Show filters
87 Total Results
Displaying 1-10 of 87
Sort by:
Attacker Value
Very High
CVE-2023-48788
Disclosure Date: March 12, 2024 (last updated April 01, 2024)
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.
8
Attacker Value
Unknown
CVE-2024-52968
Disclosure Date: February 11, 2025 (last updated February 12, 2025)
An improper authentication in Fortinet FortiClientMac 7.0.11 through 7.2.4 allows attacker to gain improper access to MacOS via empty password.
0
Attacker Value
Unknown
CVE-2024-40586
Disclosure Date: February 11, 2025 (last updated February 12, 2025)
An Improper Access Control vulnerability [CWE-284] in FortiClient Windows version 7.4.0, version 7.2.6 and below, version 7.0.13 and below may allow a local user to escalate his privileges via FortiSSLVPNd service pipe.
0
Attacker Value
Unknown
CVE-2024-50564
Disclosure Date: January 14, 2025 (last updated February 04, 2025)
A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.
0
Attacker Value
Unknown
CVE-2024-36510
Disclosure Date: January 14, 2025 (last updated February 01, 2025)
An observable response discrepancy vulnerability [CWE-204] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, and FortiSOAR 7.5.0, 7.4.0 through 7.4.4, 7.3.0 through 7.3.2, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to enumerate valid users via observing login request responses.
0
Attacker Value
Unknown
CVE-2024-36506
Disclosure Date: January 14, 2025 (last updated February 01, 2025)
An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection.
0
Attacker Value
Unknown
CVE-2024-23106
Disclosure Date: January 14, 2025 (last updated January 15, 2025)
An improper restriction of excessive authentication attempts [CWE-307] in FortiClientEMS version 7.2.0 through 7.2.4 and before 7.0.10 allows an unauthenticated attacker to try a brute force attack against the FortiClientEMS console via crafted HTTP or HTTPS requests.
0
Attacker Value
Unknown
CVE-2020-15934
Disclosure Date: December 19, 2024 (last updated January 22, 2025)
An execution with unnecessary privileges vulnerability in the VCM engine of FortiClient for Linux versions 6.2.7 and below, version 6.4.0. may allow local users to elevate their privileges to root by creating a malicious script or program on the target machine.
0
Attacker Value
Unknown
CVE-2024-50570
Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClientWindows 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13 and FortiClientLinux 7.4.0 through 7.4.2, 7.2.0 through 7.2.7, 7.0.0 through 7.0.13 may permit a local authenticated user to retrieve VPN password via memory dump, due to JavaScript's garbage collector
0
Attacker Value
Unknown
CVE-2024-47574
Disclosure Date: November 13, 2024 (last updated January 22, 2025)
A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
0