Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against a code-execution vulnerability in Apple Safari.The vulnerability is caused by an error...

May 27, 2010
This indicates an attack attempt to exploit a code-execution vulnerability in Novell ZENworks.The vulnerability is caused by an...

May 27, 2010
This indicates an attack attempt against a buffer-overflow vulnerability in the Liquid XML Studio software.The vulnerability is...

May 27, 2010
This indicates an attack attempt against a denial-of-service vulnerability in Linux kernel.The vulnerability is caused by an error...

May 27, 2010
This indicates an attack attempt against a stack-based buffer overflow vulnerability in AgentX++, which could allow remote attackers...

May 25, 2010
This indicates an attack attempt against a code execution vulnerability in OpenX adserver. The vulnerability is caused by an error...

May 25, 2010
This indicates an attack attempt against a code-execution vulnerability in Microsoft SMB Client.The vulnerability is caused by...

May 25, 2010
This indicates detection of an attempt by an infected computer to download a trojan from certain web sites.

May 25, 2010
This indicates a possible attack against a directory-traversal vulnerability in the DeploymentFileRepository class in JBoss Application...

May 25, 2010
This indicates an attack attempt against a buffer-overflow vulnerability in ZipScan. The vulnerability is caused by an error...

May 25, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Apple Safari.The vulnerability is caused by a use-after-free...

May 20, 2010
This indicates an attempt to exploit a remote Code Execution vulnerability in Adobe Photoshop.The vulnerability is caused by an...

May 20, 2010
This indicates a detection of at least 60 failed IMAP logins in 10 seconds which indicate a possible IMAP logins brute force attack....

May 19, 2010
This indicates a detection of at least 60 failed Oracle logins in one minute which indicate a possible Oracle logins brute force...

May 19, 2010
This indicates an attack attempt to exploit a code-execution vulnerability in Realnetworks Helix Server.The vulnerability is caused...

May 18, 2010
This indicates a possible attack against a priviledge-abuse vulnerability in Maple.The vulnerability is in the Maple Maplet File...

May 18, 2010
This indicates a detection of at least 60 failed Telnet logins in one minute which indicate a possible Telnet logins brute force...

May 14, 2010
This indicates a detection of at least 200 failed POP3 logins in 10 seconds which indicate a possible POP3 logins brute force...

May 14, 2010
This indicates a detection of at least 200 HTTP authentications in 10 seconds which indicate a possible HTTP authentication brute...

May 14, 2010
This indicates multiple FTP login failures sent by an FTP server to the same FTP client occurring in a short period of time (200...

May 14, 2010