Resolved issues
The following issues have been fixed in FortiProxy 2.0.12. For inquiries about a particular bug, please contact Customer Service & Support.
|
Bug ID |
Description |
|---|---|
|
800873 |
Fix webfilter quota bytes miscalculation and wrong bytes usage in ftgd quota log. |
|
818869 |
FTP traffic does not get redirected to WAD. |
|
819887 |
GCP does not process multipart MIME data. |
|
846870 |
Allow management access to local interfaces with IPsec and SSLVPN. |
|
847484 |
Read-only administrators able to sniff other administrators' cookies. |
|
850727 |
Authentication for SSH fails. |
|
850841 |
Arbitrary read/write vulnerability in custom language. |
|
852416 |
Trusted host IP table rules are only generated for super administrators. |
|
854176 |
Patch for arbitrary file deletion in log reports. |
|
854229 |
Path traversal vulnerability allowed VDOM escaping. |
|
859001 859041 869099 |
High memory usage. |
|
775118 |
Change encryption method of backup files to AES-GCM. |
|
883775 |
100% Disk usage for the "/data" partition. |
|
889311 |
SSLVPNd keeps restarting. |
Common vulnerabilities and exposures
FortiProxy 2.0.12 is no longer vulnerable to the following CVE references. Visit https://fortiguard.com/psirt for more information.
|
Bug ID |
CVE reference |
|---|---|
|
854181 |
|
|
866003 |
|
|
854176 |