Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet forticlient vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-33878
An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiClient for Mac versions 7.0.0 up to and including 7.0.5 may allow a local authenticated malicious user to obtain the SSL-VPN password in cleartext via running a logstream for the FortiTr...
Fortinet Forticlient
436
VMScore
CVE-2018-9190
A null pointer dereference vulnerability in Fortinet FortiClientWindows 6.0.2 and previous versions allows malicious user to cause a denial of service via the NDIS miniport driver.
Fortinet Forticlient
409
VMScore
CVE-2018-9191
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and previous versions allows malicious users to execute unauthorized code or commands via the named pipe responsible for Forticlient updates.
Fortinet Forticlient
409
VMScore
CVE-2018-9193
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and previous versions allows malicious user to execute unauthorized code or commands via the parsing of the file.
Fortinet Forticlient
641
VMScore
CVE-2015-5735
The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient prior to 5.2.4 allow local users to write to arbitrary memory locations via a 0x226108 ioctl call.
Fortinet Forticlient
445
VMScore
CVE-2015-1453
The qm class in Fortinet FortiClient 5.2.3.091 for Android uses a hardcoded encryption key of FoRtInEt!AnDrOiD, which makes it easier for malicious users to obtain passwords and possibly other sensitive data by leveraging the key to decrypt data in the Shared Preferences.
Fortinet Forticlient
736
VMScore
CVE-2015-5736
The Fortishield.sys driver in Fortinet FortiClient prior to 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.
Fortinet Forticlient
3 EDB exploits
3 Github repositories
641
VMScore
CVE-2015-5737
The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, (4) mdare64_52.sys, and (5) Fortishield.sys drivers in Fortinet FortiClient prior to 5.2.4 do not properly restrict access to the API for management of processes and the Windows registry, which allows local users to ...
Fortinet Forticlient
641
VMScore
CVE-2015-7362
Fortinet FortiClient Linux SSLVPN before build 2313, when installed on Linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program.
Fortinet Forticlient
641
VMScore
CVE-2019-15711
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
Fortinet Forticlient
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »