Vulnerabilities > Fortinet > Forticlient
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-02-02 | CVE-2015-1453 | Cryptographic Issues vulnerability in Fortinet Forticlient 5.2.3.091 The qm class in Fortinet FortiClient 5.2.3.091 for Android uses a hardcoded encryption key of FoRtInEt!AnDrOiD, which makes it easier for attackers to obtain passwords and possibly other sensitive data by leveraging the key to decrypt data in the Shared Preferences. | 5.0 |
2013-06-25 | CVE-2013-4669 | Cryptographic Issues vulnerability in Fortinet Forticlient, Forticlient Lite and Forticlient SSL VPN FortiClient before 4.3.5.472 on Windows, before 4.0.3.134 on Mac OS X, and before 4.0 on Android; FortiClient Lite before 4.3.4.461 on Windows; FortiClient Lite 2.0 through 2.0.0223 on Android; and FortiClient SSL VPN before 4.0.2258 on Linux proceed with an SSL session after determining that the server's X.509 certificate is invalid, which allows man-in-the-middle attackers to obtain sensitive information by leveraging a password transmission that occurs before the user warning about the certificate problem. | 5.4 |
2009-04-07 | CVE-2009-1262 | USE of Externally-Controlled Format String vulnerability in Fortinet Forticlient 3.0.614 Format string vulnerability in Fortinet FortiClient 3.0.614, and possibly earlier, allows local users to execute arbitrary code via format string specifiers in the VPN connection name. | 7.2 |
2005-12-29 | CVE-2005-4570 | Denial Of Service vulnerability in Multiple Fortinet Products IKE Exchange The Internet Key Exchange version 1 (IKEv1) implementations in Fortinet FortiOS 2.50, 2.80 and 3.0, FortiClient 2.0,; and FortiManager 2.80 and 3.0 allow remote attackers to cause a denial of service (termination of a process that is automatically restarted) via IKE packets with invalid values of certain IPSec attributes, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. | 7.8 |