Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet forticlient vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2019-5589
An Unsafe Search Path vulnerability in FortiClient Online Installer (Windows version prior to 6.0.6) may allow an unauthenticated, remote attacker with control over the directory in which FortiClientOnlineInstaller.exe resides to execute arbitrary code on the system via uploading...
Fortinet Forticlient
436
VMScore
CVE-2018-9190
A null pointer dereference vulnerability in Fortinet FortiClientWindows 6.0.2 and previous versions allows malicious user to cause a denial of service via the NDIS miniport driver.
Fortinet Forticlient
445
VMScore
CVE-2017-17543
Users' VPN authentication credentials are unsafely encrypted in Fortinet FortiClient for Windows 5.6.0 and below versions, FortiClient for Mac OSX 5.6.0 and below versions and FortiClient SSLVPN Client for Linux 4.4.2335 and below versions, due to the use of a static encrypt...
Fortinet Forticlient
Fortinet Forticlient Sslvpn Client
356
VMScore
CVE-2017-14184
An Information Disclosure vulnerability in Fortinet FortiClient for Windows 5.6.0 and below versions, FortiClient for Mac OSX 5.6.0 and below versions and FortiClient SSLVPN Client for Linux 4.4.2334 and below versions allows regular users to see each other's VPN authenticat...
Fortinet Forticlient
Fortinet Forticlient Sslvpn Client
677
VMScore
CVE-2017-7344
A privilege escalation in Fortinet FortiClient Windows 5.4.3 and previous versions as well as 5.6.0 allows malicious user to gain privilege via exploiting the Windows "security alert" dialog thereby popping up when the "VPN before logon" feature is enabled and...
Fortinet Forticlient 5.6.0
Fortinet Forticlient
801
VMScore
CVE-2016-8493
In FortiClientWindows 5.4.1 and 5.4.2, an attacker may escalate privilege via a FortiClientNamedPipe vulnerability.
Fortinet Forticlient 5.4.2
Fortinet Forticlient 5.4.1
641
VMScore
CVE-2015-7362
Fortinet FortiClient Linux SSLVPN before build 2313, when installed on Linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program.
Fortinet Forticlient
215
VMScore
CVE-2015-4077
The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient prior to 5.2.4 allow local users to read arbitrary kernel memory via a 0x22608C ioctl call.
Fortinet Forticlient
1 EDB exploit
641
VMScore
CVE-2015-5735
The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient prior to 5.2.4 allow local users to write to arbitrary memory locations via a 0x226108 ioctl call.
Fortinet Forticlient
736
VMScore
CVE-2015-5736
The Fortishield.sys driver in Fortinet FortiClient prior to 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.
Fortinet Forticlient
3 EDB exploits
3 Github repositories
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »