Understanding Named Vulnerabilities and the Workfront Trust Site

What Is a Named Vulnerability? 

In computer security, a vulnerability is a weakness which allows an attacker to reduce the stability, the security, or the integrity of a system.

Vulnerability researchers and exploit creators name their projects internally to make it easy to reference them. When a vulnerability has wide-spread impact these names become public when the vulnerabilities are disclosed. 

For example, the following are some recent named vulnerabilities: ShellShock, Heartbleed, POODLE, and WannaCry/Petya.

What Is the Trust Site? 

You can view real-time status reports for the Workfront on-demand hosted servers by accessing our Trust Site. You have access to service information as it is captured, validating Workfront's commitment to uptime, openness, and transparency.

You can view the Trust Site by accessing this URL:

You have access to the following information on the Trust Site:

  • Real-time system performance stats
  • Planned maintenance scheduling
  • Information on safeguards employed by Workfront to protect user data
  • Named vulnerability statuses

How Do I View Named Vulnerabilities Identified by Workfront?

  1. Navigate to
  2. Navigate to, then click Security.

Why Is This important? 

Any security-aware network administrators should be familiar with the Trust Site and the named vulnerabilities identified by Workfront. 

When large impact vulnerabilities are disclosed it is imperative to ensure your vendors are aware and keeping your data protected.

The Trust Site offers a current log of such vulnerabilities that you can reach at any time, where you can avoid the wait from logging a ticket or reaching out to your account manager to obtain this information.