Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D).

Feb 15, 2018
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO).

Feb 15, 2018
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).

Feb 15, 2018
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization).

Feb 15, 2018
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT).

Feb 15, 2018
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX).

Feb 15, 2018
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE).

Feb 15, 2018
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS).

Feb 15, 2018
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer).

Feb 15, 2018
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML).

Feb 15, 2018
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML).

Feb 15, 2018
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: C API).

Feb 15, 2018
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption (OpenSSL)).

Feb 15, 2018
The vulnerabilities in the following products could cause the system to become vulnerable to malicious security attack: Adobe...

Feb 15, 2018
Could allow an attacker to bypass Device Guard.

Feb 15, 2018
Could allow an attacker to retrieve information that could lead to a

Feb 15, 2018
An attacker could execute arbitrary code in the context of the current user.

Feb 15, 2018
An attacker with information to further compromise the user’s computer or data.

Feb 15, 2018
An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed.

Feb 15, 2018
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Feb 15, 2018