Page 2 of 20 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

A relative path traversal vulnerability in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe. • https://fortiguard.com/psirt/FG-IR-22-320 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe. • https://fortiguard.com/psirt/FG-IR-22-336 • CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 all versions may allow a local attacker to escalate their privileges via modifying the installer upon upgrade. • https://fortiguard.com/psirt/FG-IR-22-481 • CWE-494: Download of Code Without Integrity Check •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiClient for Mac versions 7.0.0 through 7.0.5 may allow a local authenticated attacker to obtain the SSL-VPN password in cleartext via running a logstream for the FortiTray process in the terminal. Una exposición de información sensible a una vulnerabilidad de un actor no autorizado [CWE-200] en FortiClient para Mac versiones 7.0.0 a 7.0.5 puede permitir que un atacante autenticado local obtenga la contraseña SSL-VPN en texto sin cifrar mediante la ejecución de un flujo de registro para el proceso FortiTray en la terminal. • https://fortiguard.com/psirt/FG-IR-22-246 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service. Una vulnerabilidad de salto de ruta relativa [CWE-23] en FortiClient para Windows versiones 7.0.2 y anteriores, 6.4.6 y anteriores y 6.2.9 y anteriores, puede permitir a un atacante local no privilegiado escalar sus privilegios a SYSTEM por medio de la tubería con nombre responsable del servicio FortiESNAC • https://fortiguard.com/advisory/FG-IR-21-190 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •