"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-04-06 10:01:32 +00:00
parent ece17db199
commit fc8a07cde9
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
5 changed files with 5 additions and 5 deletions

View File

@ -71,7 +71,7 @@
"description_data": [
{
"lang": "eng",
"value": "Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in the\u00a0Web GUI of FortiWAN before 4.5.9 may allow an authenticated attacker to execute arbitrary commands on the underlying system's shell via specifically crafted HTTP requests."
"value": "Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in the Web GUI of FortiWAN before 4.5.9 may allow an authenticated attacker to execute arbitrary commands on the underlying system's shell via specifically crafted HTTP requests."
}
]
}

View File

@ -71,7 +71,7 @@
"description_data": [
{
"lang": "eng",
"value": "Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in\u00a0the command line interpreter of FortiWAN\u00a0before 4.5.9 may allow an unauthenticated attacker\u00a0to potentially corrupt control data in memory and execute arbitrary code via\u00a0specifically crafted requests."
"value": "Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary code via specifically crafted requests."
}
]
}

View File

@ -71,7 +71,7 @@
"description_data": [
{
"lang": "eng",
"value": "Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiWAN\u00a0before 4.5.9 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests."
"value": "Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiWAN before 4.5.9 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests."
}
]
}

View File

@ -71,7 +71,7 @@
"description_data": [
{
"lang": "eng",
"value": "A use of a broken or risky cryptographic algorithm vulnerability [CWE-327]\u00a0in the Dynamic Tunnel Protocol of FortiWAN\u00a0before 4.5.9 may allow an unauthenticated remote attacker to decrypt and forge protocol communication messages."
"value": "A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN before 4.5.9 may allow an unauthenticated remote attacker to decrypt and forge protocol communication messages."
}
]
}

View File

@ -71,7 +71,7 @@
"description_data": [
{
"lang": "eng",
"value": "A improper control of a resource through its lifetime in Fortinet FortiEDR version 5.0.3 and earlier allows attacker to make the whole application unresponsive via changing its root directory access permission."
"value": "A improper control of a resource through its lifetime in Fortinet FortiEDR version 5.0.3 and earlier allows attacker to make the whole application unresponsive via changing its root directory access permission."
}
]
}