Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

In a web-based attack scenario where the user is using Internet Explorer in the Windows 8-style UI, an attacker would first need...

Apr 12, 2017
Microsoft has released an update for Microsoft Office that turns off, by default, the Encapsulated PostScript (EPS) Filter in...

Apr 12, 2017
An elevation of privilege vulnerability exists when Internet Explorer does not properly enforce cross-domain policies, which could...

Apr 12, 2017
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could...

Apr 12, 2017
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could...

Apr 12, 2017
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could...

Apr 12, 2017
A vulnerability exists in Microsoft Edge when the Edge Content Security Policy (CSP) fails to properly validate certain specially...

Apr 12, 2017
An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory. An attacker...

Apr 12, 2017
A security feature bypass vulnerability exists in Microsoft Office software when it improperly handles the parsing of file formats....

Apr 12, 2017
A spoofing vulnerability exists in when Microsoft Outlook for Mac improperly validates HTML tag input. An attacker who successfully...

Apr 12, 2017
An elevation of privilege vulnerability exists when an Office Web Apps server does not properly sanitize a specially crafted request....

Apr 12, 2017
A remote code execution vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker...

Apr 12, 2017
A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially crafted email messages. An attacker...

Apr 12, 2017
A remote code execution vulnerability exists when Microsoft .NET Framework fails to properly validate input before loading libraries....

Apr 12, 2017
A security feature bypass vulnerability exists when ADFS incorrectly treats requests coming from Extranet clients as Intranet...

Apr 12, 2017
An information disclosure vulnerability exists in Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle...

Apr 12, 2017
A denial of service vulnerability exists in Active Directory when an authenticated attacker sends malicious search queries. An...

Apr 12, 2017
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input...

Apr 12, 2017
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged...

Apr 12, 2017
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input...

Apr 12, 2017