Vulnerability Details CVE-2023-41680
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.1 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 48.9%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-41680
-
cpe:2.3:a:fortinet:fortisandbox:2.4.1
-
cpe:2.3:a:fortinet:fortisandbox:2.5.0
-
cpe:2.3:a:fortinet:fortisandbox:2.5.1
-
cpe:2.3:a:fortinet:fortisandbox:2.5.2
-
cpe:2.3:a:fortinet:fortisandbox:3.0.0
-
cpe:2.3:a:fortinet:fortisandbox:3.0.1
-
cpe:2.3:a:fortinet:fortisandbox:3.0.2
-
cpe:2.3:a:fortinet:fortisandbox:3.0.3
-
cpe:2.3:a:fortinet:fortisandbox:3.0.4
-
cpe:2.3:a:fortinet:fortisandbox:3.0.5
-
cpe:2.3:a:fortinet:fortisandbox:3.0.6
-
cpe:2.3:a:fortinet:fortisandbox:3.0.7
-
cpe:2.3:a:fortinet:fortisandbox:3.1.0
-
cpe:2.3:a:fortinet:fortisandbox:3.1.1
-
cpe:2.3:a:fortinet:fortisandbox:3.1.2
-
cpe:2.3:a:fortinet:fortisandbox:3.1.3
-
cpe:2.3:a:fortinet:fortisandbox:3.1.4
-
cpe:2.3:a:fortinet:fortisandbox:3.1.5
-
cpe:2.3:a:fortinet:fortisandbox:3.2.0
-
cpe:2.3:a:fortinet:fortisandbox:3.2.1
-
cpe:2.3:a:fortinet:fortisandbox:3.2.2
-
cpe:2.3:a:fortinet:fortisandbox:3.2.3
-
cpe:2.3:a:fortinet:fortisandbox:3.2.4
-
cpe:2.3:a:fortinet:fortisandbox:4.0.0
-
cpe:2.3:a:fortinet:fortisandbox:4.0.1
-
cpe:2.3:a:fortinet:fortisandbox:4.0.2
-
cpe:2.3:a:fortinet:fortisandbox:4.0.3
-
cpe:2.3:a:fortinet:fortisandbox:4.2.0
-
cpe:2.3:a:fortinet:fortisandbox:4.2.3
-
cpe:2.3:a:fortinet:fortisandbox:4.2.4
-
cpe:2.3:a:fortinet:fortisandbox:4.2.5
-
cpe:2.3:a:fortinet:fortisandbox:4.4.0
-
cpe:2.3:a:fortinet:fortisandbox:4.4.1