Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector...

Mar 10, 2020
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles file operations....

Mar 10, 2020
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully...

Mar 10, 2020
An remote code execution vulnerability exists in Microsoft Dynamics Business Central. An attacker who succesfully exploited this...

Mar 10, 2020
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the...

Mar 10, 2020
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the...

Mar 10, 2020
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed....

Mar 10, 2020
An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory. An attacker who successfully...

Mar 10, 2020
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully...

Mar 10, 2020
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully...

Mar 10, 2020
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully...

Mar 10, 2020
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully...

Mar 10, 2020
An elevation of privilege vulnerability exists in the way the Provisioning Runtime validates certain file operations. An attacker...

Mar 10, 2020
An information disclosure vulnerability exists when Chakra improperly discloses the contents of its memory, which could provide...

Mar 10, 2020
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability...

Mar 10, 2020
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability...

Mar 10, 2020
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability...

Mar 10, 2020
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability...

Mar 10, 2020
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers....

Mar 10, 2020
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability...

Mar 10, 2020