cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-23664,https://securityvulnerability.io/vulnerability/CVE-2024-23664,Fortinet FortiAuthenticator Open Redirect Vulnerability,"A URL redirection to untrusted site ('open redirect') in Fortinet FortiAuthenticator version 6.6.0, version 6.5.3 and below, version 6.4.9 and below may allow an attacker to to redirect users to an arbitrary website via a crafted URL.",Fortinet,Fortiauthenticator,5.8,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2024-06-03T09:50:26.151Z,0 CVE-2022-22302,https://securityvulnerability.io/vulnerability/CVE-2022-22302,,"A clear text storage of sensitive information (CWE-312) vulnerability in both FortiGate version 6.4.0 through 6.4.1, 6.2.0 through 6.2.9 and 6.0.0 through 6.0.13 and FortiAuthenticator version 5.5.0 and all versions of 6.1 and 6.0 may allow a local unauthorized party to retrieve the Fortinet private keys used to establish secure communication with both Apple Push Notification and Google Cloud Messaging services, via accessing the files on the filesystem.",Fortinet,"Fortiauthenticator,FortiOS",5.3,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2023-07-11T08:54:00.679Z,0 CVE-2022-35850,https://securityvulnerability.io/vulnerability/CVE-2022-35850,,"An improper neutralization of script-related HTML tags in a web page vulnerability [CWE-80] in FortiAuthenticator versions 6.4.0 through 6.4.4, 6.3.0 through 6.3.3, all versions of 6.2 and 6.1 may allow a remote unauthenticated attacker to trigger a reflected cross site scripting (XSS) attack via the ""reset-password"" page.",Fortinet,Fortiauthenticator,4.2,MEDIUM,0.0010600000387057662,false,false,false,false,,false,false,2023-04-11T16:07:22.760Z,0 CVE-2023-26208,https://securityvulnerability.io/vulnerability/CVE-2023-26208,,A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiAuthenticator 6.4.x and before allows a remote unauthenticated attacker to partially exhaust CPU and memory via sending numerous HTTP requests to the login form.,Fortinet,Fortiauthenticator,3.5,LOW,0.0014299999456852674,false,false,false,false,,false,false,2023-03-09T15:15:00.000Z,0 CVE-2022-22304,https://securityvulnerability.io/vulnerability/CVE-2022-22304,,An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiAuthenticator OWA Agent for Microsoft version 2.2 and 2.1 may allow an unauthenticated attacker to perform an XSS attack via crafted HTTP GET requests.,Fortinet,Fortinet Fortiauthenticator Outlookagent,6.1,MEDIUM,0.0008900000248104334,false,false,false,false,,false,false,2022-07-18T16:35:28.000Z,0 CVE-2021-26116,https://securityvulnerability.io/vulnerability/CVE-2021-26116,,An improper neutralization of special elements used in an OS command vulnerability in the command line interpreter of FortiAuthenticator before 6.3.1 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.,Fortinet,Fortinet Fortiauthenticator,6.7,MEDIUM,0.0016799999866634607,false,false,false,false,,false,false,2022-04-06T16:00:51.000Z,0 CVE-2021-36177,https://securityvulnerability.io/vulnerability/CVE-2021-36177,,"An improper access control vulnerability [CWE-284] in FortiAuthenticator HA service 6.3.2 and below, 6.2.x, 6.1.x, 6.0.x may allow an attacker on the same vlan as the HA management interface to make an unauthenticated direct connection to the FAC's database.",Fortinet,Fortiauthenticator,4.2,MEDIUM,0.0005799999926239252,false,false,false,false,,false,false,2022-02-02T10:54:47.000Z,0 CVE-2021-43068,https://securityvulnerability.io/vulnerability/CVE-2021-43068,,A improper authentication in Fortinet FortiAuthenticator version 6.4.0 allows user to bypass the second factor of authentication via a RADIUS login portal.,Fortinet,Fortinet Fortiauthenticator,5.4,MEDIUM,0.0006500000017695129,false,false,false,false,,false,false,2021-12-09T09:38:37.000Z,0 CVE-2021-43067,https://securityvulnerability.io/vulnerability/CVE-2021-43067,,"A exposure of sensitive information to an unauthorized actor in Fortinet FortiAuthenticator version 6.4.0, version 6.3.2 and below, version 6.2.1 and below, version 6.1.2 and below, version 6.0.7 to 6.0.1 allows attacker to duplicate a target LDAP user 2 factors authentication token via crafted HTTP requests.",Fortinet,Fortinet Fortiauthenticator,8.3,HIGH,0.00482999999076128,false,false,false,false,,false,false,2021-12-08T11:22:39.000Z,0 CVE-2021-22124,https://securityvulnerability.io/vulnerability/CVE-2021-22124,,"An uncontrolled resource consumption (denial of service) vulnerability in the login modules of FortiSandbox 3.2.0 through 3.2.2, 3.1.0 through 3.1.4, and 3.0.0 through 3.0.6; and FortiAuthenticator before 6.0.6 may allow an unauthenticated attacker to bring the device into an unresponsive state via specifically-crafted long request parameters.",Fortinet,"Fortinet Fortisandbox, Fortiauthenticator",7.5,HIGH,0.0010999999940395355,false,false,false,false,,false,false,2021-08-04T18:18:25.000Z,0 CVE-2021-24005,https://securityvulnerability.io/vulnerability/CVE-2021-24005,,"Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key.",Fortinet,Fortiauthenticator,4,MEDIUM,0.0016799999866634607,false,false,false,false,,false,false,2021-07-06T10:56:12.000Z,0 CVE-2019-16154,https://securityvulnerability.io/vulnerability/CVE-2019-16154,,An improper neutralization of input during web page generation in FortiAuthenticator WEB UI 6.0.0 may allow an unauthenticated user to perform a cross-site scripting attack (XSS) via a parameter of the logon page.,Fortinet,Fortiauthenticator Web Ui,6.1,MEDIUM,0.0008299999753944576,false,false,false,false,,false,false,2020-01-07T18:22:21.000Z,0 CVE-2018-9186,https://securityvulnerability.io/vulnerability/CVE-2018-9186,,"A cross-site scripting (XSS) vulnerability in Fortinet FortiAuthenticator in versions 4.0.0 to before 5.3.0 ""CSRF validation failure"" page allows attacker to execute unauthorized script code via inject malicious scripts in HTTP referer header.",Fortinet,Fortiauthenticator,6.1,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2018-05-31T22:29:00.000Z,0 CVE-2015-1456,https://securityvulnerability.io/vulnerability/CVE-2015-1456,,"Fortinet FortiAuthenticator 3.0.0 logs the PostgreSQL usernames and passwords in cleartext, which allows remote administrators to obtain sensitive information by reading the log at debug/startup/.",Fortinet,Fortiauthenticator,,,0.0013200000394135714,false,false,false,false,,false,false,2015-02-03T16:00:00.000Z,0 CVE-2015-1455,https://securityvulnerability.io/vulnerability/CVE-2015-1455,,"Fortinet FortiAuthenticator 3.0.0 has a password of (1) slony for the slony PostgreSQL user and (2) www-data for the www-data PostgreSQL user, which makes it easier for remote attackers to obtain access via unspecified vectors.",Fortinet,Fortiauthenticator,,,0.0065100002102553844,false,false,false,false,,false,false,2015-02-03T16:00:00.000Z,0 CVE-2015-1457,https://securityvulnerability.io/vulnerability/CVE-2015-1457,,Fortinet FortiAuthenticator 3.0.0 allows local users to read arbitrary files via the -f flag to the dig command.,Fortinet,Fortiauthenticator,,,0.0004600000102072954,false,false,false,false,,false,false,2015-02-03T16:00:00.000Z,0 CVE-2015-1459,https://securityvulnerability.io/vulnerability/CVE-2015-1459,,Cross-site scripting (XSS) vulnerability in Fortinet FortiAuthenticator 3.0.0 allows remote attackers to inject arbitrary web script or HTML via the operation parameter to cert/scep/.,Fortinet,Fortiauthenticator,,,0.02928999997675419,false,false,false,false,,false,false,2015-02-03T16:00:00.000Z,0 CVE-2015-1458,https://securityvulnerability.io/vulnerability/CVE-2015-1458,,"Fortinet FortiAuthenticator 3.0.0 allows local users to bypass intended restrictions and gain privileges by creating /tmp/privexec/dbgcore_enable_shell_access and executing the ""shell"" command.",Fortinet,Fortiauthenticator,,,0.0004600000102072954,false,false,false,false,,false,false,2015-02-03T16:00:00.000Z,0 CVE-2013-6990,https://securityvulnerability.io/vulnerability/CVE-2013-6990,,FortiGuard FortiAuthenticator before 3.0 allows remote administrators to gain privileges via the command line interface.,Fortinet,Fortiauthenticator,,,0.0009699999936856329,false,false,false,false,,false,false,2014-04-30T14:00:00.000Z,0