5 results (0.005 seconds)

CVSS: 5.9EPSS: 0%CPEs: 15EXPL: 0

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiDDoS version 5.5.0 through 5.5.1, 5.4.2 through 5.4.0, 5.3.0 through 5.3.1, 5.2.0, 5.1.0, 5.0.0, 4.7.0, 4.6.0 and 4.5.0 and FortiDDoS-F version 6.3.0 through 6.3.1, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 allows an authenticated attacker to execute shell code as `root` via `execute` CLI commands. • https://fortiguard.com/psirt/FG-IR-22-047 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.1EPSS: 0%CPEs: 5EXPL: 0

A permissive cross-domain policy with untrusted domains vulnerability in Fortinet FortiADC 7.1.0 - 7.1.1, FortiDDoS-F 6.3.0 - 6.3.4 and 6.4.0 - 6.4.1 allow an unauthorized attacker to carry out privileged actions and retrieve sensitive information via crafted web requests. Una política permisiva entre dominios con vulnerabilidad de dominios que no son de confianza en Fortinet FortiADC 7.1.0 - 7.1.1, FortiDDoS-F 6.3.0 - 6.3.4 y 6.4.0 - 6.4.1 permite a un atacante no autorizado realizar acciones privilegiadas y recuperar información confidencial a través de solicitudes web manipuladas. • https://fortiguard.com/psirt/FG-IR-22-518 • CWE-942: Permissive Cross-domain Policy with Untrusted Domains •

CVSS: 6.7EPSS: 0%CPEs: 14EXPL: 0

Multiple buffer copy without checking size of input ('classic buffer overflow') vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests. Las vulnerabilidades de copia de búfer múltiple sin verificar el tamaño de entrada ('desbordamiento del búfer clásico') [CWE-120] en FortiADC versión 7.2.0 y anteriores a 7.1.2 y FortiDDoS-F versión 6.5.0 y anteriores a 6.4.1 permiten a un atacante privilegiado ejecutar código o comandos arbitrarios a través de solicitudes CLI específicamente manipuladas. • https://fortiguard.com/psirt/FG-IR-23-064 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in FortiADC 5.x all versions, 6.0 all versions, 6.1 all versions, 6.2.0 through 6.2.4, 7.0.0 through 7.0.3, 7.1.0; FortiDDoS 4.x all versions, 5.0 all versions, 5.1 all versions, 5.2 all versions, 5.3 all versions, 5.4 all versions, 5.5 all versions, 5.6 all versions and FortiDDoS-F 6.4.0, 6.3.0 through 6.3.3, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands. • https://fortiguard.com/psirt/FG-IR-22-335 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.1EPSS: 0%CPEs: 9EXPL: 0

A use of hard-coded cryptographic key vulnerability [CWE-321] in FortiDDoS API 5.5.0 through 5.5.1, 5.4.0 through 5.4.2, 5.3.0 through 5.3.1, 5.2.0, 5.1.0 may allow an attacker who managed to retrieve the key from one device to sign JWT tokens for any device. Una vulnerabilidad en el uso de claves criptográficas embebidas [CWE-321] en la API de FortiDDoS versiones 5.5.0 hasta 5.5.1, 5.4.0 hasta 5.4.2, 5.3.0 hasta 5.3.1, 5.2.0, 5.1.0, puede permitir a un atacante que consiga recuperar la clave de un dispositivo firmar tokens JWT para cualquier dispositivo. • https://fortiguard.com/psirt/FG-IR-22-071 • CWE-798: Use of Hard-coded Credentials •