Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Adobe Flash Player.The vulnerability is due to...

Apr 30, 2014
This indicates that a system might be infected by the Theef botnet.

Apr 30, 2014
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.The update has fixed the...

Apr 30, 2014
IBM Java is a cross platform software running environment available in RedHat Linux.The vulnerabilities are published in Common...

Apr 30, 2014
Vtiger CRM is business management suite consists of email, inventory, project management and other tools. There are several vulnerabilities...

Apr 30, 2014
IBM Java is a cross platform software running environment available in RedHat Linux.There are several vulnerabilities identified...

Apr 30, 2014
This indicates an attack attempt to exploit a Memory Corruption Vulnerability in Internet Explorer.The vulnerability is due to...

Apr 28, 2014
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Microsoft Windows.The vulnerability results...

Apr 28, 2014
This indicates an attack attempt to exploit a Directory Traversal vulnerability in McAfee Cloud Identity Manager.The vulnerability...

Apr 28, 2014
Juniper JUNOS is the network operating system used in Juniper Networks hardware systems.Juniper Junos 10.4 before 10.4R16, 11.4...

Apr 28, 2014
This indicates an attack attempt against Directory Traversing vulnerability in McAfee Asset Manager.The vulnerability is due to...

Apr 28, 2014
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in IBM Lotus Quickr.The vulnerability is due to an...

Apr 28, 2014
This indicates an attack attempt to exploit a Security Policy Bypass vulnerability in Symantec LiveUpdate Administrator.The vulnerability...

Apr 28, 2014
This indicates an attack attempt against a Denial of Service vulnerability in OpenSSL TLS.The vulnerability is caused by an error...

Apr 25, 2014
Joomla is an open source content management web application. A YouTube Gallery component is available for Joomla.There is a vulnerabilities...

Apr 25, 2014
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.Adobe Flash Player before...

Apr 25, 2014
These packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Software Development Kit.In Jan. 2014, Red Hat...

Apr 25, 2014
EMC Cloud Tiering Appliance optimize the NAS infrastructure.There is a vulnerability identified in the application.An attacker...

Apr 25, 2014
The java-1.6.0-openjdk is a cross platform application runtime environment and software development kit. It is available in RedHat.There...

Apr 25, 2014
Joomla is an open source content management web application with a lot of plugins. There is a Google Map plugin available. There...

Apr 25, 2014