Show filters
87 Total Results
Displaying 51-60 of 87
Sort by:
Attacker Value
Unknown
CVE-2020-15941
Disclosure Date: October 06, 2021 (last updated February 23, 2025)
A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages.
0
Attacker Value
Unknown
CVE-2021-24019
Disclosure Date: October 06, 2021 (last updated February 23, 2025)
An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
0
Attacker Value
Unknown
CVE-2021-26089
Disclosure Date: July 12, 2021 (last updated February 23, 2025)
An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase.
0
Attacker Value
Unknown
CVE-2019-16150
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded key.
0
Attacker Value
Unknown
CVE-2020-9291
Disclosure Date: June 01, 2020 (last updated February 21, 2025)
An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
0
Attacker Value
Unknown
CVE-2020-9287
Disclosure Date: March 15, 2020 (last updated February 21, 2025)
An Unsafe Search Path vulnerability in FortiClient EMS online installer 6.2.1 and below may allow a local attacker with control over the directory in which FortiClientEMSOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious Filter Library DLL files in that directory.
0
Attacker Value
Unknown
CVE-2020-9290
Disclosure Date: March 15, 2020 (last updated February 21, 2025)
An Unsafe Search Path vulnerability in FortiClient for Windows online installer 6.2.3 and below may allow a local attacker with control over the directory in which FortiClientOnlineInstaller.exe and FortiClientVPNOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious Filter Library DLL files in that directory.
0
Attacker Value
Unknown
CVE-2019-17658
Disclosure Date: March 12, 2020 (last updated February 21, 2025)
An unquoted service path vulnerability in the FortiClient FortiTray component of FortiClientWindows v6.2.2 and prior allow an attacker to gain elevated privileges via the FortiClientConsole executable service path.
0
Attacker Value
Unknown
CVE-2019-16155
Disclosure Date: February 07, 2020 (last updated November 27, 2024)
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to overwrite system files as root with arbitrary content through system backup file via specially crafted "BackupConfig" type IPC client requests to the fctsched process. Further more, FortiClient for Linux 6.2.2 and below allow low privilege user write the system backup file under root privilege through GUI thus can cause root system file overwrite.
0
Attacker Value
Unknown
CVE-2019-15711
Disclosure Date: February 06, 2020 (last updated November 27, 2024)
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
0