Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory. An attacker who successfully...

Feb 15, 2018
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory. An attacker who successfully...

Feb 15, 2018
A security feature bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins. The vulnerability...

Feb 15, 2018
An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized...

Feb 15, 2018
A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects...

Feb 15, 2018
An elevation of privilege vulnerability exists when Microsoft Outlook initiates processing of incoming messages without sufficient...

Feb 15, 2018
A remote code execution vulnerability exists in Microsoft Outlook when the software fails to properly handle objects in memory....

Feb 15, 2018
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted...

Feb 15, 2018
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted...

Feb 15, 2018
This security update addresses the following vulnerabilities, which are described in Adobe Security Bulletin APSB18-03: CVE-2018-4877...

Feb 15, 2018
An elevation of privilege vulnerability exist when Named Pipe File System improperly handles objects. An attacker who successfully...

Feb 15, 2018
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers....

Feb 15, 2018
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge....

Feb 15, 2018
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge....

Feb 15, 2018
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer....

Feb 15, 2018
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge....

Feb 15, 2018
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge....

Feb 15, 2018
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge....

Feb 15, 2018
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge....

Feb 15, 2018
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge....

Feb 15, 2018