Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-39811

Summary
Assigner-fortinet
Assigner Org ID-6abe59d8-c742-4dff-8ce8-9b0ca1073da8
Published At-14 Apr, 2026 | 15:38
Updated At-14 Apr, 2026 | 16:46
Rejected At-
Credits

A integer overflow or wraparound vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow attacker to denial of service via <insert attack vector here>

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:fortinet
Assigner Org ID:6abe59d8-c742-4dff-8ce8-9b0ca1073da8
Published At:14 Apr, 2026 | 15:38
Updated At:14 Apr, 2026 | 16:46
Rejected At:
â–¼CVE Numbering Authority (CNA)

A integer overflow or wraparound vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow attacker to denial of service via <insert attack vector here>

Affected Products
Vendor
Fortinet, Inc.Fortinet
Product
FortiWeb
CPEs
  • cpe:2.3:a:fortinet:fortiweb:8.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:8.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:8.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:8.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.0:*:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • From 8.0.0 through 8.0.3 (semver)
  • From 7.6.0 through 7.6.6 (semver)
  • From 7.4.0 through 7.4.12 (semver)
  • From 7.2.0 through 7.2.12 (semver)
  • From 7.0.0 through 7.0.12 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-190Denial of service
Type: CWE
CWE ID: CWE-190
Description: Denial of service
Metrics
VersionBase scoreBase severityVector
3.14.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Upgrade to FortiWeb version 8.0.4 or above Upgrade to FortiWeb version 7.6.7 or above

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://fortiguard.fortinet.com/psirt/FG-IR-26-108
N/A
Hyperlink: https://fortiguard.fortinet.com/psirt/FG-IR-26-108
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@fortinet.com
Published At:14 Apr, 2026 | 16:16
Updated At:21 Apr, 2026 | 17:16

A integer overflow or wraparound vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow attacker to denial of service via <insert attack vector here>

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.9MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 4.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Fortinet, Inc.
fortinet
>>fortiweb>>Versions from 7.0.0(inclusive) to 7.0.13(inclusive)
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortiweb>>Versions from 7.2.0(inclusive) to 7.2.13(inclusive)
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortiweb>>Versions from 7.4.0(inclusive) to 7.4.12(inclusive)
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortiweb>>Versions from 7.6.0(inclusive) to 7.6.7(exclusive)
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortiweb>>Versions from 8.0.0(inclusive) to 8.0.4(exclusive)
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-190Primarypsirt@fortinet.com
CWE ID: CWE-190
Type: Primary
Source: psirt@fortinet.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://fortiguard.fortinet.com/psirt/FG-IR-26-108psirt@fortinet.com
Vendor Advisory
Hyperlink: https://fortiguard.fortinet.com/psirt/FG-IR-26-108
Source: psirt@fortinet.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

12Records found

CVE-2023-33305
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.22% / 44.34%
||
7 Day CHG~0.00%
Published-13 Jun, 2023 | 08:41
Updated-22 Oct, 2024 | 20:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A loop with unreachable exit condition ('infinite loop') in Fortinet FortiOS version 7.2.0 through 7.2.4, FortiOS version 7.0.0 through 7.0.10, FortiOS 6.4 all versions, FortiOS 6.2 all versions, FortiOS 6.0 all versions, FortiProxy version 7.2.0 through 7.2.3, FortiProxy version 7.0.0 through 7.0.9, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1 all versions, FortiProxy 1.0 all versions, FortiWeb version 7.2.0 through 7.2.1, FortiWeb version 7.0.0 through 7.0.6, FortiWeb 6.4 all versions, FortiWeb 6.3 all versions allows attacker to perform a denial of service via specially crafted HTTP requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwebfortiproxyfortiosFortiOSFortiProxyFortiWeb
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2021-22130
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.62% / 70.10%
||
7 Day CHG~0.00%
Published-03 Jun, 2021 | 10:27
Updated-25 Oct, 2024 | 13:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability in FortiProxy physical appliance CLI 2.0.0 to 2.0.1, 1.2.0 to 1.2.9, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 may allow an authenticated, remote attacker to perform a Denial of Service attack by running the `diagnose sys cpuset` with a large cpuset mask value. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyFortinet FortiProxy
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-58903
Matching Score-8
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-8
Assigner-Fortinet, Inc.
CVSS Score-2.5||LOW
EPSS-0.07% / 20.47%
||
7 Day CHG+0.01%
Published-14 Oct, 2025 | 15:22
Updated-14 Jan, 2026 | 09:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Unchecked Return Value vulnerability [CWE-252] in Fortinet FortiOS version 7.6.0 through 7.6.3 and before 7.4.8 API allows an authenticated user to cause a Null Pointer Dereference, crashing the http daemon via a specialy crafted request.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosFortiOS
CWE ID-CWE-252
Unchecked Return Value
CVE-2025-47294
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.28% / 51.77%
||
7 Day CHG~0.00%
Published-28 May, 2025 | 07:55
Updated-04 Jun, 2025 | 15:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the csfd daemon via a specially crafted request.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosFortiOS
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-46669
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-3.2||LOW
EPSS-0.25% / 48.64%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 14:08
Updated-14 Jan, 2026 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Integer Overflow or Wraparound vulnerability [CWE-190] in version 7.4.4 and below, version 7.2.10 and below; FortiSASE version 23.4.b FortiOS tenant IPsec IKE service may allow an authenticated attacker to crash the IPsec tunnel via crafted requests, resulting in potential denial of service.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosFortiOS
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-25248
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.08% / 23.72%
||
7 Day CHG+0.01%
Published-12 Aug, 2025 | 18:59
Updated-14 Aug, 2025 | 01:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Integer Overflow or Wraparound vulnerability [CWE-190] in FortiOS version 7.6.2 and below, version 7.4.7 and below, version 7.2.10 and below, 7.2 all versions, 6.4 all versions, FortiProxy version 7.6.2 and below, version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions and FortiPAM version 1.5.0, version 1.4.2 and below, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions SSL-VPN RDP and VNC bookmarks may allow an authenticated user to affect the device SSL-VPN availability via crafted requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosfortiproxyfortipamFortiProxyFortiOSFortiPAM
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-42755
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.10% / 27.41%
||
7 Day CHG~0.00%
Published-18 Jul, 2022 | 16:35
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below dhcpd daemon may allow an unauthenticated and network adjacent attacker to crash the dhcpd deamon, resulting in potential denial of service.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortivoicefortirecorder_firmwarefortiswitchfortiproxyfortiosFortinet FortiSwitch, FortiRecorder, FortiVoiceEnterprise, FortiOS, FortiProxy
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-26109
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-8.1||HIGH
EPSS-1.26% / 79.52%
||
7 Day CHG~0.00%
Published-08 Dec, 2021 | 12:22
Updated-25 Oct, 2024 | 13:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow or wraparound vulnerability in the memory allocator of SSLVPN in FortiOS before 7.0.1 may allow an unauthenticated attacker to corrupt control data on the heap via specifically crafted requests to SSLVPN, resulting in potentially arbitrary code execution.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosFortinet FortiOS
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-53880
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.07% / 21.79%
||
7 Day CHG~0.00%
Published-12 Feb, 2025 | 00:39
Updated-22 Sep, 2025 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Triton Inference Server contains a vulnerability in the model loading API, where a user could cause an integer overflow or wraparound error by loading a model with an extra-large file size that overflows an internal variable. A successful exploit of this vulnerability might lead to denial of service.

Action-Not Available
Vendor-Linux Kernel Organization, IncMicrosoft CorporationNVIDIA Corporation
Product-linux_kerneltriton_inference_serverwindowsTriton Inference Server
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2022-1926
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.6||HIGH
EPSS-0.41% / 61.58%
||
7 Day CHG~0.00%
Published-31 May, 2022 | 08:30
Updated-03 Aug, 2024 | 00:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in polonel/trudesk

Integer Overflow or Wraparound in GitHub repository polonel/trudesk prior to 1.2.3.

Action-Not Available
Vendor-trudesk_projectpolonel
Product-trudeskpolonel/trudesk
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-33611
Matching Score-4
Assigner-Open-Xchange
ShareView Details
Matching Score-4
Assigner-Open-Xchange
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 0.27%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 14:01
Updated-12 May, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient validation of HTTPS and SVCB records

An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend.

Action-Not Available
Vendor-powerdnsPowerDNS
Product-authoritativeAuthoritative
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2019-12693
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.36% / 58.13%
||
7 Day CHG~0.00%
Published-02 Oct, 2019 | 19:06
Updated-21 Nov, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software Secure Copy Denial of Service Vulnerability

A vulnerability in the Secure Copy (SCP) feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to the use of an incorrect data type for a length variable. An attacker could exploit this vulnerability by initiating the transfer of a large file to an affected device via SCP. To exploit this vulnerability, the attacker would need to have valid privilege level 15 credentials on the affected device. A successful exploit could allow the attacker to cause the length variable to roll over, which could cause the affected device to crash.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asa_5550adaptive_security_applianceasa_5505adaptive_security_appliance_softwareasa_5555-xasa_5520asa_5510asa_5525-xasa_5580asa_5585-xasa_5512-xasa_5515-xCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CWE ID-CWE-190
Integer Overflow or Wraparound
Details not found