Fortinet FortiWLC 7.0-10-0

CPE Details

Fortinet FortiWLC 7.0-10-0
7.0-10-0
2019-07-01
11h52 +00:00
2019-07-01
11h52 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:fortinet:fortiwlc:7.0-10-0:*:*:*:*:*:*:*

Informations

Vendor

fortinet

Product

fortiwlc

Version

7.0-10-0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-9288 2020-06-22 13h14 +00:00 An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the ESS profile or the Radius Profile.
5.4
Moyen
CVE-2017-17539 2018-05-07 14h00 +00:00 The presence of a hardcoded account in Fortinet FortiWLC 7.0.11 and earlier allows attackers to gain unauthorized read/write access via a remote shell.
9.8
Critique
CVE-2017-17540 2018-05-07 14h00 +00:00 The presence of a hardcoded account in Fortinet FortiWLC 8.3.3 allows attackers to gain unauthorized read/write access via a remote shell.
9.8
Critique
CVE-2016-7560 2016-10-05 14h00 +00:00 The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors.
9.8
Critique
CVE-2016-7561 2016-10-05 14h00 +00:00 Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file.
7.2
Haute