Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against a memory-corruption vulnerability inMicrosoft Internet Explorer.The vulnerability is...

Mar 31, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Microsoft Internet Explorer.The vulnerability is...

Mar 31, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Microsoft Internet Explorer.The vulnerability is...

Mar 31, 2010
This indicates an attack attempt against an information-disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

Mar 31, 2010
This indicates a possible attack against a memory-corruption vulnerability in Microsoft Internet Explorer.The vulnerability occurs...

Mar 31, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Microsoft Internet Explorer.The vulnerability is...

Mar 31, 2010
This indicates a possible attack against a race-condition memory-corruption vulnerability in Microsoft Internet Explorer.This...

Mar 31, 2010
This indicates an attack attempt against a code execution vulnerability in Microsoft Windows.The vulnerability is caused by an...

Mar 30, 2010
This indicates an attack attempt against a denial of service vulnerability in Novell eDirectory. The vulnerability is caused...

Mar 30, 2010
The Asprox trojan is designed to create a spam botnet and send spam emails. It installs as a system service named "Microsoft Security...

Mar 29, 2010
This indicates an attack attempt against a buffer overflow vulnerability in Mozilla Firefox. The vulnerability is caused by an...

Mar 29, 2010
This indicates that a system might be infected by Asprox Botnet

Mar 28, 2010
This indicates an attack attempt against a heap-overflow vulnerability in Adobe Reader and Acrobat.This vulnerability is caused...

Mar 25, 2010
This indicates an attack attempt against a denial of service vulnerability in MIT's Kerberos.The vulnerability is caused by a...

Mar 25, 2010
This indicates an attack attempt against a security bypass vulnerability in Linux Kernel.The vulnerability is caused by an error...

Mar 25, 2010
This indicates an attack attempt against a buffer overflow vulnerability in Novell iManager eDirectory plugin.The vulnerability...

Mar 25, 2010
This indicates an attack attempt against a buffer overflow vulnerability in Orbital Viewer. The vulnerability is caused by an...

Mar 25, 2010
This indicates that the system might be infected by the Bredolab trojan.

Mar 24, 2010
This indicates an attack attempt against a buffer overflow vulnerability in HP Power Manager.The vulnerability is caused by an...

Mar 23, 2010
This indicates an attack attempt against a buffer overflow vulnerability in IBM Lotus Domino Server.The vulnerability is caused...

Mar 23, 2010