Fortinet FortiWLC 8.1-2-0

CPE Details

Fortinet FortiWLC 8.1-2-0
8.1-2-0
2019-07-01
11h52 +00:00
2019-07-01
11h52 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:fortinet:fortiwlc:8.1-2-0:*:*:*:*:*:*:*

Informations

Vendor

fortinet

Product

fortiwlc

Version

8.1-2-0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-26093 2024-12-19 07h47 +00:00 An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command.
7.3
High
CVE-2020-9288 2020-06-22 13h14 +00:00 An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the ESS profile or the Radius Profile.
5.4
Medium
CVE-2017-17539 2018-05-07 14h00 +00:00 The presence of a hardcoded account in Fortinet FortiWLC 7.0.11 and earlier allows attackers to gain unauthorized read/write access via a remote shell.
9.8
Critical
CVE-2017-17540 2018-05-07 14h00 +00:00 The presence of a hardcoded account in Fortinet FortiWLC 8.3.3 allows attackers to gain unauthorized read/write access via a remote shell.
9.8
Critical
CVE-2017-7341 2017-10-26 11h00 +00:00 An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10, 8.0 through 8.2, and 8.3.0 through 8.3.2 file management AP script download webUI page allows an authenticated admin user to execute arbitrary system console commands via crafted HTTP requests.
7.2
High
CVE-2016-7560 2016-10-05 14h00 +00:00 The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors.
9.8
Critical
CVE-2016-7561 2016-10-05 14h00 +00:00 Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file.
7.2
High