Vulnerabilities > Fortinet > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-07-22 | CVE-2017-7336 | Use of Hard-coded Credentials vulnerability in Fortinet Fortiwlm A hard-coded account named 'upgrade' in Fortinet FortiWLM 8.3.0 and lower versions allows a remote attacker to log-in and execute commands with 'upgrade' account privileges. | 7.5 |
2016-01-08 | CVE-2015-7362 | Permissions, Privileges, and Access Controls vulnerability in Fortinet Forticlient Fortinet FortiClient Linux SSLVPN before build 2313, when installed on Linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program. | 7.2 |
2015-09-03 | CVE-2015-5737 | Permissions, Privileges, and Access Controls vulnerability in Fortinet Forticlient The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, (4) mdare64_52.sys, and (5) Fortishield.sys drivers in Fortinet FortiClient before 5.2.4 do not properly restrict access to the API for management of processes and the Windows registry, which allows local users to obtain a privileged handle to a PID and possibly have unspecified other impact, as demonstrated by a 0x2220c8 ioctl call. | 7.2 |
2015-09-03 | CVE-2015-5736 | Permissions, Privileges, and Access Controls vulnerability in Fortinet Forticlient The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call. | 7.2 |
2015-09-03 | CVE-2015-5735 | Permissions, Privileges, and Access Controls vulnerability in Fortinet Forticlient The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient before 5.2.4 allow local users to write to arbitrary memory locations via a 0x226108 ioctl call. | 7.2 |
2015-03-19 | CVE-2015-2281 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Fortinet Single Sign ON 4.3 Stack-based buffer overflow in collectoragent.exe in Fortinet Single Sign On (FSSO) before build 164 allows remote attackers to execute arbitrary code via a large PROCESS_HELLO message to the Message Dispatcher on TCP port 8000. | 7.5 |
2015-02-03 | CVE-2015-1455 | Credentials Management vulnerability in Fortinet Fortiauthenticator 3.0.0 Fortinet FortiAuthenticator 3.0.0 has a password of (1) slony for the slony PostgreSQL user and (2) www-data for the www-data PostgreSQL user, which makes it easier for remote attackers to obtain access via unspecified vectors. | 7.5 |
2015-02-02 | CVE-2015-1452 | Code vulnerability in Fortinet Fortios 5.0.7 The Control and Provisioning of Wireless Access Points (CAPWAP) daemon in Fortinet FortiOS 5.0 Patch 7 build 4457 allows remote attackers to cause a denial of service (locked CAPWAP Access Controller) via a large number of ClientHello DTLS messages. | 7.8 |
2014-08-25 | CVE-2014-2216 | Denial of Service vulnerability in Fortinet FortiOS The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.0.0 before 5.0.8 on FortiGate devices allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted request. | 7.5 |
2009-09-04 | CVE-2008-7161 | Permissions, Privileges, and Access Controls vulnerability in Fortinet Fortigate-1000 3.00 Fortinet FortiGuard Fortinet FortiGate-1000 3.00 build 040075,070111 allows remote attackers to bypass URL filtering via fragmented GET or POST requests that use HTTP/1.0 without the Host header. | 7.5 |