Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows...

Jul 26, 2017
An access issue was addressed with additional restrictions. An out-of-bounds read was addressed through improved bounds checking....

Jul 26, 2017
VMware ESX, Workstation, Fusion, and View contain a vulnerability in the handling of control code in vmci.sys. A local malicious...

Jul 26, 2017
VMware Workstation and Fusion out-of-bounds memory access vulnerability

Jul 26, 2017
The AMQP dissector could crash.

Jul 26, 2017
The AMQP dissector could crash.

Jul 26, 2017
The MQ dissector could crash.

Jul 26, 2017
The MQ dissector could crash.

Jul 26, 2017
The DOCSIS dissector could go into an infinite loop.

Jul 26, 2017
The DOCSIS dissector could go into an infinite loop.

Jul 26, 2017
The GPRS LLC dissector could go into a large loop.

Jul 26, 2017
The GPRS LLC dissector could go into a large loop.

Jul 26, 2017
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory via the Microsoft Windows...

Jul 11, 2017
A security feature bypass vulnerability exists when Microsoft browsers improperly handle redirect requests. The vulnerability...

Jul 11, 2017
A spoofing vulnerability exists when an affected Microsoft browser does not properly parse HTTP content. An attacker who successfully...

Jul 11, 2017
A remote code execution vulnerability exists in the way Microsoft Edge handles objects in memory. The vulnerability could corrupt...

Jul 11, 2017
A remote code execution vulnerability exists in the way Microsoft Edge handles objects in memory. The vulnerability could corrupt...

Jul 11, 2017
A security feature bypass vulnerability exists when Microsoft Edge fails to correctly apply Same Origin Policy for HTML elements...

Jul 11, 2017
A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content. An attacker who successfully exploited...

Jul 11, 2017
An elevation of privilege vulnerability exists when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests....

Jul 11, 2017