Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Fortinet | Fortinet FortiOS and FortiProxy | FortiGate 6.0.0 through 6.0.4, 5.6.0 through 5.6.7, 5.4.0 through 5.4.12, 5.2 and earlier and FortiProxy versions 2.0.0, 1.2.8 and earlier | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below versions under SSL VPN web portal are vulnerable to cross-site scripting and allows attacker to execute unauthorized malicious script code via the error or message handling parameters. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13380.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2018-13382 | 9.1 CRITICAL | Fortinet FortiOS 授权问题漏洞 |
| CVE-2018-13379 | 9.1 CRITICAL | Fortinet FortiOS 路径遍历漏洞 |
| CVE-2018-13381 | 5.3 MEDIUM | Fortinet FortiOS 缓冲区错误漏洞 |
| CVE-2019-5588 | Fortinet FortiOS 跨站脚本漏洞 | |
| CVE-2019-5586 | Fortinet FortiOS 跨站脚本漏洞 | |
| CVE-2019-5587 | 飞塔 Fortinet FortiOS VM 数据伪造问题漏洞 | |
| CVE-2018-13384 | Fortinet FortiOS 输入验证错误漏洞 |
No comments yet