Known vulnerabilities in Fortinet, Inc FortiOS 6.4.12 - page 2

Vendor: Fortinet, Inc
Website: https://www.fortinet.com/
Total Security Bulletins: 77

Security bulletins (77)

Secuity bulletin Severity Status Published
SB2025040963: LDAP credentials exposure in FortiOS Low
Patched
09.04.2025
SB2025040907: MitM attack in FortiOS High
Patched
09.04.2025
SB2025031208: Privilege escalation in FortiOS Low
Patched
12.03.2025
SB2025021205: Privilege escalation in FortiOS CLI Low
Patched
12.02.2025
SB20250211168: Incorrect privilege assignment in FortiOS Low
Patched
11.02.2025
SB2025012295: Remote denial of service in FortiOS IPsec Low
Patched
22.01.2025
SB2025011651: Multiple path traversal vulnerabilities in FortiOS Medium
Patched
16.01.2025
SB20241112154: Improper authentication in FortiOS fgfmd Medium
Patched
12.11.2024
SB2024081477: Real-time filesystem integrity check bypass in FortiOS Low
Patched
14.08.2024
SB2024081474: Insufficient session expiration in Fortinet products Low
Patched
14.08.2024
SB20240611284: Stack-based buffer overflow in FortiOS Low
Patched
11.06.2024
SB20240611283: Weak key derivation for backup file in FortiOS and FortiProxy Low
Patched
11.06.2024
SB20240611279: Stack-based buffer overflow in diag npu command in FortiOS Low
Patched
11.06.2024
SB20240611277: XSS on the reboot page in FortiOS and FortiProxy Low
Patched
11.06.2024
SB20240611274: Buffer overflow in fgfmd daemon for FortiOS, FortiProxy, FortiPAM and FortiSwitch Manager Medium
Patched
11.06.2024
SB2024052014: Format string errors in several Fortinet products Low
Patched
20.05.2024
SB2024051629: Double free in FortiOS Low
Patched
16.05.2024
SB2024051626: IP address spoofing in FortiOS and FortiProxy SSL-VPN Low
Patched
16.05.2024
SB2024020901: Remote code execution in FortiOS SSL-VPN Critical
Patched Exploited
09.02.2024
SB2023061310: Unauthenticated remote code execution in FortiOS and FortiProxy SSL-VPN Critical
Patched Exploited
13.06.2023


Showing elements 21 - 40 out of 77