Show filters
941 Total Results
Displaying 91-100 of 941
Sort by:
Attacker Value
Unknown

CVE-2020-15934

Disclosure Date: December 19, 2024 (last updated January 22, 2025)
An execution with unnecessary privileges vulnerability in the VCM engine of FortiClient for Linux versions 6.2.7 and below, version 6.4.0. may allow local users to elevate their privileges to root by creating a malicious script or program on the target machine.
Attacker Value
Unknown

CVE-2020-12820

Disclosure Date: December 19, 2024 (last updated January 22, 2025)
Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.
Attacker Value
Unknown

CVE-2021-26093

Disclosure Date: December 19, 2024 (last updated January 22, 2025)
An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command.
Attacker Value
Unknown

CVE-2020-12819

Disclosure Date: December 19, 2024 (last updated January 22, 2025)
A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. Arbitrary code execution may be theoretically possible, albeit practically very difficult to achieve in this context
Attacker Value
Unknown

CVE-2024-50570

Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClientWindows 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13 and FortiClientLinux 7.4.0 through 7.4.2, 7.2.0 through 7.2.7, 7.0.0 through 7.0.13 may permit a local authenticated user to retrieve VPN password via memory dump, due to JavaScript's garbage collector
0
Attacker Value
Unknown

CVE-2024-48889

Disclosure Date: December 18, 2024 (last updated December 19, 2024)
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in FortiManager version 7.6.0, version 7.4.4 and below, version 7.2.7 and below, version 7.0.12 and below, version 6.4.14 and below and FortiManager Cloud version 7.4.4 and below, version 7.2.7 to 7.2.1, version 7.0.12 to 7.0.1 may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests.
0
Attacker Value
Unknown

CVE-2023-34990

Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.
0
Attacker Value
Unknown

CVE-2023-48774

Disclosure Date: December 09, 2024 (last updated December 21, 2024)
Missing Authorization vulnerability in Martin Gibson IdeaPush allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects IdeaPush: from n/a through n/a.
0
Attacker Value
Unknown

CVE-2023-47763

Disclosure Date: December 09, 2024 (last updated December 21, 2024)
Missing Authorization vulnerability in Martin Gibson WP Custom Admin Interface allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Custom Admin Interface: from n/a through 7.31.
0
Attacker Value
Unknown

CVE-2024-11687

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The Next-Cart Store to WooCommerce Migration plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 3.9.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.