Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet forticlient 7.0.0 vulnerabilities and exploits
(subscribe to this query)
9.1
CVSSv3
CVE-2021-41030
An authentication bypass by capture-replay vulnerability [CWE-294] in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below may allow an unauthenticated malicious user to impersonate an existing user by intercepting and re-using valid SAML authentication messages.
Fortinet Forticlient Enterprise Management Server
Fortinet Forticlient Enterprise Management Server 7.0.0
Fortinet Forticlient Enterprise Management Server 7.0.1
8.8
CVSSv3
CVE-2023-47534
A improper neutralization of formula elements in a csv file in Fortinet FortiClientEMS version 7.2.0 up to and including 7.2.2, 7.0.0 up to and including 7.0.10, 6.4.0 up to and including 6.4.9, 6.2.0 up to and including 6.2.9, 6.0.0 up to and including 6.0.8 allows malicious use...
Fortinet Forticlient Endpoint Management Server
2 Articles
7.8
CVSSv3
CVE-2023-22635
A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 up to and including 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 all versions may allo...
Fortinet Forticlient
7.8
CVSSv3
CVE-2022-42470
A relative path traversal vulnerability in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an malicious user to execute unauthorized code or commands via sending a crafted request to a specific named pipe.
Fortinet Forticlient
7.8
CVSSv3
CVE-2022-40682
A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an malicious user to execute unauthorized code or commands via sending a crafted request to a specific named pipe.
Fortinet Forticlient
7.8
CVSSv3
CVE-2021-32592
An unsafe search path vulnerability in FortiClientWindows 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x and FortiClientEMS 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x may allow an malicious user to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the sear...
Fortinet Forticlient
Fortinet Forticlient 7.0.0
Fortinet Forticlient Enterprise Management Server
Fortinet Forticlient Enterprise Management Server 7.0.0
7.5
CVSSv3
CVE-2021-41028
A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and b...
Fortinet Forticlient
Fortinet Forticlient 7.0.0
Fortinet Forticlient 7.0.1
Fortinet Forticlient Endpoint Management Server
Fortinet Forticlient Endpoint Management Server 7.0.0
Fortinet Forticlient Endpoint Management Server 7.0.1
7.1
CVSSv3
CVE-2022-40681
A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an malicious user to cause denial of service via sending a crafted request to a specific named pipe.
Fortinet Forticlient
7.1
CVSSv3
CVE-2022-26113
An execution with unnecessary privileges vulnerability [CWE-250] in FortiClientWindows 7.0.0 up to and including 7.0.3, 6.4.0 up to and including 6.4.7, 6.2.0 up to and including 6.2.9, 6.0.0 up to and including 6.0.10 may allow a local malicious user to perform an arbitrary file...
Fortinet Forticlient
5.5
CVSSv3
CVE-2023-33304
A use of hard-coded credentials vulnerability in Fortinet FortiClient Windows 7.0.0 - 7.0.9 and 7.2.0 - 7.2.1 allows an malicious user to bypass system protections via the use of static credentials.
Fortinet Forticlient 7.2.0
Fortinet Forticlient
Fortinet Forticlient 7.2.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »