Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Security Bypass vulnerability in Oracle Java.The vulnerability is due to insufficient...

Jan 31, 2014
This indicates an attack attempt to exploit a Security Bypass vulnerability in Oracle Java.The vulnerability is due to insufficient...

Jan 31, 2014
This indicates an attack attempt to exploit a Denial of Service vulnerability in Apache Software Foundation Santuario XML Security...

Jan 31, 2014
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in RealNetworks RealPlayer.The vulnerability is due...

Jan 31, 2014
ZEN is a Time Tracking and Project Management application that organises your projects and tasks as well as eliminates the need...

Jan 31, 2014
Node.js is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network applications. The HTTP server...

Jan 31, 2014
This indicates an attack attempt against a Memory Disclosure vulnerability in Adobe Shockwave.The vulnerability is due to an error...

Jan 31, 2014
This indicates an attack attempt to exploit a Denial of Service vulnerability in PHP.The vulnerability is due to an error in creating...

Jan 31, 2014
VMware ESXi is an enterprise level computer virtualization product. OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before...

Jan 31, 2014
Tntnet is a web server that allows users to develop web applications using C++. It has a template language ecpp where C++ code...

Jan 31, 2014
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Synology DiskStation Manager.The vulnerability...

Jan 31, 2014
Apache HTTP Server is an HTTP web server application. The log_cookie function in mod_log_config.c in the mod_log_config module...

Jan 31, 2014
This indicates an attack attempt against an Information Disclosure vulnerability in IBM Rational Focal Point.The vulnerability...

Jan 30, 2014
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in VideoLAN VLC media player.The vulnerability is...

Jan 30, 2014
Google Chrome is a Web browser for multiple platforms.Use-after-free vulnerability in the FormAssociatedElement::formRemovedFromTree...

Jan 30, 2014
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Google Picasa.The vulnerability is due to an error...

Jan 30, 2014
In September 2013, Ubuntu released update packages for Linux Kernel that fixed multiple vulnerabilities:net/ceph/auth_none.c in...

Jan 30, 2014
This indicates an attack attempt against a Memory Disclosure vulnerability in Adobe Shockwave.The vulnerability is due to an error...

Jan 30, 2014
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader. The vulnerability is...

Jan 30, 2014
OpenJPEG is an open source library for reading and writing image files in JPEG 2000 format.OpenJPEG 1.3 and earlier allows remote...

Jan 30, 2014