Lucene search

K

7 matches found

CVE
CVE
added 2025/05/28 8:15 a.m.60 views

CVE-2025-25251

An Incorrect Authorization vulnerability [CWE-863] in FortiClient Mac 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 may allow a local attacker to escalate privileges via crafted XPC messages.

7.8CVSS7.7AI score0.00019EPSS
CVE
CVE
added 2025/02/11 5:15 p.m.55 views

CVE-2024-40586

An Improper Access Control vulnerability [CWE-284] in FortiClient Windows version 7.4.0, version 7.2.6 and below, version 7.0.13 and below may allow a local user to escalate his privileges via FortiSSLVPNd service pipe.

6.7CVSS6.5AI score0.00022EPSS
CVE
CVE
added 2025/01/14 2:15 p.m.51 views

CVE-2024-50564

A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.

3.3CVSS3.9AI score0.00023EPSS
CVE
CVE
added 2025/02/11 5:15 p.m.49 views

CVE-2024-52968

An improper authentication in Fortinet FortiClientMac 7.0.11 through 7.2.4 allows attacker to gain improper access to MacOS via empty password.

8.4CVSS6.8AI score0.00045EPSS
CVE
CVE
added 2025/05/28 8:15 a.m.47 views

CVE-2025-24473

A exposure of sensitive system information to an unauthorized control sphere in Fortinet FortiClientWindows versions 7.2.0 through 7.2.1 may allow an unauthorized remote attacker to view application information via navigation to a hosted webpage, if Windows is configured to accept incoming connecti...

3.7CVSS6.6AI score0.00055EPSS
CVE
CVE
added 2025/03/14 4:15 p.m.41 views

CVE-2023-45588

An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process.

8.2CVSS8.4AI score0.00033EPSS
CVE
CVE
added 2025/06/10 5:19 p.m.32 views

CVE-2024-54019

A improper validation of certificate with host mismatch in Fortinet FortiClientWindows version 7.4.0, versions 7.2.0 through 7.2.6, and 7.0 all versions allow an unauthorized attacker to redirect VPN connections via DNS spoofing or another form of redirection.

6.5CVSS5.1AI score0.00026EPSS