Lucene search

K

CVE-2024-31492

🗓️ 10 Apr 2024 13:38:51Reported by fortinetType 
cve
 cve
🔗 web.nvd.nist.gov👁 29 Views

External control of file name or path vuln in FortiClientMac v7.2.3 & below, v7.0.10 & below installer may allow local attacker to execute arbitrary code or commands via writing malicious config file in /tmp before installation process

Show more
Related
Detection
Affected
Refs
Nvd
Node
fortinetforticlientRange7.0.67.0.11macos
OR
fortinetforticlientRange7.2.07.2.4macos
[
  {
    "vendor": "Fortinet",
    "product": "FortiClientMac",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.6",
        "lessThanOrEqual": "7.0.10",
        "status": "affected"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
10 Apr 2024 13:51Current
9.2High risk
Vulners AI Score9.2
CVSS37.8 - 8.2
EPSS0.0004
SSVC
29
.json
Report