{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreicwa3x4j7ca7ourw2w7lujtgaoxpucuyxboauq3k5h5ror2w5cmge",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3miq6nozrspd2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreigh5alg6ppem5vhobqn3e425drwoe3qzjzj3jh66urtjmrrl4wvti"
    },
    "mimeType": "image/jpeg",
    "size": 743720
  },
  "path": "/2026/04/fortinet-patches-actively-exploited-cve.html",
  "publishedAt": "2026-04-05T04:32:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as CVE-2026-35616 (CVSS score: 9.1), has been described as a pre-authentication API access bypass leading to privilege escalation. \"An improper access control vulnerability [CWE-284] in FortiClient EMS may allow an",
  "title": "Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS"
}