Lucene search

K
FortinetFortiwlc

11 matches found

CVE
CVE
added 2025/01/22 10:15 a.m.64 views

CVE-2022-23439

A externally controlled reference to a resource in another sphere in Fortinet FortiManager before version 7.4.3, FortiMail before version 7.0.3, FortiAnalyzer before version 7.4.3, FortiVoice version 7.0.0, 7.0.1 and before 6.4.8, FortiProxy before version 7.0.4, FortiRecorder version 6.4.0 through...

6.1CVSS4.9AI score0.00062EPSS
CVE
CVE
added 2024/12/19 8:15 a.m.55 views

CVE-2021-26093

An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command.

7.3CVSS7AI score0.00029EPSS
CVE
CVE
added 2017/10/26 1:29 p.m.54 views

CVE-2017-7341

An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10, 8.0 through 8.2, and 8.3.0 through 8.3.2 file management AP script download webUI page allows an authenticated admin user to execute arbitrary system console commands via crafted HTTP requests.

9CVSS7.4AI score0.02526EPSS
CVE
CVE
added 2020/06/22 4:15 p.m.48 views

CVE-2020-9288

An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the ESS profile or the Radius Profile.

5.4CVSS5AI score0.00203EPSS
CVE
CVE
added 2018/05/08 4:29 a.m.43 views

CVE-2017-17540

The presence of a hardcoded account in Fortinet FortiWLC 8.3.3 allows attackers to gain unauthorized read/write access via a remote shell.

10CVSS9.3AI score0.00421EPSS
CVE
CVE
added 2017/10/26 1:29 p.m.40 views

CVE-2017-7335

A Cross-Site Scripting (XSS) vulnerability in Fortinet FortiWLC 6.1-x (6.1-2, 6.1-4 and 6.1-5); 7.0-x (7.0-7, 7.0-8, 7.0-9, 7.0-10); and 8.x (8.0, 8.1, 8.2 and 8.3.0-8.3.2) allows an authenticated user to inject arbitrary web script or HTML via non-sanitized parameters "refresh" and "branchtotable"...

5.4CVSS5.1AI score0.00253EPSS
CVE
CVE
added 2017/02/01 5:59 p.m.39 views

CVE-2016-8491

The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.

9.4CVSS9.1AI score0.00272EPSS
CVE
CVE
added 2018/05/08 4:29 a.m.38 views

CVE-2017-17539

The presence of a hardcoded account in Fortinet FortiWLC 7.0.11 and earlier allows attackers to gain unauthorized read/write access via a remote shell.

10CVSS9.4AI score0.00421EPSS
CVE
CVE
added 2016/10/05 4:59 p.m.34 views

CVE-2016-7560

The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors.

10CVSS9.2AI score0.02563EPSS
CVE
CVE
added 2016/10/05 4:59 p.m.33 views

CVE-2016-7561

Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file.

7.2CVSS6.8AI score0.00312EPSS
CVE
CVE
added 2021/12/08 11:15 a.m.31 views

CVE-2021-42758

An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenticated and remote attacker with low privileges to execute any command as an admin user with full access rights via bypassing the GUI restrictions.

9CVSS8.8AI score0.00484EPSS