📦 Fort Validator
by Nicmx
🔍 What is Fort Validator?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows a malicious RPKI repository to trigger a buffer overflow in FORT validator versions before 1.6.3 by serving a specially crafted resource certificate with an oversized Key Usa...
An integer underflow vulnerability in FORT RPKI validator versions 1.6.3 and 1.6.4 allows a malicious RPKI repository to cause a denial of service by serving a Manifest object with an empty fileList. ...
A vulnerability in FORT RPKI validator before version 1.6.3 allows a malicious RPKI repository to serve specially crafted ROA or Manifest data encoded in non-canonical BER format, bypassing FORT's BER...
This vulnerability in FORT RPKI validator allows a malicious RPKI repository to crash the software by serving a signed object with an empty signedAttributes field. This leads to Route Origin Validatio...
This vulnerability in FORT RPKI validator allows a malicious RPKI repository to crash the software by serving ROA or Manifest objects with null eContent fields. When exploited, this causes a NULL poin...
This vulnerability in FORT RPKI validator allows attackers to serve outdated RPKI manifests, causing the system to accept invalid or revoked BGP route origin authorizations. Organizations using FORT f...