A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-144 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
05 Jun 2025, 15:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-23-144 - Vendor Advisory | |
Summary |
|
|
CPE | cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:* | |
First Time |
Fortinet fortiwlm
Fortinet |
18 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
18 Dec 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-18 13:15
Updated : 2025-06-05 15:32
NVD link : CVE-2023-34990
Mitre link : CVE-2023-34990
CVE.ORG link : CVE-2023-34990
JSON object : View
Products Affected
fortinet
- fortiwlm