Lucene search

K
FortinetForticlient7.0.6

4 matches found

CVE
CVE
added 2024/04/09 3:15 p.m.58 views

CVE-2023-45590

An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website

9.6CVSS9.4AI score0.00991EPSS
CVE
CVE
added 2023/06/13 9:15 a.m.52 views

CVE-2022-33877

An incorrect default permission [CWE-276] vulnerability in FortiClient (Windows) versions 7.0.0 through 7.0.6 and 6.4.0 through 6.4.8 and FortiConverter (Windows) versions 6.2.0 through 6.2.1, 7.0.0 and all versions of 6.0.0 may allow a local authenticated attacker to tamper with files in the insta...

7CVSS5.2AI score0.00034EPSS
CVE
CVE
added 2024/04/10 1:51 p.m.48 views

CVE-2024-31492

An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process.

8.2CVSS9.2AI score0.00109EPSS
CVE
CVE
added 2025/03/14 4:15 p.m.41 views

CVE-2023-45588

An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process.

8.2CVSS8.4AI score0.00033EPSS