Software catalogue for Fortinet, Inc - page 3

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › Fortinet, Inc

Software catalogue for Fortinet, Inc - page 3

Fortinet Connect Fortinet FortiClient for Windows FortiOS FortiOS-6K7K FortiPAM FortiPortal FortiPresence FortiProxy FortiRecorder FortiSandbox
FortiSASE FortiSDNConnector FortiSIEM FortiSIEM Windows Agent FortiSOAR FortiSOAR IMAP connector FortiSRA FortiSwitch FortiSwitch Manager FortiTester


Showing elements 41 - 60 out of 73

  • Previous
  • 2
  • 3
  • 4
  • Next

Latest security bulletins

Secuity bulletin Severity Status Published
SB2026021047: SSL-VPN symlink persistence patch bypass in FortiOS High
Patched Exploited
10.02.2026
SB2026021046: Format String error in FortiOS CAPWAP fast-failover mode Low
Patched
10.02.2026
SB2026021045: HTTP request smuggling in FortiOS GUI Medium
Patched
10.02.2026
SB2026021044: Firewall policy bypass in FortiOS FSSO Terminal Services Agent Low
Patched
10.02.2026
SB2026021043: Link following in Fortinet FortiClient for Windows Low
Patched
10.02.2026
SB2026021042: Missing authorization in FortiAuthenticator Low
Patched
10.02.2026
SB2026021041: LDAP authentication bypass in FortiOS High
Patched
10.02.2026
SB2026021040: Reflected XSS in FortiSandbox Low
Patched
10.02.2026
SB2026020968: Pre-authenticated SQL injection in FortiClientEMS Critical
Patched
09.02.2026
SB20260206121: FortiPortal update for OpenSSL High
Patched Public exploit
06.02.2026

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or