

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiedrFortiEDR
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2023-26204
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-3.6||LOW
EPSS-0.20% / 42.57%
||
7 Day CHG~0.00%
Published-13 Jun, 2023 | 08:41
Updated-22 Oct, 2024 | 20:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A plaintext storage of a password vulnerability [CWE-256] in FortiSIEM 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions may allow an attacker able to access user DB content to impersonate any admin user on the device GUI.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisiemFortiSIEM
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2022-38381
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 2.79%
||
7 Day CHG~0.00%
Published-02 Nov, 2022 | 00:00
Updated-25 Oct, 2024 | 13:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper handling of malformed request vulnerability [CWE-228] exists in FortiADC 5.0 all versions, 6.0.0 all versions, 6.1.0 all versions, 6.2.0 through 6.2.3, and 7.0.0 through 7.0.2. This may allow a remote attacker without privileges to bypass some Web Application Firewall (WAF) protection such as the SQL Injection and XSS filters via a malformed HTTP request.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiadcFortinet FortiADC
CVE-2021-42756
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.3||CRITICAL
EPSS-82.16% / 99.17%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 18:05
Updated-23 Oct, 2024 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the proxy daemon of FortiWeb 5.x all versions, 6.0.7 and below, 6.1.2 and below, 6.2.6 and below, 6.3.16 and below, 6.4 all versions may allow an unauthenticated remote attacker to achieve arbitrary code execution via specifically crafted HTTP requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwebFortiWeb
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-50563
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.22% / 44.83%
||
7 Day CHG+0.03%
Published-16 Jan, 2025 | 09:16
Updated-03 Feb, 2025 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A weak authentication in Fortinet FortiManager Cloud, FortiAnalyzer versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyfortiosfortianalyzerfortimanager_cloudfortimanagerfortianalyzer_cloudFortiManagerFortiAnalyzer
CWE ID-CWE-1390
Weak Authentication
CVE-2024-48887
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.10% / 27.55%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 16:52
Updated-23 Jul, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiswitchFortiSwitch
CWE ID-CWE-620
Unverified Password Change
CVE-2024-47575
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-90.64% / 99.60%
||
7 Day CHG-0.23%
Published-23 Oct, 2024 | 15:03
Updated-30 Jul, 2025 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-11-13||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortimanager_cloudfortimanagerFortiManagerFortiManager
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-26114
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.92% / 82.61%
||
7 Day CHG~0.00%
Published-06 Apr, 2022 | 09:15
Updated-25 Oct, 2024 | 13:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiWAN before 4.5.9 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwanFortinet FortiWAN
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2021-24007
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.71% / 71.25%
||
7 Day CHG~0.00%
Published-09 Jul, 2021 | 18:37
Updated-25 Oct, 2024 | 13:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple improper neutralization of special elements of SQL commands vulnerabilities in FortiMail before 6.4.4 may allow a non-authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortimailFortinet FortiMail
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2020-9292
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.50% / 65.10%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 12:41
Updated-25 Oct, 2024 | 14:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unquoted service path vulnerability in the FortiSIEM Windows Agent component may allow an attacker to gain elevated privileges via the AoWinAgt executable service path.

Action-Not Available
Vendor-n/aFortinet, Inc.
Product-fortisiem_windows_agentFortinet FortiSIEMWindowsAgent
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2020-6644
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-8.1||HIGH
EPSS-0.41% / 60.36%
||
7 Day CHG~0.00%
Published-22 Jun, 2020 | 15:23
Updated-25 Oct, 2024 | 14:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insufficient session expiration vulnerability in FortiDeceptor 3.0.0 and below allows an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID via other, hypothetical attacks.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortideceptorFortinet FortiDeceptor
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2023-41675
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.40% / 59.97%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 16:49
Updated-18 Sep, 2024 | 20:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyfortiosFortiOSFortiProxyfortiosfortiproxy
CWE ID-CWE-416
Use After Free
CVE-2024-5688
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-8.1||HIGH
EPSS-1.25% / 78.52%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 12:40
Updated-04 Apr, 2025 | 23:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

Action-Not Available
Vendor-Mozilla Corporation
Product-thunderbirdfirefoxFirefoxFirefox ESRThunderbirdfirefox_esrfirefoxthunderbird
CWE ID-CWE-416
Use After Free
CVE-2024-57959
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 6.94%
||
7 Day CHG~0.00%
Published-06 Feb, 2025 | 12:31
Updated-17 Mar, 2025 | 14:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-After-Free (UAF) vulnerability in the display module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosemuiEMUIHarmonyOS
CWE ID-CWE-416
Use After Free
CVE-2013-5613
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.06% / 93.17%
||
7 Day CHG~0.00%
Published-11 Dec, 2013 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.

Action-Not Available
Vendor-n/aMozilla CorporationopenSUSESUSERed Hat, Inc.Fedora ProjectCanonical Ltd.
Product-enterprise_linux_serverenterprise_linux_eusfirefoxenterprise_linux_server_eusthunderbirdsuse_linux_enterprise_desktopenterprise_linux_server_ausfedoraseamonkeyfirefox_esropensuseenterprise_linux_desktopubuntu_linuxsuse_linux_enterprise_serverenterprise_linux_server_tusenterprise_linux_workstationsuse_linux_enterprise_software_development_kitn/a
CWE ID-CWE-416
Use After Free
CVE-2021-45701
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.54% / 66.51%
||
7 Day CHG~0.00%
Published-26 Dec, 2021 | 21:49
Updated-04 Aug, 2024 | 04:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A patch operation may result in a use-after-free.

Action-Not Available
Vendor-n/aThe Linux Foundation
Product-tremor-scriptn/a
CWE ID-CWE-416
Use After Free
CVE-2022-1212
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-9.3||CRITICAL
EPSS-0.32% / 53.96%
||
7 Day CHG~0.00%
Published-05 Apr, 2022 | 03:45
Updated-02 Aug, 2024 | 23:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use-After-Free in str_escape in mruby/mruby in mruby/mruby

Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.

Action-Not Available
Vendor-mrubymruby
Product-mrubymruby/mruby
CWE ID-CWE-416
Use After Free
CVE-2019-5066
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-0.62% / 69.06%
||
7 Day CHG~0.00%
Published-18 Sep, 2019 | 20:16
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable use-after-free vulnerability exists in the way LZW-compressed streams are processed in Aspose.PDF 19.2 for C++. A specially crafted PDF can cause a dangling heap pointer, resulting in a use-after-free condition. To trigger this vulnerability, a specifically crafted PDF document needs to be processed by the target application.

Action-Not Available
Vendor-asposeTalos (Cisco Systems, Inc.)
Product-aspose.pdf_for_c\+\+Aspose
CWE ID-CWE-416
Use After Free
CVE-2024-49132
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.1||HIGH
EPSS-0.36% / 57.49%
||
7 Day CHG+0.09%
Published-10 Dec, 2024 | 17:49
Updated-13 May, 2025 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Remote Desktop Services Remote Code Execution Vulnerability

Windows Remote Desktop Services Remote Code Execution Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_23h2windows_10_1809windows_11_22h2windows_server_2025windows_11_24h2windows_10_21h2windows_10_22h2windows_server_2022windows_server_2022_23h2windows_server_2019Windows 10 Version 22H2Windows Server 2019Windows 10 Version 1809Windows 11 version 22H3Windows 11 Version 23H2Windows Server 2025 (Server Core installation)Windows 11 Version 24H2Windows Server 2025Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2022Windows 11 version 22H2
CWE ID-CWE-416
Use After Free
CWE ID-CWE-591
Sensitive Data Storage in Improperly Locked Memory
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 9
  • 10
  • Next
Details not found