Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attempt to exploit a buffer-overflow vulnerability in W32Dasm, a disassembler/debugger developed by URSoft....

Jan 28, 2009
This indicates an attack attempt to exploit a memory corruption vulnerability in Microsoft Windows.The vulnerability is caused...

Jan 16, 2009
This indicates an attack attempt against a code execution vulnerability in Microsoft Server Message Block (SMB) Protocol software....

Jan 16, 2009
This indicates an attack attempt against an SQL-injection vulnerability in Openfire. The vulnerability is caused by an error when...

Jan 13, 2009
This indicates a possible attempt to exploit a buffer-overflow vulnerability in Oracle Secure Backup.The vulnerability is located...

Jan 13, 2009
This indicates an attack attempt against a buffer-overflow vulnerability in Adobe Reader. The vulnerability is caused by...

Jan 08, 2009
This indicates an attack attempt against a buffer-overflow vulnerability in Autonomy KeyView Module. The vulnerability is...

Jan 08, 2009
This indicates an attack attempt against a memory corruption vulnerability in Microsoft SQL Server.The vulnerability is caused...

Jan 08, 2009
This indicates an attempt to exploit a buffer-overflow vulnerability in Adobe Acrobat and Reader. The vulnerability is in the...

Jan 06, 2009
This indicates an attack attempt against a directory-traversal vulnerability in the Apache Struts.The vulnerability is caused...

Jan 06, 2009
This indicates an attempt to exploit a buffer-overflow vulnerability in IntelliTamper. The vulnerability is caused by an error...

Jan 06, 2009
This indicates an attack attempt against a buffer-overflow vulnerability in VideoLAN VLC Media Player.The vulnerability is caused...

Jan 06, 2009
This indicates an attack attempt against an authentication bypass vulnerability in rlogind.The vulnerability is caused by incorrect...

Jan 06, 2009
This indicates an attack attempt to exploit a memory corruption vulnerability in Trend Micro HouseCall. The vulnerability is located...

Jan 06, 2009