The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of FortiGate

FortiOS: Cross Site Scripting via Web Proxy Disclaimer
An attacker can trigger a Cross Site Scripting via Web Proxy Disclaimer of FortiOS, in order to run JavaScript code in the context of the web site...
CERTFR-2017-AVI-392, CVE-2017-7739, FG-IR-17-168, VIGILANCE-VUL-24351
FortiOS: Cross Site Scripting via Login Disclaimer
An attacker can trigger a Cross Site Scripting via Login Disclaimer of FortiOS, in order to run JavaScript code in the context of the web site...
CVE-2017-7733, FG-IR-17-113, VIGILANCE-VUL-24233
FortiOS: denial of service via "params" Parameter
An attacker can generate a fatal error via "params" Parameter of FortiOS, in order to trigger a denial of service...
CVE-2017-14182, FG-IR-17-206, VIGILANCE-VUL-24232
WPA2: information disclosure via Key Reinstallation Attacks
An attacker can bypass access restrictions to data via Key Reinstallation Attacks of WPA2, in order to obtain sensitive information...
ARUBA-PSA-2017-007, CERTFR-2017-ALE-014, CERTFR-2017-AVI-357, CERTFR-2017-AVI-358, CERTFR-2017-AVI-359, CERTFR-2017-AVI-360, CERTFR-2017-AVI-361, CERTFR-2017-AVI-363, CERTFR-2017-AVI-373, CERTFR-2017-AVI-379, CERTFR-2017-AVI-383, CERTFR-2017-AVI-390, CERTFR-2017-AVI-441, CERTFR-2017-AVI-478, CERTFR-2018-AVI-014, CERTFR-2018-AVI-048, cisco-sa-20171016-wpa, CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088, DLA-1150-1, DLA-1200-1, DLA-1573-1, DSA-3999-1, FEDORA-2017-12e76e8364, FEDORA-2017-45044b6b33, FEDORA-2017-60bfb576b7, FEDORA-2017-cfb950d8f4, FEDORA-2017-fc21e3856b, FG-IR-17-196, FreeBSD-SA-17:07.wpa, HT208221, HT208222, HT208334, HT208394, JSA10827, K-511282, KRACK Attacks, openSUSE-SU-2017:2755-1, openSUSE-SU-2017:2846-1, openSUSE-SU-2017:2896-1, openSUSE-SU-2017:2905-1, openSUSE-SU-2017:3144-1, openSUSE-SU-2020:0222-1, RHSA-2017:2907-01, RHSA-2017:2911-01, SSA:2017-291-02, SSA-418456, SSA-901333, STORM-2017-005, SUSE-SU-2017:2745-1, SUSE-SU-2017:2752-1, SUSE-SU-2017:2847-1, SUSE-SU-2017:2869-1, SUSE-SU-2017:2908-1, SUSE-SU-2017:2920-1, SUSE-SU-2017:3106-1, SUSE-SU-2017:3165-1, SUSE-SU-2017:3265-1, SUSE-SU-2017:3267-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0171-1, Synology-SA-17:60, Synology-SA-17:60 KRACK, USN-3455-1, USN-3505-1, VIGILANCE-VUL-24144, VU#228519
FortiOS: information disclosure via IKE Vendor ID
An attacker can bypass access restrictions to data via IKE Vendor ID of FortiOS, in order to obtain sensitive information...
CERTFR-2017-AVI-253, CVE-2017-3130, FG-IR-17-073, VIGILANCE-VUL-23483
FortiOS: security improvement via SMBv1 Support Disabled
The security of FortiOS was improved via SMBv1 Support Disabled...
CERTFR-2017-AVI-253, FG-IR-17-103, VIGILANCE-VUL-23482
FortiOS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of FortiOS, in order to run JavaScript code in the context of the web site...
CERTFR-2017-AVI-240, CVE-2017-3131, CVE-2017-3132, CVE-2017-3133, FG-IR-17-104, VIGILANCE-VUL-23387
Fortinet FortiOS: Cross Site Scripting via comments
An attacker can trigger a Cross Site Scripting via comments in Fortinet FortiOS, in order to run JavaScript code in the context of the web site...
CVE-2017-7734, CVE-2017-7735, FG-IR-16-047, FG-IR-16-048, FG-IR-17-127, VIGILANCE-VUL-22984
FortiOS: Cross Site Scripting via Policy Global-label Parameter
An attacker can trigger a Cross Site Scripting via Policy Global-label Parameter of FortiOS, in order to run JavaScript code in the context of the web site...
CVE-2017-3128, FG-IR-17-057, VIGILANCE-VUL-22763
FortiOS: Cross Site Scripting via srcintf
An attacker can trigger a Cross Site Scripting via srcintf of FortiOS, in order to run JavaScript code in the context of the web site...
CVE-2017-3127, FG-IR-17-017, VIGILANCE-VUL-22570
Our database contains other pages. You can request a free trial to read them.

Display information about FortiGate: