Fortinet FortiClient Enterprise Management Server (EMS) 7.0.1

CPE Details

Fortinet FortiClient Enterprise Management Server (EMS) 7.0.1
7.0.1
2021-12-02
14h26 +00:00
2021-12-02
14h30 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.1:*:*:*:*:*:*:*

Informations

Vendor

fortinet

Product

forticlient_enterprise_management_server

Version

7.0.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-33508 2024-09-10 14h37 +00:00 An improper neutralization of special elements used in a command ('Command Injection') vulnerability [CWE-77] in Fortinet FortiClientEMS 7.2.0 through 7.2.4, 7.0.0 through 7.0.12 may allow an unauthenticated attacker to execute limited and temporary operations on the underlying database via crafted requests.
7.3
Haute
CVE-2023-48788 2024-03-12 15h09 +00:00 A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.
9.8
Critique
CVE-2023-45581 2024-02-15 13h59 +00:00 An improper privilege management vulnerability [CWE-269] in Fortinet FortiClientEMS version 7.2.0 through 7.2.2 and before 7.0.10 allows an Site administrator with Super Admin privileges to perform global administrative operations affecting other sites via crafted HTTP or HTTPS requests.
8.8
Haute
CVE-2021-36189 2021-12-09 08h10 +00:00 A missing encryption of sensitive data in Fortinet FortiClientEMS version 7.0.1 and below, version 6.4.4 and below allows attacker to information disclosure via inspecting browser decrypted data
6.8
Moyen
CVE-2021-41030 2021-12-08 16h51 +00:00 An authentication bypass by capture-replay vulnerability [CWE-294] in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below may allow an unauthenticated attacker to impersonate an existing user by intercepting and re-using valid SAML authentication messages.
9.1
Critique