Latest CVE Feed
-
7.5
HIGHCVE-2021-26117
The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used... Read more
- EPSS Score: %15.22
- Published: Jan. 27, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-26116
An improper neutralization of special elements used in an OS command vulnerability in the command line interpreter of FortiAuthenticator before 6.3.1 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments t... Read more
Affected Products : fortiauthenticator- EPSS Score: %0.33
- Published: Apr. 06, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-26114
Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiWAN before 4.5.9 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.... Read more
Affected Products : fortiwan- EPSS Score: %1.92
- Published: Apr. 06, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-26113
A use of a one-way hash with a predictable salt vulnerability [CWE-760] in FortiWAN before 4.5.9 may allow an attacker who has previously come in possession of the password file to potentially guess passwords therein stored.... Read more
Affected Products : fortiwan- EPSS Score: %0.10
- Published: Apr. 06, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-26112
Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary c... Read more
Affected Products : fortiwan- EPSS Score: %2.87
- Published: Apr. 06, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-26111
A missing release of memory after effective lifetime vulnerability in FortiSwitch 6.4.0 to 6.4.6, 6.2.0 to 6.2.6, 6.0.0 to 6.0.6, 3.6.11 and below may allow an attacker on an adjacent network to exhaust available memory by sending specifically crafted LLD... Read more
Affected Products : fortiswitch- EPSS Score: %0.11
- Published: Jun. 01, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-26110
An improper access control vulnerability [CWE-284] in FortiOS autod daemon 7.0.0, 6.4.6 and below, 6.2.9 and below, 6.0.12 and below and FortiProxy 2.0.1 and below, 1.2.9 and below may allow an authenticated low-privileged attacker to escalate their privi... Read more
- EPSS Score: %0.04
- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-26109
An integer overflow or wraparound vulnerability in the memory allocator of SSLVPN in FortiOS before 7.0.1 may allow an unauthenticated attacker to corrupt control data on the heap via specifically crafted requests to SSLVPN, resulting in potentially arbit... Read more
Affected Products : fortios- EPSS Score: %1.34
- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-26108
A use of hard-coded cryptographic key vulnerability in the SSLVPN of FortiOS before 7.0.1 may allow an attacker to retrieve the key by reverse engineering.... Read more
Affected Products : fortios- EPSS Score: %0.20
- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
6.3
MEDIUMCVE-2021-26107
An improper access control vulnerability [CWE-284] in FortiManager versions 6.4.4 and 6.4.5 may allow an authenticated attacker with a restricted user profile to modify the VPN tunnel status of other VDOMs using VPN Manager.... Read more
Affected Products : fortimanager- EPSS Score: %0.22
- Published: Nov. 02, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-26106
An improper neutralization of special elements used in an OS Command vulnerability in FortiAP's console 6.4.1 through 6.4.5 and 6.2.4 through 6.2.5 may allow an authenticated attacker to execute unauthorized commands by running the kdbg CLI command with s... Read more
- EPSS Score: %0.14
- Published: Jul. 09, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-26104
Multiple OS command injection (CWE-78) vulnerabilities in the command line interface of FortiManager 6.2.7 and below, 6.4.5 and below and all versions of 6.2.x, 6.0.x and 5.6.x, FortiAnalyzer 6.2.7 and below, 6.4.5 and below and all versions of 6.2.x, 6.0... Read more
- EPSS Score: %0.78
- Published: Apr. 06, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-26103
An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 2.0.3 and below, 1.2.11 and below and FortiGate verison 7.0.0, 6.4.6 and below, 6.2.9 and below of SSL VPN portal may allow a remote, una... Read more
- EPSS Score: %0.11
- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-26100
A missing cryptographic step in the Identity-Based Encryption service of FortiMail before 7.0.0 may allow an unauthenticated attacker who intercepts the encrypted messages to manipulate them in such a way that makes the tampering and the recovery of the p... Read more
Affected Products : fortimail- EPSS Score: %0.11
- Published: Jul. 09, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-26099
Missing cryptographic steps in the Identity-Based Encryption service of FortiMail before 7.0.0 may allow an attacker who comes in possession of the encrypted master keys to compromise their confidentiality by observing a few invariant properties of the ci... Read more
Affected Products : fortimail- EPSS Score: %0.16
- Published: Jul. 12, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-26098
An instance of small space of random values in the RPC API of FortiSandbox before 4.0.0 may allow an attacker in possession of a few information pieces about the state of the device to possibly predict valid session IDs.... Read more
Affected Products : fortisandbox- EPSS Score: %0.31
- Published: Aug. 04, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-26097
An improper neutralization of special elements used in an OS Command vulnerability in FortiSandbox 3.2.0 through 3.2.2, 3.1.0 through 3.1.4, and 3.0.0 through 3.0.6 may allow an authenticated attacker with access to the web GUI to execute unauthorized cod... Read more
Affected Products : fortisandbox- EPSS Score: %0.43
- Published: Aug. 04, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-26096
Multiple instances of heap-based buffer overflow in the command shell of FortiSandbox before 4.0.0 may allow an authenticated attacker to manipulate memory and alter its content by means of specifically crafted command line arguments.... Read more
Affected Products : fortisandbox- EPSS Score: %0.52
- Published: Aug. 04, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-26095
The combination of various cryptographic issues in the session management of FortiMail 6.4.0 through 6.4.4 and 6.2.0 through 6.2.6, including the encryption construction of the session cookie, may allow a remote attacker already in possession of a cookie ... Read more
Affected Products : fortimail- EPSS Score: %0.31
- Published: Jul. 20, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-26092
Failure to sanitize input in the SSL VPN web portal of FortiOS 5.2.10 through 5.2.15, 5.4.0 through 5.4.13, 5.6.0 through 5.6.14, 6.0.0 through 6.0.12, 6.2.0 through 6.2.7, 6.4.0 through 6.4.4; and FortiProxy 1.2.0 through 1.2.9, 2.0.0 through 2.0.1 may a... Read more
- EPSS Score: %0.53
- Published: Feb. 24, 2022
- Modified: Nov. 21, 2024