cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-21753,https://securityvulnerability.io/vulnerability/CVE-2024-21753,FortiClientEMS Vulnerability Allows Path Traversal and Denial of Service,"A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiClientEMS versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.13, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8, 1.2.1 through 1.2.5 allows attacker to perform a denial of service, read or write a limited number of files via specially crafted HTTP requests",Fortinet,Forticlientems,6,MEDIUM,0.0004600000102072954,false,false,false,false,,false,false,2024-09-10T14:37:48.466Z,0 CVE-2024-31489,https://securityvulnerability.io/vulnerability/CVE-2024-31489,FortiClient Zero-Day Vulnerability Allows Remote Man-in-the-Middle Attacks,"An improper certificate validation vulnerability in Fortinet's FortiClient software allows remote, unauthenticated attackers to exploit the communication channel between FortiGate and FortiClient during ZTNA tunnel creation. This flaw can potentially enable a Man-in-the-Middle attack, where attackers could intercept and manipulate data in transit, compromising the integrity and confidentiality of sensitive information exchanged during secure connections.",Fortinet,"Forticlientmac,Forticlientems,Forticlientlinux,Forticlientwindows",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-09-10T14:37:48.066Z,0 CVE-2024-33508,https://securityvulnerability.io/vulnerability/CVE-2024-33508,UnAuthenticated Command Injection Vulnerability in FortiClientEMS,"Fortinet FortiClientEMS software, specifically versions 7.2.0 through 7.2.4 and 7.0.0 through 7.0.12, is susceptible to a command injection vulnerability. This flaw arises from improper neutralization of special elements during command processing, identified as CWE-77. Exploitation of this vulnerability could enable an unauthenticated attacker to execute unauthorized operations on the underlying database by crafting malicious requests, potentially compromising data integrity and availability.",Fortinet,Forticlientems,7.3,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-09-10T14:37:45.323Z,0 CVE-2023-47534,https://securityvulnerability.io/vulnerability/CVE-2023-47534,Unauthorized Code Execution Vulnerability in FortiClientEMS,"A vulnerability exists in Fortinet's FortiClientEMS, specifically affecting versions 7.2.0 to 7.2.2, 7.0.0 to 7.0.10, 6.4.0 to 6.4.9, 6.2.0 to 6.2.9, and 6.0.0 to 6.0.8 due to improper handling of formula elements in CSV files. This flaw allows an attacker to execute unauthorized commands by sending specially crafted packets, thereby posing significant security risks to the integrity and functionality of the affected software environments.",Fortinet,Forticlientems,8.7,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-03-12T15:09:19.802Z,0 CVE-2023-48788,https://securityvulnerability.io/vulnerability/CVE-2023-48788,SQL Injection Vulnerability in Fortinet FortiClientEMS Products,"An SQL injection vulnerability exists in specific versions of Fortinet FortiClientEMS, allowing attackers to exploit improper neutralization of special elements used in SQL commands. This vulnerability permits unauthorized code execution via specially crafted packets, potentially compromising the affected systems and leading to unauthorized access and control. Users of FortiClientEMS should be aware of this vulnerability and take appropriate measures to mitigate risks.",Fortinet,Forticlientems,9.3,CRITICAL,0.9679099917411804,true,true,true,true,true,true,true,2024-03-12T15:09:18.527Z,8543 CVE-2023-45581,https://securityvulnerability.io/vulnerability/CVE-2023-45581,Improper Privilege Management Vulnerability Affects FortiClientEMS,"An improper privilege management vulnerability in Fortinet FortiClientEMS versions 7.2.0 through 7.2.2 and prior to 7.0.10 allows a Site administrator with Super Admin privileges to execute global administrative operations that impact multiple sites. This exploit can be initiated through crafted HTTP or HTTPS requests, posing a significant risk to system integrity and security across affected environments.",Fortinet,FortiClientEMS,7.2,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-02-15T13:59:23.728Z,0 CVE-2021-44172,https://securityvulnerability.io/vulnerability/CVE-2021-44172,,"An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClientEMS versions 7.0.0 through 7.0.4, 7.0.6 through 7.0.7, in all 6.4 and 6.2 version management interface may allow an unauthenticated attacker to gain information on environment variables such as the EMS installation path.",Fortinet,Forticlientems,3.6,LOW,0.0006900000153109431,false,false,false,false,,false,false,2023-09-13T12:30:09.839Z,0 CVE-2021-41028,https://securityvulnerability.io/vulnerability/CVE-2021-41028,,"A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.",Fortinet,"Fortinet Forticlientems, Forticlientwindows, Forticlientlinux, Forticlientmac",8.2,HIGH,0.000699999975040555,false,false,false,false,,false,false,2021-12-16T18:13:38.000Z,0 CVE-2021-36189,https://securityvulnerability.io/vulnerability/CVE-2021-36189,,"A missing encryption of sensitive data in Fortinet FortiClientEMS version 7.0.1 and below, version 6.4.4 and below allows attacker to information disclosure via inspecting browser decrypted data",Fortinet,Fortinet Forticlientems,6.8,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2021-12-09T09:10:03.000Z,0 CVE-2021-41030,https://securityvulnerability.io/vulnerability/CVE-2021-41030,,An authentication bypass by capture-replay vulnerability [CWE-294] in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below may allow an unauthenticated attacker to impersonate an existing user by intercepting and re-using valid SAML authentication messages.,Fortinet,Fortinet Forticlientems,5.4,MEDIUM,0.00215999991632998,false,false,false,false,,false,false,2021-12-08T17:51:12.000Z,0 CVE-2021-32592,https://securityvulnerability.io/vulnerability/CVE-2021-32592,,"An unsafe search path vulnerability in FortiClientWindows 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x and FortiClientEMS 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x may allow an attacker to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the search path.",Fortinet,"Fortinet Forticlientwindows, Forticlientems",7.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2021-12-01T11:27:11.000Z,0 CVE-2020-15940,https://securityvulnerability.io/vulnerability/CVE-2020-15940,,An improper neutralization of input vulnerability [CWE-79] in FortiClientEMS versions 6.4.1 and below and 6.2.9 and below may allow a remote authenticated attacker to inject malicious script/tags via the name parameter of various sections of the server.,Fortinet,Fortinet Forticlientems,4.1,MEDIUM,0.0006600000197067857,false,false,false,false,,false,false,2021-11-02T17:49:37.000Z,0 CVE-2021-24019,https://securityvulnerability.io/vulnerability/CVE-2021-24019,,"An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)",Fortinet,Fortinet Forticlientems,8.1,HIGH,0.002219999907538295,false,false,false,false,,false,false,2021-10-06T09:41:10.000Z,0 CVE-2020-15941,https://securityvulnerability.io/vulnerability/CVE-2020-15941,,A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages.,Fortinet,Fortinet Forticlientems,5.4,MEDIUM,0.0007200000109151006,false,false,false,false,,false,false,2021-10-06T09:27:32.000Z,0