Логотип exploitDog
bind:CVE-2021-41031
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-41031

Количество 2

Количество 2

nvd логотип

CVE-2021-41031

больше 3 лет назад

A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-qv22-gh9q-ccq2

больше 3 лет назад

A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-41031

A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-qv22-gh9q-ccq2

A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу