diff --git a/2021/24xxx/CVE-2021-24009.json b/2021/24xxx/CVE-2021-24009.json index f5bf3e34d3e..eecc2b5111a 100644 --- a/2021/24xxx/CVE-2021-24009.json +++ b/2021/24xxx/CVE-2021-24009.json @@ -71,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in the\u00a0Web GUI of FortiWAN before 4.5.9 may allow an authenticated attacker to execute arbitrary commands on the underlying system's shell via specifically crafted HTTP requests." + "value": "Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in the Web GUI of FortiWAN before 4.5.9 may allow an authenticated attacker to execute arbitrary commands on the underlying system's shell via specifically crafted HTTP requests." } ] } diff --git a/2021/26xxx/CVE-2021-26112.json b/2021/26xxx/CVE-2021-26112.json index f52eb62ae9d..c2f6cd0235f 100644 --- a/2021/26xxx/CVE-2021-26112.json +++ b/2021/26xxx/CVE-2021-26112.json @@ -71,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in\u00a0the command line interpreter of FortiWAN\u00a0before 4.5.9 may allow an unauthenticated attacker\u00a0to potentially corrupt control data in memory and execute arbitrary code via\u00a0specifically crafted requests." + "value": "Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary code via specifically crafted requests." } ] } diff --git a/2021/26xxx/CVE-2021-26114.json b/2021/26xxx/CVE-2021-26114.json index e75cdd33653..5444a17c4f8 100644 --- a/2021/26xxx/CVE-2021-26114.json +++ b/2021/26xxx/CVE-2021-26114.json @@ -71,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiWAN\u00a0before 4.5.9 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests." + "value": "Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiWAN before 4.5.9 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests." } ] } diff --git a/2021/32xxx/CVE-2021-32593.json b/2021/32xxx/CVE-2021-32593.json index 5bef05872c3..ac531bc0c87 100644 --- a/2021/32xxx/CVE-2021-32593.json +++ b/2021/32xxx/CVE-2021-32593.json @@ -71,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "A use of a broken or risky cryptographic algorithm vulnerability [CWE-327]\u00a0in the Dynamic Tunnel Protocol of FortiWAN\u00a0before 4.5.9 may allow an unauthenticated remote attacker to decrypt and forge protocol communication messages." + "value": "A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN before 4.5.9 may allow an unauthenticated remote attacker to decrypt and forge protocol communication messages." } ] } diff --git a/2022/23xxx/CVE-2022-23446.json b/2022/23xxx/CVE-2022-23446.json index f01ff9d02f6..a09a82b1386 100644 --- a/2022/23xxx/CVE-2022-23446.json +++ b/2022/23xxx/CVE-2022-23446.json @@ -71,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "A improper control of a resource through its lifetime in Fortinet FortiEDR version 5.0.3 and earlier allows attacker to make the whole application unresponsive via changing its root directory access permission." + "value": "A improper control of a resource through its lifetime in Fortinet FortiEDR version 5.0.3 and earlier allows attacker to make the whole application unresponsive via changing its root directory access permission." } ] }