[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27041 Download | Alert*

The host is installed with Fortinet FortiClient 6.0.0 through 6.4.6 or 7.0.0 through 7.0.1 and is prone to an improper certificate validation vulnerability. A flaw is present in the application, which fails to handle the issues in unspecified vectors. Successful exploitation could allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the F ...

The host is installed with Fortinet FortiClient 6.0.x through 6.4.x, or 7.0.x through 7.0.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a relative path traversal issue. Successful exploitation allows a local low privileged attacker to perform arbitrary file creation on the device filesystem.

The host is installed with Fortinet FortiClient 6.0.x through 6.0.10, 6.2.x through 6.2.9, 6.4.x through 6.4.9, or 7.0.x through 7.0.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an incorrect authorization issue. Successful exploitation allows a local low privileged attacker to perform arbitrary file creation in the device files ...

The host is installed with Fortinet FortiClient 7.0.0 before 7.0.2 or 6.4.0 before 6.4.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the named pipe responsible for Forticlient updates. Successful exploitation allows a local unprivileged attacker to escalate their privileges to SYSTEM.

The host is installed with Fortinet FortiClient through 6.0.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle improper file parsing. Successful exploitation allows attacker to execute unauthorized code.

The host is installed with Fortinet FortiClient through 6.0.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an issue in named pipes. Successful exploitation allows attacker to execute unauthorized code.

The host is installed with Fortinet FortiClient through 6.0.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle command injection. Successful exploitation allows attacker to execute unauthorized code.

The host is installed with Fortinet FortiClient through 6.0.2 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to handle an issue in the NDIS miniport driver. Successful exploitation allows attacker to cause a denial of service.

The host is installed with Fortinet FortiClient through 5.4.3 or with 5.6.0 is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an untrusted certificate chain. Successful exploitation allows attacker to gain privilege.

The host is installed with Fortinet FortiClient 5.4.1 or 5.4.2 is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an issue in FortiClientNamedPipe. Successful exploitation could allow a low privileged user to execute arbitrary code.


Pages:      Start    1089    1090    1091    1092    1093    1094    1095    1096    1097    1098    1099    1100    1101    1102    ..   2704

© SecPod Technologies