Lucene search

K
FortinetForticlient6.2.1

7 matches found

CVE
CVE
added 2019/11/21 3:15 p.m.102 views

CVE-2018-9195

Use of a hardcoded cryptographic key in the FortiGuard services communication protocol may allow a Man in the middle with knowledge of the key to eavesdrop on and modify information (URL/SPAM services in FortiOS 5.6, and URL/SPAM/AV services in FortiOS 6.0.; URL rating in FortiClient) sent and rece...

5.9CVSS5.5AI score0.00297EPSS
CVE
CVE
added 2020/06/01 7:15 p.m.71 views

CVE-2020-9291

An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.

7.8CVSS7.6AI score0.00107EPSS
CVE
CVE
added 2019/11/21 4:15 p.m.47 views

CVE-2019-17650

An Improper Neutralization of Special Elements used in a Command vulnerability in one of FortiClient for Mac OS root processes, may allow a local user of the system on which FortiClient is running to execute unauthorized code as root by bypassing a security check.

7.8CVSS7.7AI score0.00119EPSS
CVE
CVE
added 2020/02/06 4:15 p.m.44 views

CVE-2019-16152

A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to cause FortiClient processes running under root privilege crashes via sending specially crafted IPC client requests to the fctsched process due the nanomsg not been correctly vali...

6.8CVSS6.6AI score0.00352EPSS
CVE
CVE
added 2020/02/07 3:15 p.m.42 views

CVE-2019-16155

A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to overwrite system files as root with arbitrary content through system backup file via specially crafted "BackupConfig" type IPC client requests to the fctsched process. Further more, ...

7.1CVSS7.3AI score0.00044EPSS
CVE
CVE
added 2020/02/06 4:15 p.m.39 views

CVE-2019-15711

A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.

7.8CVSS7.8AI score0.00044EPSS
CVE
CVE
added 2020/02/06 4:15 p.m.32 views

CVE-2019-17652

A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv dat...

6.8CVSS6.8AI score0.00425EPSS