The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of FortiManager

FortiAnalyzer, FortiManager: privilege escalation via SSH Port Forwarding
An attacker can bypass restrictions via SSH Port Forwarding of FortiAnalyzer / FortiManager, in order to escalate his privileges...
CERTFR-2020-AVI-395, CVE-2004-1653, FG-IR-19-292, VIGILANCE-VUL-32649
FortiAnalyzer/FortiManager: information disclosure via Hard-coded Cryptographic Key
An attacker can bypass access restrictions to data via Hard-coded Cryptographic Key of FortiAnalyzer/FortiManager, in order to obtain sensitive information...
CVE-2020-9289, FG-IR-19-007, VIGILANCE-VUL-32531
Fortinet FortiManager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Fortinet FortiManager, in order to run JavaScript code in the context of the web site...
CERTFR-2020-AVI-146, CVE-2019-16158, FG-IR-19-271, VIGILANCE-VUL-31767
FortiManager: information disclosure via Cross-Site WebSocket Hijacking
An attacker can bypass access restrictions to data via Cross-Site WebSocket Hijacking of FortiManager, in order to obtain sensitive information...
CERTFR-2020-AVI-093, CVE-2019-17654, FG-IR-19-191, VIGILANCE-VUL-31602
FortiOS: information disclosure via Backup Hard-coded Cryptographic Key
An attacker can bypass access restrictions to data via Backup Hard-coded Cryptographic Key of FortiOS, in order to obtain sensitive information...
CERTFR-2019-AVI-584, CVE-2019-6693, FG-IR-19-007, VIGILANCE-VUL-30915
Fortinet FortiOS, FortiManager: Man-in-the-Middle via Improper Certificate Revocation
An attacker can act as a Man-in-the-Middle via Improper Certificate Revocation on Fortinet FortiOS, FortiManager, in order to read or write data in the session...
CERTFR-2019-AVI-351, FG-IR-19-144, VIGILANCE-VUL-29850
Intel processors: information disclosure via performance measurement
An attacker can measure performances of his process, in order to get sensitive information about other process or, if the host is virtualized, about other guest systems...
1074268, 1103481, CERTFR-2019-AVI-209, CERTFR-2019-AVI-211, CERTFR-2019-AVI-212, CERTFR-2019-AVI-213, CERTFR-2019-AVI-215, CERTFR-2019-AVI-217, CERTFR-2019-AVI-229, CERTFR-2019-AVI-230, CERTFR-2019-AVI-233, CERTFR-2019-AVI-311, CERTFR-2019-AVI-458, CERTFR-2019-AVI-489, CTX251995, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091, DLA-1787-1, DLA-1789-1, DLA-1789-2, DLA-1799-1, DLA-1799-2, DSA-2019-199, DSA-2019-201, DSA-4444-1, DSA-4447-1, DSA-4447-2, DSA-4602-1, FEDORA-2019-0731828893, FEDORA-2019-1f5832fc0e, FEDORA-2019-640f8d8dd1, FEDORA-2019-6458474bf2, FEDORA-2019-c36afa818c, FEDORA-2019-e6bf55e821, FEDORA-2019-eb08fb0c5f, FG-IR-18-002, FreeBSD-SA-19:07.mds, FreeBSD-SA-19:26.mcu, HPESBHF03933, INTEL-SA-00233, JSA10993, openSUSE-SU-2019:1402-1, openSUSE-SU-2019:1403-1, openSUSE-SU-2019:1404-1, openSUSE-SU-2019:1405-1, openSUSE-SU-2019:1407-1, openSUSE-SU-2019:1408-1, openSUSE-SU-2019:1419-1, openSUSE-SU-2019:1420-1, openSUSE-SU-2019:1468-1, openSUSE-SU-2019:1505-1, openSUSE-SU-2019:1805-1, openSUSE-SU-2019:1806-1, PAN-SA-2019-0012, RHSA-2019:1155-01, RHSA-2019:1167-01, RHSA-2019:1168-01, RHSA-2019:1169-01, RHSA-2019:1170-01, RHSA-2019:1171-01, RHSA-2019:1172-01, RHSA-2019:1174-01, RHSA-2019:1175-01, RHSA-2019:1176-01, RHSA-2019:1177-01, RHSA-2019:1178-01, RHSA-2019:1180-01, RHSA-2019:1181-01, RHSA-2019:1182-01, RHSA-2019:1183-01, RHSA-2019:1184-01, RHSA-2019:1185-01, RHSA-2019:1186-01, RHSA-2019:1187-01, RHSA-2019:1188-01, RHSA-2019:1189-01, RHSA-2019:1190-01, RHSA-2019:1193-01, RHSA-2019:1194-01, RHSA-2019:1195-01, RHSA-2019:1196-01, RHSA-2019:1197-01, RHSA-2019:1198-01, SB10292, SSA-608355, SSA-616472, SSB-439005, SUSE-SU-2019:1235-1, SUSE-SU-2019:1236-1, SUSE-SU-2019:1238-1, SUSE-SU-2019:1239-1, SUSE-SU-2019:1240-1, SUSE-SU-2019:1241-1, SUSE-SU-2019:1242-1, SUSE-SU-2019:1243-1, SUSE-SU-2019:1244-1, SUSE-SU-2019:1245-1, SUSE-SU-2019:1248-1, SUSE-SU-2019:1268-1, SUSE-SU-2019:1269-1, SUSE-SU-2019:1272-1, SUSE-SU-2019:1287-1, SUSE-SU-2019:1289-1, SUSE-SU-2019:1296-1, SUSE-SU-2019:1313-1, SUSE-SU-2019:1347-1, SUSE-SU-2019:1348-1, SUSE-SU-2019:1349-1, SUSE-SU-2019:1356-1, SUSE-SU-2019:1371-1, SUSE-SU-2019:14048-1, SUSE-SU-2019:14051-1, SUSE-SU-2019:14052-1, SUSE-SU-2019:14063-1, SUSE-SU-2019:14133-1, SUSE-SU-2019:1423-1, SUSE-SU-2019:1438-1, SUSE-SU-2019:1452-1, SUSE-SU-2019:1490-1, SUSE-SU-2019:1547-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1909-1, SUSE-SU-2019:1910-1, SUSE-SU-2019:1954-1, SUSE-SU-2019:2430-1, Synology-SA-19:24, USN-3977-1, USN-3977-2, USN-3977-3, USN-3978-1, USN-3979-1, USN-3980-1, USN-3981-1, USN-3981-2, USN-3982-1, USN-3982-2, USN-3983-1, USN-3983-2, USN-3984-1, USN-3985-1, USN-3985-2, VIGILANCE-VUL-29300, VMSA-2019-0008, XSA-297, ZombieLoad
FortiManager: information disclosure via REST API JSON Responses
An attacker can bypass access restrictions to data via REST API JSON Responses of FortiManager, in order to obtain sensitive information...
CERTFR-2019-AVI-185, CVE-2018-1360, FG-IR-18-051, VIGILANCE-VUL-29117
PostgreSQL: code execution via COPY TO/FROM PROGRAM
An attacker can use a vulnerability via COPY TO/FROM PROGRAM of PostgreSQL, in order to run code...
CERTFR-2020-AVI-395, CVE-2019-9193, FG-IR-19-294, VIGILANCE-VUL-28918
FortiManager: information disclosure via Vdoms Settings
An attacker can bypass access restrictions to data via Vdoms Settings of FortiManager, in order to obtain sensitive information...
CERTFR-2018-AVI-411, CVE-2018-1353, FG-IR-18-016, VIGILANCE-VUL-27097
Our database contains other pages. You can request a free trial to read them.

Display information about FortiManager: