No analysis available yet.
Vendor Solution
Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-144 |
|
Thu, 05 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet fortiwlm |
|
| CPEs | cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fortinet
Fortinet fortiwlm |
Wed, 18 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
ssvc
|
Wed, 18 Dec 2024 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests. | |
| Weaknesses | CWE-23 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-12-20T04:55:50.572Z
Reserved: 2023-06-09T06:59:37.970Z
Link: CVE-2023-34990
Updated: 2024-12-18T14:29:57.561Z
Status : Analyzed
Published: 2024-12-18T13:15:05.547
Modified: 2025-06-05T15:32:55.290
Link: CVE-2023-34990
No data.
OpenCVE Enrichment
No data.