Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fortinet vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2021-43065
A incorrect permission assignment for critical resource in Fortinet FortiNAC version 9.2.0, version 9.1.3 and below, version 8.8.9 and below allows malicious user to gain higher privileges via the access to sensitive system data.
Fortinet Fortinac 9.2.0
Fortinet Fortinac
7.2
CVSSv2
CVE-2021-42759
A violation of secure design principles in Fortinet Meru AP version 8.6.1 and below, version 8.5.5 and below allows malicious user to execute unauthorized code or commands via crafted cli commands.
Fortinet Meru Firmware
7.2
CVSSv2
CVE-2021-41021
A privilege escalation vulnerability in FortiNAC versions 8.8.8 and below and 9.1.2 and below may allow an admin user to escalate the privileges to root via the sudo command.
Fortinet Fortinac 9.1.2
Fortinet Fortinac 9.1.1
Fortinet Fortinac 9.1.0
Fortinet Fortinac 8.8.8
Fortinet Fortinac 8.8.7
Fortinet Fortinac 8.8.6
Fortinet Fortinac 8.8.5
Fortinet Fortinac 8.8.4
Fortinet Fortinac 8.8.3
Fortinet Fortinac 8.8.0
Fortinet Fortinac 8.8.1
Fortinet Fortinac 8.8.2
7.2
CVSSv2
CVE-2021-36183
An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged malicious user to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates.
Fortinet Forticlient
7.2
CVSSv2
CVE-2021-26089
An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase.
Fortinet Forticlient
7.2
CVSSv2
CVE-2019-15708
A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig comman...
Fortinet Fortiap
Fortinet Fortiap-s
Fortinet Fortiap-s 6.2.0
Fortinet Fortiap-s 6.2.1
Fortinet Fortiap-u
Fortinet Fortiap-w2
Fortinet Fortiap-w2 6.2.0
Fortinet Fortiap-w2 6.2.1
7.2
CVSSv2
CVE-2019-15711
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
Fortinet Forticlient
7.2
CVSSv2
CVE-2019-17650
An Improper Neutralization of Special Elements used in a Command vulnerability in one of FortiClient for Mac OS root processes, may allow a local user of the system on which FortiClient is running to execute unauthorized code as root by bypassing a security check.
Fortinet Forticlient
7.2
CVSSv2
CVE-2017-14187
A local privilege escalation and local code execution vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.8, and 5.2 and below versions allows malicious user to execute unauthorized binary program contained on an USB drive plugged into a FortiGate via linking the afore...
Fortinet Fortios
7.2
CVSSv2
CVE-2015-7362
Fortinet FortiClient Linux SSLVPN before build 2313, when installed on Linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program.
Fortinet Forticlient
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »