Fortigate UTM appliances CA SSL Certificate Creation Security Bypass Vulnerability

Attackers use man-in-the-middle attacks to exploit this issue.


 

Privacy Statement
Copyright 2010, SecurityFocus