Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against a Denial of Service vulnerability in Linux Kernel SCTP Protocol.The vulnerability is...

Feb 26, 2015
This indicates detection of a Zero-Day vulnerability protected by a signature from Fortinet's FortiGuard Labs.This signature should...

Feb 26, 2015
This indicates detection of a Zero-Day vulnerability protected by a signature from Fortinet's FortiGuard Labs. This signature...

Feb 26, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Oracle Java.The vulnerability is due to an error...

Feb 26, 2015
This indicates an attack attempt to exploit a SQL Injection Vulnerability in Pandora FMS.The vulnerability is due to an input...

Feb 26, 2015
This indicates that a system might be infected by the Arid Viper Botnet.

Feb 26, 2015
This indicates detection of SoakSoak Malware.

Feb 24, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in PHP.The vulnerability is due to a use after free...

Feb 24, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in PHP exif extension.The vulnerability is due to an...

Feb 24, 2015
The Graphics Device Interface (GDI) is a Microsoft Windows application programming interface and core operating system component...

Feb 19, 2015
Microsoft Group Policy control domain user or hosts permission.The vulnerability could allow remote code execution if an attacker...

Feb 19, 2015
Microsoft Office is an office suite developed by Microsoft.The vulnerability could allow security feature bypass if a user opens...

Feb 19, 2015
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Cacti.The vulnerability is due to insufficient...

Feb 19, 2015
Microsoft Group Policy control domain user or hosts permission.The vulnerability could allow security feature bypass if an attacker,...

Feb 19, 2015
Microsoft Windows is an operating system developed by Microsoft.The vulnerability could allow an attacker to leverage the lack...

Feb 19, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in RPM package manager.The vulnerability is caused...

Feb 19, 2015
This indicates an attack attempt against an SQL Injection vulnerability in Multiple ManageEngine products.The vulnerability is...

Feb 19, 2015
Microsoft Internet Explorer is a web browser developed by Microsoft and available in Microsoft Windows.The most severe of these...

Feb 19, 2015
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Schneider Electric ProClima.The vulnerability...

Feb 19, 2015
Microsoft Office is an office suite developed by Microsoft.The vulnerabilities could allow remote code execution if a user opens...

Feb 19, 2015