Логотип exploitDog
bind:CVE-2020-12820
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-12820

Количество 3

Количество 3

nvd логотип

CVE-2020-12820

около 1 года назад

Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-8hp7-6mr2-85pv

около 1 года назад

Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.

CVSS3: 5.4
EPSS: Низкий
fstec логотип

BDU:2022-06594

больше 5 лет назад

Уязвимость демона FortiClient NAC (fcnacd) операционных систем FortiOS, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-12820

Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.

CVSS3: 5.4
4%
Низкий
около 1 года назад
github логотип
GHSA-8hp7-6mr2-85pv

Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.

CVSS3: 5.4
4%
Низкий
около 1 года назад
fstec логотип
BDU:2022-06594

Уязвимость демона FortiClient NAC (fcnacd) операционных систем FortiOS, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 8.8
4%
Низкий
больше 5 лет назад

Уязвимостей на страницу