Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Enterasys NetSight. The vulnerability is due to...

Jan 31, 2013
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in GNU Image Manipulation Program (GIMP).The vulnerability...

Jan 31, 2013
This indicates an attempt to exploit an Arbitrary File Download vulnerability in Honeywell Tema Remote Installer ActiveX Control....

Jan 31, 2013
This indicates an attack attempt to exploit an Authentication Bypass vulnerability in eXtplorer.The vulnerability is due to the...

Jan 31, 2013
This indicates an attack attempt against a Cross-Site Request Forgery vulnerability in Cisco Wireless Lan Controller.The vulnerability...

Jan 29, 2013
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Microsoft .NET Framework.The vulnerability is due...

Jan 29, 2013
This indicates an attack attempt against an arbitrary File Upload vulnerability in the Asset Manager plug-in for WordPress.The...

Jan 29, 2013
This indicates an attack attempt to exploit a File Inclusion vulnerability in the WordPress blogging software plugin Advanced...

Jan 29, 2013
This indicates an attack attempt to exploit an Arbitrary File Disclosure vulnerability in WordPress Plugin Google Document Embedder.This...

Jan 29, 2013
This indicates an attack attempt against an arbitrary File Upload vulnerability in the WP-Property plug-in for WordPress.The vulnerability...

Jan 29, 2013
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Contaware FreeVimager. The vulnerability is due...

Jan 25, 2013
This indicates an attack attempt to exploit multiple vulnerabilities in JCE Joomla! extension.This issue is caused by a lack of...

Jan 25, 2013
This indicates an attack attempt to exploit a Heap Buffer Overflow vulnerability in Nagios. The vulnerability is due to an improper...

Jan 24, 2013
This indicates an attack attempt against a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is caused by...

Jan 22, 2013
This indicates an attack attempt against a Buffer Overflow vulnerability in Microsoft Windows.The vulnerability is caused by an...

Jan 22, 2013
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Multiple Mozilla Products.The vulnerability is...

Jan 22, 2013
This indicates an attack attempt to exploit an arbitrary File Retrieval vulnerability in Novell File Reporter.The vulnerability...

Jan 22, 2013
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in RealNewtorks RealPlayer.The vulnerability is due...

Jan 22, 2013
This detects a connection to Smoke botnet c&c server and usage of dns packets find active server.This botnet spreads through Skype.

Jan 22, 2013
This indicates an attack attempt against a Denial of Service vulnerability in Android OS.The vulnerability is caused by an error...

Jan 18, 2013