Resolved issues
The following issues have been fixed in FortiProxy 2.0.12. For inquiries about a particular bug, please contact Customer Service & Support.
Bug ID |
Description |
---|---|
800873 |
Fix webfilter quota bytes miscalculation and wrong bytes usage in ftgd quota log. |
818869 |
FTP traffic does not get redirected to WAD. |
819887 |
GCP does not process multipart MIME data. |
846870 |
Allow management access to local interfaces with IPsec and SSLVPN. |
847484 |
Read-only administrators able to sniff other administrators' cookies. |
850727 |
Authentication for SSH fails. |
850841 |
Arbitrary read/write vulnerability in custom language. |
852416 |
Trusted host IP table rules are only generated for super administrators. |
854176 |
Patch for arbitrary file deletion in log reports. |
854229 |
Path traversal vulnerability allowed VDOM escaping. |
859001 859041 869099 |
High memory usage. |
775118 |
Change encryption method of backup files to AES-GCM. |
883775 |
100% Disk usage for the "/data" partition. |
889311 |
SSLVPNd keeps restarting. |
Common vulnerabilities and exposures
FortiProxy 2.0.12 is no longer vulnerable to the following CVE references. Visit https://fortiguard.com/psirt for more information.
Bug ID |
CVE reference |
---|---|
854181 |
|
866003 |
|
854176 |