[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-35616":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-05T03:10:34.883Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":87,"aliases":88,"duplicate_of":9,"upstream":89,"downstream":90,"duplicates":91,"related":92,"reserved_at":9,"published_at":93,"modified_at":94,"state":95,"summary":96,"references_raw":105,"kevs":111,"epss":112,"epss_history":115,"metrics":117,"affected":126},"CVE-2026-35616","A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-284","Improper Access Control","The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.","weakness","Incomplete","Pillar",[19,23,27,31,35,39,43,47,51,55,59,63,67,71,75,79,83],{"id":20,"name":21,"techniques":22},"CAPEC-19","Embedding Scripts within Scripts",[],{"id":24,"name":25,"techniques":26},"CAPEC-441","Malicious Logic Insertion",[],{"id":28,"name":29,"techniques":30},"CAPEC-478","Modification of Windows Service Configuration",[],{"id":32,"name":33,"techniques":34},"CAPEC-479","Malicious Root Certificate",[],{"id":36,"name":37,"techniques":38},"CAPEC-502","Intent Spoof",[],{"id":40,"name":41,"techniques":42},"CAPEC-503","WebView Exposure",[],{"id":44,"name":45,"techniques":46},"CAPEC-536","Data Injected During Configuration",[],{"id":48,"name":49,"techniques":50},"CAPEC-546","Incomplete Data Deletion in a Multi-Tenant Environment",[],{"id":52,"name":53,"techniques":54},"CAPEC-550","Install New Service",[],{"id":56,"name":57,"techniques":58},"CAPEC-551","Modify Existing Service",[],{"id":60,"name":61,"techniques":62},"CAPEC-552","Install Rootkit ",[],{"id":64,"name":65,"techniques":66},"CAPEC-556","Replace File Extension Handlers",[],{"id":68,"name":69,"techniques":70},"CAPEC-558","Replace Trusted Executable",[],{"id":72,"name":73,"techniques":74},"CAPEC-562","Modify Shared File",[],{"id":76,"name":77,"techniques":78},"CAPEC-563","Add Malicious File to Shared Webroot",[],{"id":80,"name":81,"techniques":82},"CAPEC-564","Run Software at Logon",[],{"id":84,"name":85,"techniques":86},"CAPEC-578","Disable Security Software",[],[],[],[],[],[],[],"2026-04-04T00:38:35.828Z","2026-04-04T10:53:29.363Z","Received",{"cisa_kev":97,"cisa_ransomware":97,"cisa_vendor":9,"epss_severity":98,"epss_score":99,"severity":100,"severity_score":101,"severity_version":102,"severity_source":103,"severity_vector":104,"severity_status":95},false,"low",0.00034,"critical",9.8,"v3.1","nvd","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[106],{"url":107,"sources":108,"tags":110},"https://fortiguard.fortinet.com/psirt/FG-IR-26-099",[109,103],"cve.org",[],[],{"date":113,"score":99,"percentile":114},"2026-04-04",0.10127,[116],{"date":113,"score":99,"percentile":114},[118,124],{"source":109,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":119,"cvss_v4_0":9},{"baseScore":120,"baseSeverity":121,"vectorString":122,"impactScore":101,"exploitabilityScore":123},9.1,"CRITICAL","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",10,{"source":103,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":125,"cvss_v4_0":9},{"baseScore":101,"baseSeverity":121,"vectorString":104,"impactScore":101,"exploitabilityScore":123},[127],{"ecosystem":9,"name":128,"vendor":129,"product":130,"cpe_part":131,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":132},"FortiClientEMS","fortinet","forticlientems","a",[133],{"version":134,"is_range":135,"range_type":109,"version_start":136,"version_start_type":137,"version_end":138,"version_end_type":137,"fixed_in":9},">= 7.4.5, \u003C= 7.4.6",true,"7.4.5","including","7.4.6"]