Fortinet

FortiClient

81 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 10.10.2023 17:15:12
  • Zuletzt bearbeitet 21.11.2024 08:12:30

An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Windows 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions, Linux 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions and Mac 7....

  • EPSS 0.03%
  • Veröffentlicht 13.06.2023 09:15:14
  • Zuletzt bearbeitet 21.11.2024 07:08:30

An incorrect default permission [CWE-276] vulnerability in FortiClient (Windows) versions 7.0.0 through 7.0.6 and 6.4.0 through 6.4.8 and FortiConverter (Windows) versions 6.2.0 through 6.2.1, 7.0.0 and all versions of 6.0.0 may allow a local authent...

  • EPSS 0.04%
  • Veröffentlicht 11.04.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 07:45:05

A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 al...

  • EPSS 0.14%
  • Veröffentlicht 11.04.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 07:27:23

Multiple vulnerabilities including an incorrect permission assignment for critical resource [CWE-732] vulnerability and a time-of-check time-of-use (TOCTOU) race condition [CWE-367] vulnerability in Fortinet FortiClientWindows before 7.0.7 allows att...

  • EPSS 0.1%
  • Veröffentlicht 11.04.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 07:25:01

A relative path traversal vulnerability in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pip...

  • EPSS 0.05%
  • Veröffentlicht 11.04.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 07:21:50

A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe.

  • EPSS 0.11%
  • Veröffentlicht 02.11.2022 12:15:53
  • Zuletzt bearbeitet 21.11.2024 07:08:30

An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiClient for Mac versions 7.0.0 through 7.0.5 may allow a local authenticated attacker to obtain the SSL-VPN password in cleartext via running a logstream for...

  • EPSS 0.11%
  • Veröffentlicht 19.07.2022 14:15:08
  • Zuletzt bearbeitet 21.11.2024 06:53:27

An execution with unnecessary privileges vulnerability [CWE-250] in FortiClientWindows 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.10 may allow a local attacker to perform an arbitrary file write on the system.

  • EPSS 0.18%
  • Veröffentlicht 18.07.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:25:18

A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible fo...

  • EPSS 0.06%
  • Veröffentlicht 11.05.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:28:37

A external control of file name or path in Fortinet FortiClientWindows version 7.0.2 and below, version 6.4.6 and below, version 6.2.9 and below, version 6.0.10 and below allows attacker to escalate privilege via the MSI installer.