Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Memory Corruption vulnerability in Cisco WebEx ARF Player.The vulnerability is due...

May 29, 2014
This indicates an attack attempt to exploit a Directory Traversal vulnerability in Panda AdminSecure communications infrastructure.The...

May 29, 2014
Vtiger CRM is business management suite consists of email, inventory, project management and other tools. modules/Users/ForgotPassword.php...

May 29, 2014
Microsoft SharePoint is a collaboration service developed by Microsoft.There are several vulnerabilities identified in the application.An...

May 29, 2014
PivoxtX is an open-source CMS software.Cross-site scripting (XSS) vulnerability in pivotx/ajaxhelper.php in PivotX 2.3.2 and earlier...

May 29, 2014
This indicates an remote command execution using rsh as root.The Remote Shell (rsh) is an application that executes shell commands...

May 29, 2014
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Cisco WebEx ARF Player.The vulnerability is due...

May 29, 2014
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Cisco WebEx ARF Player.The vulnerability is due...

May 29, 2014
Microsoft Office is an office suite developed by Microsoft.There are two vulnerabilities identified in the application.A remote...

May 27, 2014
This indicates an attack attempt to exploit a Cross-Site Scripting vulnerability in Symantec Messaging Gateway Management.The...

May 27, 2014
MediaWiki is a free software wiki package written in PHP, originally for use on Wikipedia.Cross-site scripting (XSS) vulnerability...

May 27, 2014
PivoxtX is an open-source CMS software.Multiple cross-site scripting (XSS) vulnerabilities in PivotX before 2.3.9 allow remote...

May 27, 2014
This indicates an attack attempt against a remote Code Execution vulnerability in Nagios Remote Plugin Executor.The vulnerability...

May 27, 2014
This indicates an attack attempt against a Buffer Overflow vulnerability in the Advantech WebAccess SCADA.The vulnerability, which...

May 27, 2014
Google Chrome is a cross platform browser.There are several vulnerabilities identified in the application.Google V8, as used in...

May 27, 2014
Mozilla Firefox, Thunderbird and SeaMonkey are software developed by Mozilla Foundation. They share many core libraries in the...

May 27, 2014
Drupal is an open source content management software.Drupal 6.x before 6.31 and 7.x before 7.27 does not properly isolate the...

May 27, 2014
Internet Explorer is a web browser available in Windows Platform.Two memory corruption vulnerabilities are identified in the application....

May 22, 2014
Microsoft Internet Explorer is a web browser available in various Windows Platforms.There is a vulnerability identified in the...

May 22, 2014
Microsoft Group Policy Preference control domain user or hosts permission.There is a vulnerability identified in the application.An...

May 22, 2014