Search Results

Showing results for Zerobot Attack

https://filestore.fortinet.com/fortiguard/static/images/icons/outbreakalert.svg?v=17312 Outbreak Alert
Zerobot is a Go-based botnet that spreads primarily through IoT and web application vulnerabilities. According to Fortinet research analysis the most recent distribution of Zerobot includes additio...
https://filestore.fortinet.com/fortiguard/static/images/icons/websec.svg?v=17312 Web Application Security
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in the WebAdmin of Sophos SG UTM.The vulnerability is due to insufficient sanitization when handling a malicious re...
https://filestore.fortinet.com/fortiguard/static/images/icons/ips.svg?v=17312 IPS
This indicates an attack attempt to exploit a Command Injection vulnerability in FLIR AX8 Thermal Cameras.The vulnerability is due to insufficient sanitizing of user supplied inputs in the applicat...
https://filestore.fortinet.com/fortiguard/static/images/icons/fct_app_firewall.svg?v=17312 Client Application Firewall
This indicates an attack attempt to exploit a Command Injection vulnerability in FLIR AX8 Thermal Cameras.The vulnerability is due to insufficient sanitizing of user supplied inputs in the applicat...
https://filestore.fortinet.com/fortiguard/static/images/icons/ips.svg?v=17312 IPS
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in the WebAdmin of Sophos SG UTM.The vulnerability is due to insufficient sanitization when handling a malicious re...
https://filestore.fortinet.com/fortiguard/static/images/icons/fct_app_firewall.svg?v=17312 Client Application Firewall
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in the WebAdmin of Sophos SG UTM.The vulnerability is due to insufficient sanitization when handling a malicious re...
https://filestore.fortinet.com/fortiguard/static/images/icons/epvuln.svg?v=17312 Endpoint Vulnerability
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by ...
https://filestore.fortinet.com/fortiguard/static/images/icons/fadc.svg?v=17312 Web Application Firewall
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in the WebAdmin of Sophos SG UTM.The vulnerability is due to insufficient sanitization when handling a malicious re...
https://filestore.fortinet.com/fortiguard/static/images/icons/websec.svg?v=17312 Web Application Security
This indicates an attack attempt to exploit a Command Execution vulnerability in multiple Grandstream devices.The vulnerability is caused by an error when the vulnerable software handles a maliciou...
https://filestore.fortinet.com/fortiguard/static/images/icons/ips.svg?v=17312 IPS
This indicates an attack attempt to exploit a Command Injection Vulnerability in Zyxel firewalls.The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. An u...
https://filestore.fortinet.com/fortiguard/static/images/icons/fct_app_firewall.svg?v=17312 Client Application Firewall
This indicates an attack attempt to exploit a Command Injection Vulnerability in Zyxel firewalls.The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. An u...
https://filestore.fortinet.com/fortiguard/static/images/icons/ips.svg?v=17312 IPS
This indicates an attack attempt to exploit a Remote Code Injection Vulnerability in Roxy-WI.The vulnerability is due to insufficient validation of user supplied input. A remote attacker can exploi...
https://filestore.fortinet.com/fortiguard/static/images/icons/fct_app_firewall.svg?v=17312 Client Application Firewall
This indicates an attack attempt to exploit a Remote Code Injection Vulnerability in Roxy-WI.The vulnerability is due to insufficient validation of user supplied input. A remote attacker can exploi...