{"vulnerability": "CVE-2022-26113", "sightings": [{"uuid": "8f9e09b1-ac5d-4702-a067-d5d3a2418cd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26113", "type": "seen", "source": "https://t.me/cibsecurity/46546", "content": "\u203c CVE-2022-26113 \u203c\n\nAn execution with unnecessary privileges vulnerability [CWE-250] in FortiClientWindows 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.10 may allow a local attacker to perform an arbitrary file write on the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T18:40:45.000000Z"}, {"uuid": "1629a30e-e152-4f14-812c-d454501fbdd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26113", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6714", "content": "#exploit\n1. CVE-2022-26113:\nFortiClient Arbitrary File Write As SYSTEM\nhttps://rhinosecuritylabs.com/research/cve-2022-26113-forticlient-arbitrary-file-write-as-system\n\n2. CVE-2022-32250:\nLinux/Ubuntu Kernel LPE\nhttps://github.com/theori-io/CVE-2022-32250-exploit", "creation_timestamp": "2022-09-01T11:03:01.000000Z"}]}