Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed...

Sep 12, 2017
It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed...

Sep 12, 2017
The vulnerabilites on following products could cause system to become vulnerable to malicious security attack: Adobe Flash Player...

Sep 12, 2017
An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security...

Sep 12, 2017
An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

Sep 12, 2017
This vulnerability was fixed to prevent any future impacts.

Sep 12, 2017
An attacker needs to be able to send specially crafted NetBT Session Service packets to an impacted system.

Sep 12, 2017
An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

Sep 12, 2017
An attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating...

Sep 12, 2017
An attacker could issue a specially crafted certificate on the guest operating system that could cause the VM host agent service...

Sep 12, 2017
An attacker who successfully exploited this vulnerability could trick a user by redirecting the user to a specially crafted website.

Sep 12, 2017
An attacker could execute arbitrary code in the context of the current user.

Sep 12, 2017
An attacker to execute arbitrary code in the context of the current user.

Sep 12, 2017
An attacker to execute arbitrary code in the context of the current user.

Sep 12, 2017
An attacker who successfully exploited the vulnerability could obtain specific information that is used in the parent domain.

Sep 12, 2017
An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Sep 12, 2017
An attacker could execute arbitrary code in the context of the current user.

Sep 12, 2017
An attacker could execute arbitrary code in the context of the current user.

Sep 12, 2017
An attacker could execute arbitrary code in the context of the current user.

Sep 12, 2017
An attacker who successfully exploited this vulnerability in software using the .

Sep 12, 2017