The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of FortiOS

FortiOS: information disclosure via HTTP Headers Parsing
An attacker can bypass access restrictions to data via HTTP Headers Parsing of FortiOS, in order to obtain sensitive information...
CERTFR-2019-AVI-137, FG-IR-19-043, VIGILANCE-VUL-28906
libssh2: multiple vulnerabilities
An attacker can use several vulnerabilities of libssh2...
bulletinjul2019, CERTFR-2019-AVI-573, cpujan2020, CVE-2019-3855, CVE-2019-3856, CVE-2019-3857, CVE-2019-3858, CVE-2019-3859, CVE-2019-3860, CVE-2019-3861, CVE-2019-3862, CVE-2019-3863, DLA-1730-1, DLA-1730-2, DLA-1730-3, DLA-1730-4, DSA-2019-093, DSA-2019-131, DSA-2019-133, DSA-4431-1, FEDORA-2019-3348cb4934, FEDORA-2019-f31c14682f, FG-IR-19-099, JSA11023, openSUSE-SU-2019:1075-1, openSUSE-SU-2019:1109-1, openSUSE-SU-2019:1290-1, openSUSE-SU-2019:1291-1, openSUSE-SU-2019:1640-1, RHSA-2019:0679-01, RHSA-2019:1175-01, RHSA-2019:1652-01, RHSA-2019:1791-01, RHSA-2019:1884-01, RHSA-2019:1943-01, RHSA-2019:2136-01, RHSA-2019:2399-01, SSA:2019-077-01, SUSE-SU-2019:0655-1, SUSE-SU-2019:1059-1, SUSE-SU-2019:1060-1, SUSE-SU-2019:13982-1, SUSE-SU-2019:13997-1, SUSE-SU-2019:14031-1, SUSE-SU-2019:14032-1, SUSE-SU-2019:14098-1, SUSE-SU-2019:14099-1, SUSE-SU-2019:1606-1, SUSE-SU-2019:1606-2, VIGILANCE-VUL-28768
FortiOS: memory corruption via SSH Username
An attacker can trigger a memory corruption via SSH Username of FortiOS, in order to trigger a denial of service, and possibly to run code...
CERTFR-2019-AVI-017, CVE-2018-1352, FG-IR-18-018, VIGILANCE-VUL-28247
FortiOS: information disclosure via Web Proxy Disclaimer Response
A local attacker can read a memory fragment via Web Proxy Disclaimer Response of FortiOS, in order to obtain sensitive information...
CERTFR-2018-AVI-570, CVE-2018-13376, FG-IR-18-325, VIGILANCE-VUL-27871
FortiGate: information disclosure via PPTP Server Hostname
An attacker can bypass access restrictions to data via PPTP Server Hostname of FortiGate, in order to obtain sensitive information...
CERTFR-2018-AVI-560, CVE-2018-13366, FG-IR-18-101, VIGILANCE-VUL-27827
FortiGate: privilege escalation via LDAP Server Connectivity
An attacker can bypass restrictions via LDAP Server Connectivity of Fortigate, in order to escalate his privileges...
CERTFR-2018-AVI-560, CVE-2018-13374, FG-IR-18-157, VIGILANCE-VUL-27826
WPA/WPA2: information disclosure via PSK PMKID
An attacker can bypass access restrictions to data via PSK PMKID of WPA/WPA2, in order to obtain sensitive information...
FG-IR-18-199, VIGILANCE-VUL-27203
FortiOS: information disclosure via ROBOT Attack
An attacker can bypass access restrictions to data via ROBOT Attack (VIGILANCE-VUL-24749) of FortiOS, in order to obtain sensitive information...
CVE-2018-9192, CVE-2018-9194, FG-IR-17-302, VIGILANCE-VUL-27172
FortiOS: information disclosure via Replacement Messages
An attacker can bypass access restrictions to data via Replacement Messages of FortiOS, in order to obtain sensitive information...
CERTFR-2018-AVI-407, CVE-2018-13365, FG-IR-18-085, VIGILANCE-VUL-27079
IPsec IKEv1 Main Mode: information disclosure via Brute Force
An attacker can bypass access restrictions to data via Brute Force of IKEv1 Main Mode, in order to obtain sensitive information...
CVE-2018-5389, FG-IR-18-214, K42378447, Synology-SA-18:46, VIGILANCE-VUL-27022, VU#857035
Our database contains other pages. You can request a free trial to read them.

Display information about FortiOS: