[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27041 Download | Alert*

The host is installed with Fortinet FortiClient before 5.2.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in certain .sys drivers. Successful exploitation could allow local attackers to obtain a privileged handle to a PID and possibly have unspecified other impact.

The host is installed with Fortinet FortiClient through 6.0.6 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to handle the use of a hardcoded cryptographic key. Successful exploitation allows attackers to eavesdrop on and modify information.

The host is installed with Fortinet FortiClient through 5.6.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the use of a static encryption key and weak encryption algorithms. Successful exploitation allows attackers to see each other's VPN authentication credentials.

The host is installed with Fortinet FortiClient through 5.6.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle improperly secured storage locations. Successful exploitation allows users to see each other's VPN authentication credentials.

The host is installed with Fortinet FortiClient before 5.2.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in certain .sys drivers. Successful exploitation could allow local attackers to write to arbitrary memory locations.

The host is installed with Fortinet FortiClient before 5.2.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle issues in certain .sys drivers. Successful exploitation could allow local attackers to read arbitrary kernel memory.

The host is installed with Fortinet FortiClient before 5.2.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle an issue in the Fortishield.sys driver. Successful exploitation allows local attackers to execute arbitrary code with kernel privileges.

The host is installed with Fortinet FortiClient before 4.3.5.472 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a password transmission procedure. Successful exploitation allows man-in-the-middle attackers to obtain sensitive information.

The host is installed with Google Chrome before 112.0.5615.137 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with JetBrains YouTrack before 2023.3.22666 and is prone to a stored XSS vulnerability. A flaw is present in the application, which is fails to properly handle an issue in markdown. Successful exploitation could allow attackers to cause cross-site scripting.


Pages:      Start    1090    1091    1092    1093    1094    1095    1096    1097    1098    1099    1100    1101    1102    1103    ..   2704

© SecPod Technologies