Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

Could allow an attacker to retrieve information that could lead to a

Jan 10, 2018
Could allow an attacker to access information from one domain and inject it into another domain.

Jan 10, 2018
Could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability.

Jan 10, 2018
An attacker could execute arbitrary code in the context of the current user.

Jan 10, 2018
An attacker could execute arbitrary code in the context of the current user.

Jan 10, 2018
An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

Jan 10, 2018
An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

Jan 10, 2018
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Jan 10, 2018
An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

Jan 10, 2018
An attacker could execute arbitrary code in the context of the current user.

Jan 10, 2018
Could allow an attacker to retrieve information that could lead to a

Jan 10, 2018
An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or...

Jan 10, 2018
An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or...

Jan 10, 2018
An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

Jan 10, 2018
An attacker could execute arbitrary code in the context of the current user.

Jan 10, 2018
An attacker could execute arbitrary code in the context of the current user.

Jan 10, 2018
An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system.

Jan 10, 2018
An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed.

Jan 10, 2018
An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

Jan 10, 2018
An attacker could execute arbitrary code in the context of the current user.

Jan 10, 2018