A client-side enforcement of server-side security in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 allows attacker to execute unauthorized code or commands via HTTP requests.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-24-054 |
![]() ![]() ![]() |
History
Thu, 02 Jan 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortisandbox |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fortinet
Fortinet fortisandbox |

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-26T18:50:05.200Z
Reserved: 2024-04-04T12:52:41.586Z
Link: CVE-2024-31491

Updated: 2024-08-02T01:52:57.116Z

Status : Analyzed
Published: 2024-05-14T17:17:24.197
Modified: 2025-01-02T18:35:20.503
Link: CVE-2024-31491

No data.