Vulnerabilities of FGTFGT vulnerability: information disclosure via POODLE on TLS
An attacker, located as a Man-in-the-Middle, can decrypt a Terminating TLS session, in order to obtain sensitive information.FGT vulnerability: information disclosure via Heartbeat, Heartbleed
An attacker can use the Heartbeat protocol on an application compiled with OpenSSL, in order to obtain sensitive information, such as keys stored in memory.FGT vulnerability: privilege escalation
An attacker can use the Guest account of FortiGate, in order to read and modify data related to others users.FGT vulnerability: bypassing via CAB, CHM, ELF, EXE, Office, RAR, TAR, ZIP
An attacker can create an archive or a program containing a virus, which is not detected by Fortinet FortiGate.FGT vulnerability: format string attack
A local attacker can generate a format string attack in order to elevate his privileges.Display other vulnerabilities of FGT described by Vigil@nce...
Display information about FGT: