Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-40967 | An improper handling of malformed request vulnerability [CWE-228] exists in FortiADC 5.0 all versions, 6.0.0 all versions, 6.1.0 all versions, 6.2.0 through 6.2.3, and 7.0.0 through 7.0.2. This may allow a remote attacker without privileges to bypass some Web Application Firewall (WAF) protection such as the SQL Injection and XSS filters via a malformed HTTP request. |
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-22-234 |
|
Fri, 25 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:20:24.257Z
Reserved: 2022-08-16T00:00:00.000Z
Link: CVE-2022-38381
Updated: 2024-08-03T10:54:03.519Z
Status : Modified
Published: 2022-11-02T12:15:54.773
Modified: 2024-11-21T07:16:21.807
Link: CVE-2022-38381
No data.
OpenCVE Enrichment
No data.
EUVD