
CVE-2015-1452
https://notcve.org/view.php?id=CVE-2015-1452
02 Feb 2015 — The Control and Provisioning of Wireless Access Points (CAPWAP) daemon in Fortinet FortiOS 5.0 Patch 7 build 4457 allows remote attackers to cause a denial of service (locked CAPWAP Access Controller) via a large number of ClientHello DTLS messages. El demonio Control and Provisioning of Wireless Access Points (CAPWAP) en Fortinet FortiOS 5.0 Parche 7 build 4457 permite a atacantes remotos causar una denegación de servicio (el controlador de acceso a CAPWAP bloqueado) a través de un número grande de mensaje... • http://seclists.org/fulldisclosure/2015/Jan/125 • CWE-17: DEPRECATED: Code •

CVE-2015-1451
https://notcve.org/view.php?id=CVE-2015-1451
02 Feb 2015 — Multiple cross-site scripting (XSS) vulnerabilities in Fortinet FortiOS 5.0 Patch 7 build 4457 allow remote authenticated users to inject arbitrary web script or HTML via the (1) WTP Name or (2) WTP Active Software Version field in a CAPWAP Join request. Múltiples vulnerabilidades de XSS en Fortinet FortiOS 5.0 Parche 7 build 4457 permiten a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a través del campo (1) WTP Name o (2) WTP Active Software Version en una solicitud ... • http://seclists.org/fulldisclosure/2015/Jan/125 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2014-0351
https://notcve.org/view.php?id=CVE-2014-0351
10 Sep 2014 — The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.x before 5.0.8 on FortiGate devices does not prevent use of anonymous ciphersuites, which makes it easier for man-in-the-middle attackers to obtain sensitive information or interfere with communications by modifying the client-server data stream. El servicio de protocolo FortiManager en Fortinet FortiOS anterior a 4.3.16 y 5.x anterior a 5.0.8 en los dispositivos FortiGate devices no previene el uso de los suites de cifrado anónimos, ... • http://www.fortiguard.com/advisory/FG-IR-14-006 • CWE-310: Cryptographic Issues •

CVE-2014-2216
https://notcve.org/view.php?id=CVE-2014-2216
25 Aug 2014 — The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.0.0 before 5.0.8 on FortiGate devices allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted request. El servicio de protocolo FortiManager en Fortinet FortiOS anterior a 4.3.16 y 5.0.0 anterior a 5.0.8 en los dispositivos FortiGate permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario a través de una solicitud manipulada. • http://secunia.com/advisories/60724 •

CVE-2013-7182 – FortiOS 5.0.5 Cross Site Scripting
https://notcve.org/view.php?id=CVE-2013-7182
04 Feb 2014 — Cross-site scripting (XSS) vulnerability in firewall/schedule/recurrdlg in Fortinet FortiOS 5.0.5 allows remote attackers to inject arbitrary web script or HTML via the mkey parameter. Vulnerabilidad de XSS en firewall/schedule/recurrdlg en Fortinet FortiOS 5.0.5 permite a atacantes remotos inyectar script Web o HTML arbitrario a través del parámetro mkey. FortiOS version 5.0.5 suffers from a reflective cross site scripting vulnerability. • https://packetstorm.news/files/id/125050 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2013-1414 – Fortigate Firewalls - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2013-1414
28 Jun 2013 — Multiple cross-site request forgery (CSRF) vulnerabilities in Fortinet FortiOS on FortiGate firewall devices before 4.3.13 and 5.x before 5.0.2 allow remote attackers to hijack the authentication of administrators for requests that modify (1) settings or (2) policies, or (3) restart the device via a rebootme action to system/maintenance/shutdown. Múltiples vulnerabilidades de falsificación de peticiones en sitios cruzados (CSRF) en Fortinet FortiOS en el dispositivo firewall FortiGate anteriores a v4.3.13 y... • https://packetstorm.news/files/id/122216 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2013-4604
https://notcve.org/view.php?id=CVE-2013-4604
25 Jun 2013 — Fortinet FortiOS before 5.0.3 on FortiGate devices does not properly restrict Guest capabilities, which allows remote authenticated users to read, modify, or delete the records of arbitrary users by leveraging the Guest role. Fortinet FortiOS antes de v5.0.3 para dispositivos FortiGate no restringe correctamente las capacidades del invitado, lo que permite a usuarios remotamente leer, modificar o borrar registros o usuarios aprovechando el rol de invitado. • http://www.fortiguard.com/advisory/FGA-2013-20 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2006-3222
https://notcve.org/view.php?id=CVE-2006-3222
24 Jun 2006 — The FTP proxy module in Fortinet FortiOS (FortiGate) before 2.80 MR12 and 3.0 MR2 allows remote attackers to bypass anti-virus scanning via the Enhanced Passive (EPSV) FTP mode. El módulo proxy FTP Fortinet FortiOS (FortiGate) anterior v2.80 MR12 y v3.0 MR2 permite a atacantes remotos superar el escaneo del anti-virus a través del modo Enhanced Passive (EPSV) FTP. • http://attrition.org/pipermail/vim/2006-July/000921.html •

CVE-2005-3057
https://notcve.org/view.php?id=CVE-2005-3057
31 Dec 2005 — The FTP component in FortiGate 2.8 running FortiOS 2.8MR10 and v3beta, and other versions before 3.0 MR1, allows remote attackers to bypass the Fortinet FTP anti-virus engine by sending a STOR command and uploading a file before the FTP server response has been sent, as demonstrated using LFTP. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042139.html •

CVE-2005-3058 – Fortinet Fortigate 2.x/3.0 - URL Filtering Bypass
https://notcve.org/view.php?id=CVE-2005-3058
31 Dec 2005 — Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616. • https://www.exploit-db.com/exploits/27203 • CWE-264: Permissions, Privileges, and Access Controls •