📦 Fortiauthenticator
by Fortinet
🔍 What is Fortiauthenticator?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows attackers to poison web caches by sending crafted HTTP requests with malicious Host headers to Fortinet devices. Attackers can redirect users to arbitrary malicious servers, ...
This CVE describes an open redirect vulnerability in Fortinet FortiAuthenticator that allows attackers to craft malicious URLs that redirect users to arbitrary, potentially malicious websites. The vul...
A forced browsing vulnerability in Fortinet FortiAuthenticator allows authenticated attackers with sponsor permissions to access and download device logs via specific endpoints. This affects FortiAuth...