Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet forticlient vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2021-41031
A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged malicious user to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.
Fortinet Forticlient
7.8
CVSSv3
CVE-2021-36183
An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged malicious user to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates.
Fortinet Forticlient
5.5
CVSSv3
CVE-2018-9190
A null pointer dereference vulnerability in Fortinet FortiClientWindows 6.0.2 and previous versions allows malicious user to cause a denial of service via the NDIS miniport driver.
Fortinet Forticlient
7.8
CVSSv3
CVE-2018-9191
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and previous versions allows malicious users to execute unauthorized code or commands via the named pipe responsible for Forticlient updates.
Fortinet Forticlient
7.8
CVSSv3
CVE-2018-9193
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and previous versions allows malicious user to execute unauthorized code or commands via the parsing of the file.
Fortinet Forticlient
8
CVSSv3
CVE-2021-22127
An improper input validation vulnerability in FortiClient for Linux 6.4.x prior to 6.4.3, FortiClient for Linux 6.2.x prior to 6.2.9 may allow an unauthenticated malicious user to execute arbitrary code on the host operating system as root via tricking the user into connecting to...
Fortinet Forticlient
7.8
CVSSv3
CVE-2019-5589
An Unsafe Search Path vulnerability in FortiClient Online Installer (Windows version prior to 6.0.6) may allow an unauthenticated, remote attacker with control over the directory in which FortiClientOnlineInstaller.exe resides to execute arbitrary code on the system via uploading...
Fortinet Forticlient
7.8
CVSSv3
CVE-2020-9291
An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
Fortinet Forticlient
7.8
CVSSv3
CVE-2021-26089
An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase.
Fortinet Forticlient
7.8
CVSSv3
CVE-2019-15711
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
Fortinet Forticlient
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »