- ► Home
- Advisories
-
Filter By Date
- All
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
- 2008
- 2006
-
Filter By Risk Level
- All
-
112
-
160
-
75
-
4
-
0
-
Filter by Vendor
- All
- 88 Adobe
- 57 Microsoft
- 19 Cisco
- 17 Apple
- 13 Synology
- 10 Foxit Software
- 9 IBM
- 8 EMC
- 8 Oracle
- 5 Google
- 5 Joomla!
- 5 MongoDB
- 5 RealNetworks
- 4 HP
- 4 VideoLAN
- 4 Wireshark
- 3 F-Secure
- 3 SAP
- 3 The PHP Group
- 3 Trend Micro
- 3 Zimbra
- 2 Audacity
- 2 Avast
- 2 Bitdefender
- 2 Citrix
- 2 HPE
- 2 Imagely
- 2 Infoblox
- 2 Malwarebytes
- 2 Mozilla
- 2 PCRE Library Project
- 2 Plone
- 2 Roundcube
- 2 Swisscom
- 2 Symantec
- 2 WooCommerce
- 2 WordPress
- 2 Yandex
- 1 AVG
- 1 Air France
- 1 Akamai
- 1 Amazon
- 1 Apexis
- 1 Asus
- 1 Avira
- 1 BitComet
- 1 Blackberry
- 1 CA
- 1 Cacti
- 1 D-Link
- 1 Fitbit
- 1 Hancom
- 1 Huawei
- 1 IDM Computer Solutions
- 1 Justsystem
- 1 Kaspersky
- 1 MISP
- 1 Magento
- 1 MantisBT
- 1 MariaDB
- 1 Matcha Labs
- 1 Meian
- 1 Mruby
- 1 Nagios
- 1 Nitro Software
- 1 PowerDNS
- 1 Python
- 1 Ring (formerly Doorbot)
- 1 Schneider Electric
- 1 Semper Fi Web Design
- 1 Sina
- 1 Tableau Software
- 1 Tencent
- 1 Teradata
- 1 Uber Technologies
- 1 VMware
- 1 VirtueMart
- 1 Xunlei
- 1 Zoho
Zero-Day Research | Fixes Available
Fortinet's team of dedicated expert researchers and analysts examine many third party products and software applications daily, looking for weaknesses and exploitable vulnerabilities. When a vulnerability is found the Fortiguard Lab teams work together to create protective measures that can be delivered to our customers and notify the software/product vendor of the vulnerability. Learn More
Vulnerability Severity Level
FortiGuard Event Name's Severity Level is mainly based on the ratings set forth by the Common Vulnerability Scoring System (CVSS). The CVSS is a vendor-neutral, industry standard that provides an open framework for communicating the characteristics and impacts of IT vulnerabilities.
FortiGuard Security Level | CVSS v2 Rating |
---|---|
Critical | 9 - 10 |
High | 7 - 8.9 |
Medium | 4 - 6.9 |
Low | 0.1 - 3.9 |
Info | 0 |
Common Vulnerability Scoring System Version 2.0
The Common Vulnerability Scoring System (CVSS) provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. CVSS consists of 3 groups: Base, Temporal and Environmental.
Each group produces a numeric score ranging from 0 to 10, and a Vector, a compressed textual representation that reflects the values used to derive the score. The Base group represents the intrinsic qualities of a vulnerability. The Temporal group reflects the characteristics of a vulnerability that change over time.
The Environmental group represents the characteristics of a vulnerability that are unique to any user's environment. CVSS enables IT managers, vulnerability bulletin providers, security vendors, application vendors and researchers to all benefit by adopting this common language of scoring IT vulnerabilities.
Each group produces a numeric score ranging from 0 to 10, and a Vector, a compressed textual representation that reflects the values used to derive the score. The Base group represents the intrinsic qualities of a vulnerability. The Temporal group reflects the characteristics of a vulnerability that change over time.
The Environmental group represents the characteristics of a vulnerability that are unique to any user's environment. CVSS enables IT managers, vulnerability bulletin providers, security vendors, application vendors and researchers to all benefit by adopting this common language of scoring IT vulnerabilities.
Exceptions
- If there is no CVSS rating posted, then the CVSS rating is calculated. A Base Score tool form is available at: http://nvd.nist.gov/cvss.cfm
- If the vulnerable software/system is not common in a business network environment and the FortiGuard Severity Level would normally be Critical, then the FortiGuard Severity Level may be reduced to High.
- If the vulnerability is a Denial of Service (DoS) attack and only affecting the availability of a remote service or host, then the FortiGuard Severity Level is adjusted to at most Medium for Client-side DoS and High for Server-side DoS
- For any "remote code execution" type of vulnerability, the FortiGuard Severity Level is set to either High or Critical.
Exceptions
- For identifying or detecting network traffic, the FortiGuard Severity Level is set to Informational.
- For a vulnerability/exploit that is highly active, the FortiGuard Severity Level is temporarily set to either High or Critical. Later, the level may be reduced back to its normal level; generally this is based on the temporal parameter of a vulnerability.
- For zero-day vulnerabilities where the rating has not yet been fully evaluated, the FortiGuard Severity Level is generally set at either Medium or High.
Fortinet Discovers SAP 3D Visual Enterprise Viewer DLL Preloading Vulnerability
Fortinet Discovers Cisco Immunet Installer DLL Preloading Vulnerability
Fortinet Discovers Microsoft Word RTF File Handling Memory Corruption Vulnerability
Fortinet Discovers Microsoft Windows Embedded OpenType Font Engine Information Disclosure Vulnerability II
Fortinet Discovers Microsoft Windows Embedded OpenType Font Engine Information Disclosure Vulnerability
Fortinet Discovers Adobe Shockwave Player Memory Corruption Vulnerability
Fortinet Discovers Adobe InDesign Memory Corruption Vulnerability
Fortinet Discovers Adobe DNG Converter Memory Corruption Vulnerability