analyzing computer vulnerabilities since 1999
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
Vulnerabilities of FGT
FGT vulnerability: decrypting session, POODLE
An attacker, located as a Man-in-the-Middle, can decrypt a SSL 3.0 session, in order to obtain sensitive information.
FGT vulnerability: Cross Site Scripting of mkey
FGT vulnerability: man-in-the-middle attack
When the administrator did not change the default certification authority for SSL/TLS inspection of FortiGate, an attacker can create a fake server/proxy and intercept user's data.
FGT vulnerability: several vulnerabilities
An attacker can use several vulnerabilities of FortiGate appliances, in order to execute script code in privileged contexts.
FGT vulnerability: url filtering bypass
An attacker can use a special HTTP query in order to bypass web filtering of FortiGate.
Display other vulnerabilities of FGT described by Vigil@nce...
Display information about FGT:
. Vigil@nce is a service from
Orange Applications for Business