[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146396

 
 

909

 
 

117043

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 17614 Download | Alert*

The host is installed with Fortinet FortiClient through 6.0.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an issue in named pipes. Successful exploitation allows attacker to execute unauthorized code.

The host is installed with Fortinet FortiClient through 6.0.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle command injection. Successful exploitation allows attacker to execute unauthorized code.

The host is installed with Fortinet FortiClient through 6.0.2 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to handle an issue in the NDIS miniport driver. Successful exploitation allows attacker to cause a denial of service.

The host is installed with Fortinet FortiClient through 5.4.3 or with 5.6.0 is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an untrusted certificate chain. Successful exploitation allows attacker to gain privilege.

The host is installed with Fortinet FortiClient 5.4.1 or 5.4.2 is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an issue in FortiClientNamedPipe. Successful exploitation could allow a low privileged user to execute arbitrary code.

The host is installed with Fortinet FortiClient before 5.2.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in certain .sys drivers. Successful exploitation could allow local attackers to obtain a privileged handle to a PID and possibly have unspecified other impact.

The host is installed with Fortinet FortiClient through 6.0.6 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to handle the use of a hardcoded cryptographic key. Successful exploitation allows attackers to eavesdrop on and modify information.

The host is installed with Fortinet FortiClient through 5.6.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the use of a static encryption key and weak encryption algorithms. Successful exploitation allows attackers to see each other's VPN authentication credentials.

The host is installed with Fortinet FortiClient through 5.6.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle improperly secured storage locations. Successful exploitation allows users to see each other's VPN authentication credentials.

The host is installed with Fortinet FortiClient before 5.2.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in certain .sys drivers. Successful exploitation could allow local attackers to write to arbitrary memory locations.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   1761

© SecPod Technologies