CVE-2021-26105
MEDIUMDescription
A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| fortinet | fortisandbox |
| fortinet | fortisandbox |
| fortinet | fortisandbox |
References
Advisories & Patches
Frequently Asked Questions
What is CVE-2021-26105? +
How severe is CVE-2021-26105? +
What products are affected by CVE-2021-26105? +
How do I check if I'm vulnerable to CVE-2021-26105? +
Related Vulnerabilities
The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could …
Whale Browser before 4.33.325.17 allows an attacker to escape the iframe sandbox in a dual-tab environment.
Whale browser before 4.35.351.12 allows an attacker to escape the iframe sandbox in a sidebar environment.
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via …
Inappropriate implementation in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via …
Inappropriate implementation in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a …