Orange Applications for Business
Vigil@nce Vigil@nce Vigil@nce
analyzing computer vulnerabilities since 1999
  home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free trial free trial
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
recent vulnerabilities recent vulnerabilities
tracked products tracked products
RSS feed RSS feed
vulnerable product
Vulnerabilities of FGT

FGT vulnerability: decrypting session, POODLE
An attacker, located as a Man-in-the-Middle, can decrypt a SSL 3.0 session, in order to obtain sensitive information.

FGT vulnerability: Cross Site Scripting of mkey
An attacker can trigger a Cross Site Scripting in mkey of Fortinet FortiGate, in order to execute JavaScript code in the context of the web site.

FGT vulnerability: man-in-the-middle attack
When the administrator did not change the default certification authority for SSL/TLS inspection of FortiGate, an attacker can create a fake server/proxy and intercept user's data.

FGT vulnerability: several vulnerabilities
An attacker can use several vulnerabilities of FortiGate appliances, in order to execute script code in privileged contexts.

FGT vulnerability: url filtering bypass
An attacker can use a special HTTP query in order to bypass web filtering of FortiGate.

Display other vulnerabilities of FGT described by Vigil@nce...

Display information about FGT:



















Copyright 1999-2015 Vigil@nce. Vigil@nce is a service from Orange Applications for Business. Site map. Legal notice. Version française