Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet forticlient vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2019-16152
A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to cause FortiClient processes running under root privilege crashes via sending specially crafted IPC client requests to the fctsched process due the nanomsg not ...
Fortinet Forticlient
7.1
CVSSv3
CVE-2019-16155
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to overwrite system files as root with arbitrary content through system backup file via specially crafted "BackupConfig" type IPC client requests to the fct...
Fortinet Forticlient
7.8
CVSSv3
CVE-2021-26089
An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase.
Fortinet Forticlient
5.5
CVSSv3
CVE-2018-9190
A null pointer dereference vulnerability in Fortinet FortiClientWindows 6.0.2 and previous versions allows malicious user to cause a denial of service via the NDIS miniport driver.
Fortinet Forticlient
7.8
CVSSv3
CVE-2018-9191
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and previous versions allows malicious users to execute unauthorized code or commands via the named pipe responsible for Forticlient updates.
Fortinet Forticlient
7.8
CVSSv3
CVE-2018-9193
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and previous versions allows malicious user to execute unauthorized code or commands via the parsing of the file.
Fortinet Forticlient
7.8
CVSSv3
CVE-2020-9291
An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
Fortinet Forticlient
9.8
CVSSv3
CVE-2019-17658
An unquoted service path vulnerability in the FortiClient FortiTray component of FortiClientWindows v6.2.2 and prior allow an malicious user to gain elevated privileges via the FortiClientConsole executable service path.
Fortinet Forticlient
1 Github repository
7.8
CVSSv3
CVE-2022-42470
A relative path traversal vulnerability in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an malicious user to execute unauthorized code or commands via sending a crafted request to a specific named pipe.
Fortinet Forticlient
8
CVSSv3
CVE-2021-22127
An improper input validation vulnerability in FortiClient for Linux 6.4.x prior to 6.4.3, FortiClient for Linux 6.2.x prior to 6.2.9 may allow an unauthenticated malicious user to execute arbitrary code on the host operating system as root via tricking the user into connecting to...
Fortinet Forticlient
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »