The host is installed with Fortinet FortiClient before 5.2.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in certain .sys drivers. Successful exploitation could allow local attackers to obtain a privileged handle to a PID and possibly have unspecified other impact.
The host is installed with Fortinet FortiClient through 6.0.6 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to handle the use of a hardcoded cryptographic key. Successful exploitation allows attackers to eavesdrop on and modify information.
The host is installed with Fortinet FortiClient through 5.6.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the use of a static encryption key and weak encryption algorithms. Successful exploitation allows attackers to see each other's VPN authentication credentials.
The host is installed with Fortinet FortiClient through 5.6.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle improperly secured storage locations. Successful exploitation allows users to see each other's VPN authentication credentials.
The host is installed with Fortinet FortiClient before 5.2.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in certain .sys drivers. Successful exploitation could allow local attackers to write to arbitrary memory locations.
The host is installed with Fortinet FortiClient before 5.2.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle issues in certain .sys drivers. Successful exploitation could allow local attackers to read arbitrary kernel memory.
The host is installed with Fortinet FortiClient before 5.2.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle an issue in the Fortishield.sys driver. Successful exploitation allows local attackers to execute arbitrary code with kernel privileges.
The host is installed with Fortinet FortiClient before 4.3.5.472 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a password transmission procedure. Successful exploitation allows man-in-the-middle attackers to obtain sensitive information.
The host is installed with Google Chrome before 112.0.5615.137 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with JetBrains YouTrack before 2023.3.22666 and is prone to a stored XSS vulnerability. A flaw is present in the application, which is fails to properly handle an issue in markdown. Successful exploitation could allow attackers to cause cross-site scripting.