Fortinet FortiWLC 8.2-4-0

CPE Details

Fortinet FortiWLC 8.2-4-0
8.2-4-0
2019-07-01
11h52 +00:00
2019-07-01
11h52 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:fortinet:fortiwlc:8.2-4-0:*:*:*:*:*:*:*

Informations

Vendor

fortinet

Product

fortiwlc

Version

8.2-4-0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-26093 2024-12-19 07h47 +00:00 An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command.
7.3
High
CVE-2020-9288 2020-06-22 13h14 +00:00 An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the ESS profile or the Radius Profile.
5.4
Medium
CVE-2017-17539 2018-05-07 14h00 +00:00 The presence of a hardcoded account in Fortinet FortiWLC 7.0.11 and earlier allows attackers to gain unauthorized read/write access via a remote shell.
9.8
Critical
CVE-2017-17540 2018-05-07 14h00 +00:00 The presence of a hardcoded account in Fortinet FortiWLC 8.3.3 allows attackers to gain unauthorized read/write access via a remote shell.
9.8
Critical
CVE-2016-7560 2016-10-05 14h00 +00:00 The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors.
9.8
Critical
CVE-2016-7561 2016-10-05 14h00 +00:00 Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file.
7.2
High