PSIRT Advisories
The following is a list of advisories for issues resolved in Fortinet products. The resolution of such issues is coordinated by the Fortinet Product Security Incident Response Team (PSIRT), a dedicated, global team that manages the receipt, investigation, and public reporting of information about security vulnerabilities and issues related to Fortinet products and services.
For details of how to raise a PSIRT Issue with Fortinet, please see our PSIRT Policy here.
An improper neutralization of input during web page generation in FortiWeb GUI interface may allow an unauthenticated, remote...
A buffer overflow vulnerability in the SSL VPN portal of FortiProxy may allow an unauthenticated, remote attacker to perform a...
A heap buffer overflow vulnerability in the FortiProxy SSL VPN web portal may cause the SSL VPN web service termination for logged...
An insufficient session expiration vulnerability in FortiIsolator may allow an attacker to reuse the unexpired admin user session...
An exposure of sensitive information to an unauthorized actor vulnerability in FortiGate may allow a remote authenticated attacker...
A blind SQL injection in the user interface of FortiWeb may allow an unauthenticated, remote attacker to execute arbitrary SQL...
A stack-based buffer overflow vulnerability in FortiWeb may allow an unauthenticated, remote attacker to overwrite the content...
A stack-based buffer overflow vulnerability in FortiWeb may allow a remote, unauthenticated attacker to crash the httpd daemon...
A format string vulnerability in FortiWeb may allow an authenticated, remote attacker to read the content of memory and retrieve...
An OS command injection vulnerability in FortiDeceptor may allow a remote authenticated attacker to execute arbitrary commands...
FortiClient and FortiOS AV engines may not immediately detect certain types of malformed or non-standard RAR archives, potentially...
During the RSA conference of February 26th 2020, researchers Štefan Svorencík and Robert Lipovsky disclosed a vulnerability in...
An improper neutralization of input vulnerability in the FortiGate may allow a remote attacker to perform a stored cross site...
A cleartext storage of sensitive information in GUI in FortiADC may allow a remote authenticated attacker to retrieve some sensitive...
An exposure of sensitive information to an unauthorized actor vulnerability in FortiMail may allow a remote, unauthenticated attacker...