10/12/2021 10:33:09 AM Information FortiShield id=96851 user=DBLOG_SOURCE_SYSTEM msg="FortiShield is enabled" 10/12/2021 10:33:09 AM Information VPN id=96602 msg="SSLVPN service started successfully." vpntype=ssl 10/12/2021 10:33:32 AM Information Update id=96650 avsiglastupdate="1970-01-01 08:00:00+08" vulnsig=1.00270 10/12/2021 10:33:35 AM Information Vulnerability id=96520 msg="The vulnerability scan status has changed" status="scanning started" vulncat=N/A vulncvss=N/A vulnengine=N/A vulnid=N/A vulnname=N/A vulnproducts=N/A vulnref=N/A vulnseverity=N/A vulnsignature=N/A 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat=Applications vulnid=2705 vulnname="Security Vulnerability CVE-2018-1285 for log4net" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/2705 vulnseverity=Critical 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67184 vulnname="Microsoft: Win32k Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67184 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67185 vulnname="Microsoft: Windows Media Photo Codec Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67185 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67186 vulnname="Microsoft: Windows Event Tracing Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67186 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67187 vulnname="Microsoft Internet Messaging API Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67187 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67188 vulnname="Microsoft: Windows Secure Kernel Mode Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67188 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67190 vulnname="Microsoft: Azure AD Web Sign-in Security Feature Bypass Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67190 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67191 vulnname="Microsoft: Windows Kernel Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67191 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67192 vulnname="Microsoft: Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67192 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67193 vulnname="Microsoft: Windows Media Video Decoder Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67193 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67194 vulnname="Microsoft: NTFS Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67194 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67195 vulnname="Microsoft: Windows Installer Spoofing Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67195 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67196 vulnname="Microsoft: Windows Installer Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67196 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67197 vulnname="Microsoft: Windows Hyper-V Denial of Service Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67197 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67198 vulnname="Microsoft: Windows Overlay Filter Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67198 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67199 vulnname="Microsoft: Windows Kernel Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67199 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67200 vulnname="Microsoft: Win32k Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67200 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67201 vulnname="Microsoft: Windows Application Compatibility Cache Denial of Service Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67201 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67202 vulnname="Microsoft: Windows NTFS Denial of Service Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67202 vulnseverity=Low 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67203 vulnname="Microsoft: Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67203 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67204 vulnname="Microsoft: Windows Hyper-V Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67204 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67205 vulnname="Microsoft: Windows Media Video Decoder Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67205 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67206 vulnname="Microsoft: Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67206 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67207 vulnname="Microsoft Windows Codecs Library Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67207 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67208 vulnname="Microsoft: Windows GDI+ Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67208 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67209 vulnname="Microsoft: Windows TCP/IP Driver Denial of Service Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67209 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67210 vulnname="Microsoft: Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67210 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67211 vulnname="Microsoft: Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67211 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67212 vulnname="Microsoft: Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67212 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67213 vulnname="Microsoft: Windows DNS Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67213 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67214 vulnname="Microsoft: Windows SMB Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67214 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67215 vulnname="Microsoft: Windows SMB Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67215 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67216 vulnname="Microsoft: Windows AppX Deployment Server Denial of Service Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67216 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67217 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67217 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67218 vulnname="Microsoft: Windows DNS Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67218 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67219 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67219 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67220 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67220 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67221 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67221 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67222 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67222 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67223 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67223 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67224 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67224 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67225 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67225 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67226 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67226 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67227 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67227 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67228 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67228 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67229 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67229 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67230 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67230 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67231 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67231 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67232 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67232 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67233 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67233 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67234 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67234 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67235 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67235 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67236 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67236 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67237 vulnname="Microsoft: Windows Speech Runtime Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67237 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67238 vulnname="Microsoft: Windows GDI+ Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67238 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67239 vulnname="Microsoft: Windows GDI+ Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67239 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67240 vulnname="Microsoft: Windows GDI+ Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67240 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67241 vulnname="Microsoft: Windows Speech Runtime Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67241 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67242 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67242 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67243 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67243 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67244 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67244 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67245 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67245 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67246 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67246 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67247 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67247 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67248 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67248 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67249 vulnname="Microsoft: Remote Procedure Call Runtime Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67249 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67250 vulnname="Microsoft: Windows Event Tracing Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67250 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67251 vulnname="Microsoft: Windows Speech Runtime Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67251 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67252 vulnname="Microsoft: Windows Installer Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67252 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67253 vulnname="Microsoft: Windows Console Driver Denial of Service Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67253 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67254 vulnname="Microsoft: Windows TCP/IP Driver Denial of Service Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67254 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67255 vulnname="Microsoft: Windows Installer Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67255 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67256 vulnname="Microsoft: Windows Hyper-V Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67256 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67257 vulnname="Microsoft: Windows TCP/IP Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67257 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67258 vulnname="Microsoft: Windows Console Driver Denial of Service Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67258 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67259 vulnname="Microsoft: Windows Hyper-V Security Feature Bypass Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67259 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67260 vulnname="Microsoft: Windows Network File System Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67260 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67261 vulnname="Microsoft: Windows Portmapping Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67261 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67262 vulnname="Microsoft: Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67262 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=67274 vulnname="Microsoft: Windows Services and Controller App Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/67274 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69121 vulnname="Microsoft: Windows Bind Filter Driver Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69121 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69122 vulnname="Microsoft: Windows Common Log File System Driver Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69122 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69123 vulnname="Microsoft: Windows Authenticode Spoofing Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69123 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69124 vulnname="Microsoft: Windows SMB Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69124 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69125 vulnname="Microsoft: Windows Installer Denial of Service Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69125 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69126 vulnname="Microsoft: Windows Installer Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69126 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69127 vulnname="Microsoft: Windows Common Log File System Driver Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69127 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69128 vulnname="Microsoft: Windows Event Tracing Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69128 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69129 vulnname="Microsoft: Windows WLAN AutoConfig Service Remote Code Execution Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69129 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69130 vulnname="Microsoft: Windows Subsystem for Linux Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69130 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69131 vulnname="Microsoft: Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69131 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69133 vulnname="Microsoft: Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69133 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69134 vulnname="Microsoft: Windows SMB Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69134 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69135 vulnname="Microsoft: Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69135 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69136 vulnname="Microsoft: Windows SMB Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69136 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69137 vulnname="Microsoft: Win32k Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69137 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69138 vulnname="Microsoft: Windows Scripting Engine Memory Corruption Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69138 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69139 vulnname="Microsoft: Windows Key Storage Provider Security Feature Bypass Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69139 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69142 vulnname="Microsoft: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69142 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69143 vulnname="Microsoft: Windows Ancillary Function Driver for WinSock Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69143 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69144 vulnname="Microsoft: Windows Event Tracing Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69144 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69145 vulnname="Microsoft: BitLocker Security Feature Bypass Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69145 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69146 vulnname="Microsoft: Windows Common Log File System Driver Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69146 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69147 vulnname="Microsoft Windows Update Client Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69147 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69148 vulnname="Microsoft: Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69148 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69149 vulnname="Microsoft: Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69149 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69150 vulnname="Microsoft: Windows Storage Information Disclosure Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69150 vulnseverity=Medium 10/12/2021 10:34:22 AM Information Vulnerability id=96521 msg="A vulnerability scan result has been logged" status=N/A vulncat="Operating System" vulnid=69151 vulnname="Microsoft: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability" vulnref=https://www.fortiguard.com/product/encyclopedia/vuln/69151 vulnseverity=High 10/12/2021 10:34:22 AM Information Vulnerability id=96520 msg="The vulnerability scan status has changed" status="scanning finished" vulncat=N/A vulncvss=N/A vulnengine=N/A vulnid=N/A vulnname=N/A vulnproducts=N/A vulnref=N/A vulnseverity=N/A vulnsignature=N/A 10/12/2021 10:34:54 AM Information VPN FortiSslvpn: 14764: fortissl_connect: device=ftvnic 10/12/2021 10:34:54 AM Information VPN FortiSslvpn: 2620: PreferDtlsTunnel=0 10/12/2021 10:34:58 AM Notice VPN date=2021-10-12 time=10:34:57 logver=1 type=traffic level=notice sessionid=575626496 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.131.59 srcport=N/A direction=outbound dstip=joel-ntp-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=4294969136 sentbyte=2793 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 10:34:59 AM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=NTP vpntype=ssl 10/12/2021 10:35:24 AM Information VPN FortiSslvpn: 11284: Ras: connection to fortissl terminated 10/12/2021 10:35:25 AM Notice VPN date=2021-10-12 time=10:35:24 logver=1 type=traffic level=notice sessionid=575626496 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.131.59 srcport=N/A direction=outbound dstip=joel-ntp-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=4294970344 sentbyte=87360 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 10:36:08 AM Information FortiShield id=96851 user=DBLOG_SOURCE_SYSTEM msg="FortiShield is enabled" 10/12/2021 10:36:08 AM Information VPN id=96602 msg="SSLVPN service started successfully." vpntype=ssl 10/12/2021 10:37:15 AM Information VPN FortiSslvpn: 3848: fortissl_connect: device=ftvnic 10/12/2021 10:37:15 AM Information VPN FortiSslvpn: 15716: PreferDtlsTunnel=0 10/12/2021 10:37:19 AM Notice VPN date=2021-10-12 time=10:37:18 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.131.62 srcport=N/A direction=outbound dstip=joel-ntp-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=4294968532 sentbyte=1917 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 10:37:19 AM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=NTP vpntype=ssl 10/12/2021 10:37:44 AM Information VPN FortiSslvpn: 15708: Ras: connection to fortissl terminated 10/12/2021 10:37:44 AM Notice VPN date=2021-10-12 time=10:37:44 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.131.62 srcport=N/A direction=outbound dstip=joel-ntp-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=4294969740 sentbyte=63601 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 10:38:12 AM Information VPN FortiSslvpn: 15368: fortissl_connect: device=ftvnic 10/12/2021 10:38:12 AM Information VPN FortiSslvpn: 13712: PreferDtlsTunnel=0 10/12/2021 10:38:17 AM Notice VPN date=2021-10-12 time=10:38:16 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.131.62 srcport=N/A direction=outbound dstip=joel-ntp-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=12884904332 sentbyte=4294976109 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 10:38:17 AM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=NTP vpntype=ssl 10/12/2021 10:38:41 AM Information VPN FortiSslvpn: 13732: Ras: connection to fortissl terminated 10/12/2021 10:38:41 AM Notice VPN date=2021-10-12 time=10:38:41 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.131.62 srcport=N/A direction=outbound dstip=joel-ntp-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=12884904936 sentbyte=4295030273 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 10:43:32 AM Information VPN FortiSslvpn: 13580: fortissl_connect: device=ftvnic 10/12/2021 10:43:32 AM Information VPN FortiSslvpn: 5196: PreferDtlsTunnel=0 10/12/2021 10:43:37 AM Notice VPN date=2021-10-12 time=10:43:36 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.131 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=21474838924 sentbyte=8589946303 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 10:43:37 AM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=EQU vpntype=ssl 10/12/2021 10:44:02 AM Information VPN FortiSslvpn: 5208: Ras: connection to fortissl terminated 10/12/2021 10:44:02 AM Notice VPN date=2021-10-12 time=10:44:02 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.131 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=21474839528 sentbyte=8590001102 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 11:00:49 AM Information VPN FortiSslvpn: 4684: fortissl_connect: device=ftvnic 10/12/2021 11:00:49 AM Information VPN FortiSslvpn: 11172: PreferDtlsTunnel=0 10/12/2021 11:00:54 AM Notice VPN date=2021-10-12 time=11:00:53 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.131.50 srcport=N/A direction=outbound dstip=joel-ntp-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=30064773516 sentbyte=12884912461 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 11:00:54 AM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=NTP vpntype=ssl 10/12/2021 11:01:19 AM Information VPN FortiSslvpn: 3532: Ras: connection to fortissl terminated 10/12/2021 11:01:19 AM Notice VPN date=2021-10-12 time=11:01:19 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.131.50 srcport=N/A direction=outbound dstip=joel-ntp-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=30064774120 sentbyte=12884995539 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 11:20:36 AM Error VPN id=96603 user=wlimw msg="SSLVPN tunnel connection failed (Error=-8)." remotegw=jonah-equ-vpn.pacificinternet.com vpnstate=connected vpntunnel=EQU vpntype=ssl vpnuser=wilson.lim 10/12/2021 11:20:54 AM Error VPN id=96603 user=wlimw msg="SSLVPN tunnel connection failed (Error=-12)." remotegw=jonah-equ-vpn.pacificinternet.com vpnstate=connected vpntunnel=EQU vpntype=ssl vpnuser=wilson.lim 10/12/2021 11:21:14 AM Information VPN FortiSslvpn: 9760: fortissl_connect: device=ftvnic 10/12/2021 11:21:14 AM Information VPN FortiSslvpn: 10976: PreferDtlsTunnel=0 10/12/2021 11:21:19 AM Notice VPN date=2021-10-12 time=11:21:18 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.140 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=38654708712 sentbyte=17179886383 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 11:21:19 AM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=EQU vpntype=ssl 10/12/2021 11:21:42 AM Error VPN FortiSslvpn: 956: error: poll_send_ssl ->SSL_get_error(): 5, try:1 10/12/2021 11:21:42 AM Error VPN FortiSslvpn: 8968: error: poll_recv_ssl -> SSL_get_error(): 5 10/12/2021 11:21:42 AM Error VPN FortiSslvpn: 956: error: poll_send_ssl -> WSAGetLastError():2745, try:1 10/12/2021 11:21:42 AM Error VPN FortiSslvpn: 956: error: poll_send_ssl ->data size: 36, try:1 10/12/2021 11:21:42 AM Error VPN FortiSslvpn: 8968: error: poll_recv_ssl -> WSAGetLastError():2745 10/12/2021 11:21:42 AM Error VPN FortiSslvpn: 956: [handle_driver_read_event]: error: poll_send 10/12/2021 11:21:45 AM Information VPN FortiSslvpn: 1044: Ras: connection to fortissl terminated 10/12/2021 11:21:45 AM Notice VPN date=2021-10-12 time=11:21:44 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.140 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=38654709316 sentbyte=17179957316 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 11:45:45 AM Error VPN id=96603 user=wlimw msg="SSLVPN tunnel connection failed (Error=-8)." remotegw=jonah-equ-vpn.pacificinternet.com vpnstate=connected vpntunnel=EQU vpntype=ssl vpnuser=wilson.lim 10/12/2021 11:46:08 AM Information VPN FortiSslvpn: 16248: fortissl_connect: device=ftvnic 10/12/2021 11:46:08 AM Information VPN FortiSslvpn: 17284: PreferDtlsTunnel=0 10/12/2021 11:46:12 AM Notice VPN date=2021-10-12 time=11:46:11 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=47244642096 sentbyte=21474847465 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 11:46:13 AM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=EQU vpntype=ssl 10/12/2021 11:46:38 AM Information VPN FortiSslvpn: 13172: Ras: connection to fortissl terminated 10/12/2021 11:46:38 AM Notice VPN date=2021-10-12 time=11:46:38 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=47244642700 sentbyte=21474927923 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 11:46:55 AM Error VPN id=96603 user=wlimw msg="SSLVPN tunnel connection failed (Error=-12)." remotegw=jonah-equ-vpn.pacificinternet.com vpnstate=connected vpntunnel=EQU vpntype=ssl vpnuser=wilson.lim 10/12/2021 11:47:18 AM Information VPN FortiSslvpn: 14256: fortissl_connect: device=ftvnic 10/12/2021 11:47:18 AM Information VPN FortiSslvpn: 6156: PreferDtlsTunnel=0 10/12/2021 11:47:34 AM Notice VPN date=2021-10-12 time=11:47:33 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=55834578500 sentbyte=25769882865 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 11:47:34 AM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=EQU vpntype=ssl 10/12/2021 11:47:49 AM Information VPN FortiSslvpn: 15732: Ras: connection to fortissl terminated 10/12/2021 11:47:50 AM Notice VPN date=2021-10-12 time=11:47:49 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=55834578500 sentbyte=25769894090 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 11:52:02 AM Error VPN id=96603 user=wlimw msg="SSLVPN tunnel connection failed (Error=-12)." remotegw=jonah-equ-vpn.pacificinternet.com vpnstate=connected vpntunnel=EQU vpntype=ssl vpnuser=wilson.lim 10/12/2021 11:54:03 AM Error VPN (repeated 2 times in last 122 sec) id=96603 user=wlimw msg="SSLVPN tunnel connection failed (Error=-12)." remotegw=jonah-equ-vpn.pacificinternet.com vpnstate=connected vpntunnel=EQU vpntype=ssl vpnuser=wilson.lim 10/12/2021 11:56:33 AM Information VPN FortiSslvpn: 17016: fortissl_connect: device=ftvnic 10/12/2021 11:56:33 AM Information VPN FortiSslvpn: 4316: PreferDtlsTunnel=0 10/12/2021 11:56:38 AM Notice VPN date=2021-10-12 time=11:56:37 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=64424511280 sentbyte=30064780565 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 11:56:38 AM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=EQU vpntype=ssl 10/12/2021 11:57:04 AM Information VPN FortiSslvpn: 13924: Ras: connection to fortissl terminated 10/12/2021 11:57:04 AM Notice VPN date=2021-10-12 time=11:57:03 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=64424511884 sentbyte=30064853178 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 12:07:22 PM Information VPN FortiSslvpn: 1340: fortissl_connect: device=ftvnic 10/12/2021 12:07:22 PM Information VPN FortiSslvpn: 5276: PreferDtlsTunnel=0 10/12/2021 12:07:27 PM Notice VPN date=2021-10-12 time=12:07:26 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=73014447080 sentbyte=34359748432 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 12:07:27 PM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=EQU vpntype=ssl 10/12/2021 12:07:51 PM Error VPN FortiSslvpn: 18168: error: poll_send_ssl ->SSL_get_error(): 5, try:1 10/12/2021 12:07:51 PM Error VPN FortiSslvpn: 18168: error: poll_send_ssl -> WSAGetLastError():2746, try:1 10/12/2021 12:07:51 PM Error VPN FortiSslvpn: 18168: error: poll_send_ssl ->data size: 48, try:1 10/12/2021 12:07:51 PM Error VPN FortiSslvpn: 18168: [handle_driver_read_event]: error: poll_send 10/12/2021 12:07:53 PM Information VPN FortiSslvpn: 9708: Ras: connection to fortissl terminated 10/12/2021 12:07:53 PM Notice VPN date=2021-10-12 time=12:07:52 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=73014447684 sentbyte=34359837596 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 12:12:29 PM Information VPN FortiSslvpn: 8220: fortissl_connect: device=ftvnic 10/12/2021 12:12:29 PM Information VPN FortiSslvpn: 2196: PreferDtlsTunnel=0 10/12/2021 12:12:35 PM Notice VPN date=2021-10-12 time=12:12:34 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.136 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=81604381068 sentbyte=38654715219 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 12:12:35 PM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=EQU vpntype=ssl 10/12/2021 12:13:00 PM Information VPN FortiSslvpn: 11380: Ras: connection to fortissl terminated 10/12/2021 12:13:00 PM Notice VPN date=2021-10-12 time=12:13:00 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.136 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=81604381672 sentbyte=38654807740 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 12:13:25 PM Error VPN id=96603 user=wlimw msg="SSLVPN tunnel connection failed (Error=-12)." remotegw=jonah-equ-vpn.pacificinternet.com vpnstate=connected vpntunnel=EQU vpntype=ssl vpnuser=wilson.lim 10/12/2021 12:15:31 PM Information VPN FortiSslvpn: 7256: fortissl_connect: device=ftvnic 10/12/2021 12:15:31 PM Information VPN FortiSslvpn: 13328: PreferDtlsTunnel=0 10/12/2021 12:15:37 PM Notice VPN date=2021-10-12 time=12:15:36 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=85899348364 sentbyte=42949682713 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 12:15:37 PM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=EQU vpntype=ssl 10/12/2021 12:16:02 PM Information VPN FortiSslvpn: 4060: Ras: connection to fortissl terminated 10/12/2021 12:16:02 PM Notice VPN date=2021-10-12 time=12:16:02 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=85899348968 sentbyte=42949767512 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 12:27:09 PM Warning FortiShield id=96855 msg="FortiShield blocked application: C:\\Users\\wlimw\\AppData\\Local\\Temp\\DiagnosticTool.exe from modifying: c:\\program files\\fortinet\\forticlient\\obj_1_a12500" 10/12/2021 12:27:16 PM Information VPN FortiSslvpn: 5244: fortissl_connect: device=ftvnic 10/12/2021 12:27:16 PM Information VPN FortiSslvpn: 2816: PreferDtlsTunnel=0 10/12/2021 12:27:21 PM Notice VPN date=2021-10-12 time=12:27:20 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=94489282956 sentbyte=47244646983 utmaction=passthrough utmevent=vpn threat=connect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A 10/12/2021 12:27:21 PM Information VPN id=96600 user=wlimw msg="SSLVPN tunnel status" vpnstate=connected vpntunnel=EQU vpntype=ssl 10/12/2021 12:27:47 PM Information VPN FortiSslvpn: 17536: Ras: connection to fortissl terminated 10/12/2021 12:27:47 PM Notice VPN date=2021-10-12 time=12:27:46 logver=1 type=traffic level=notice sessionid=3119473072 hostname=LAPTOP-01E2J3NT pcdomain= uid=86EEFB9247EB4262B8EAD9527070743E devid=FCT8003661518744 fgtserial=N/A emsserial=N/A regip=N/A srcname=sslvpn srcproduct=N/A srcip=172.30.132.129 srcport=N/A direction=outbound dstip=jonah-equ-vpn.pacificinternet.com remotename=N/A dstport=53335 user=wilson.lim proto=6 rcvdbyte=94489283560 sentbyte=47244712319 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A fctver=6.0.10.0297 os="Microsoft Windows 10 , 64-bit (build 19041)" usingpolicy="" service= url=N/A userinitiated=0 browsetime=N/A