Vulnerabilities of FGTFGT vulnerability: privilege escalation
An attacker can use the Guest account of FortiGate, in order to read and modify data related to others users.FGT vulnerability: bypassing via CAB, CHM, ELF, EXE, Office, RAR, TAR, ZIP
An attacker can create an archive or a program containing a virus, which is not detected by Fortinet FortiGate.FGT vulnerability: format string attack
A local attacker can generate a format string attack in order to elevate his privileges.FGT vulnerability: man-in-the-middle attack
When the administrator did not change the default certification authority for SSL/TLS inspection of FortiGate, an attacker can create a fake server/proxy and intercept user's data.FGT vulnerability: several vulnerabilities
An attacker can use several vulnerabilities of FortiGate appliances, in order to execute script code in privileged contexts.Display other vulnerabilities of FGT described by Vigil@nce...
Display information about FGT: