CVE-2024-35281
LOWDescription
An improper isolation or compartmentalization vulnerability [CWE-653] in FortiClientMac version 7.4.2 and below, version 7.2.8 and below, 7.0 all versions and FortiVoiceUCDesktop 3.0 all versions desktop application may allow an authenticated attacker to inject code via Electron environment variables.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| fortinet | forticlient |
| fortinet | forticlient |
| fortinet | fortifone_softclient |
References
Advisories & Patches
Frequently Asked Questions
What is CVE-2024-35281? +
How severe is CVE-2024-35281? +
What products are affected by CVE-2024-35281? +
How do I check if I'm vulnerable to CVE-2024-35281? +
Related Vulnerabilities
In Grafana, the wrong permission is applied to the alert rule write API endpoint, allowing users with permission to write …
When using the Grafana Databricks Datasource Plugin, if Oauth passthrough is enabled on the datasource, and multiple users are using …
When using the Grafana Snowflake Datasource Plugin, if Oauth passthrough is enabled on the datasource, and multiple users are using …
Enabled IP Forwarding feature in B&R Automation Runtime versions before 6.0.2 may allow remote attack-ers to compromise network security by …
A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network …
lunasvg v2.3.9 was discovered to contain a segmentation violation via the component composition_solid_source_over.