Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

It indicates a possible exploit of remote file include vulnerability in Bitrix Site Manage.Bitrix Site Manager is a powerful...

Jun 29, 2005
It indicates a possible exploit of remote file inclusion vulnerability in Cacti software. Cacti is a front-end application...

Jun 29, 2005
It indicates a possible exploit of information disclosure vulnerability in 3Com 3CDaemon. 3CDaemon is a free TFTP, FTP, and Syslog...

Jun 28, 2005
It indicates a possible directory traversal vulnerability in glFtp server software.glFtp is an open source ftp server software...

Jun 28, 2005
This indicates a possible exploit of a "DHTML Edit Control" cross domain vulnerability through Internet Explorer."DHTML Edit Control"...

Jun 28, 2005
This indicates a possible exploit of a Font tag denial of service vulnerability in Microsoft Internet Explorer.A vulnerability...

Jun 28, 2005
It indicates a possible exploit of information disclosure vulnerability in Internet Explorer. The "sysimage:" URI handler is used...

Jun 28, 2005
Indicates the presence of the Midnight Massacre virus.

Jun 28, 2005
Indicates the presence of Sober.K. Sober.K, a mass-mailing worm that uses its own SMTP engine to send itself to email addresses...

Jun 28, 2005
Indicates the presence of the Blaster worm.

Jun 28, 2005
It indicates a possible variant of Loveletter.VBS worm passing through the network on TCP POP3 port in an email attachment.For...

Jun 28, 2005
It indicates a detection of one of the variant of Netsky.Z worm propagation through email attachement in email download using...

Jun 28, 2005
Indicates a possible attempt to exploit a buffer overflow vulnerability in Mercantec SoftCart that may allow an attacker to execute...

Jun 24, 2005
This indicates an attempt to exploit a buffer overflow vulnerability in Icecast server.Icecast is an audio broadcast system that...

Jun 24, 2005
This indicates a possible attempt to exploit a vulnerability in the Microsoft Abstract Syntax Notation (ASN.1) library. The vulnerability...

Jun 24, 2005
This indicates a possible exploit of a remote buffer overflow vulnerability in Microsoft's SMB implementation.The vulnerability...

Jun 23, 2005
Indicates a possible exploit of a stack-based authentication buffer overflow vulnerability in Veritas Backup Exec software Veritas...

Jun 22, 2005
Indicates a possible exploit of denial of service vulnerability in Veritas Software Backup Exec agent software. Veritas Backup...

Jun 22, 2005
This indicates a possible exploit of a buffer-overflow and directory-traversal vulnerability in the Computer Associates License...

Jun 17, 2005
It indicates a possible exploit of a buffer-overflow vulnerability in Oracle9i database server.Oracle 9i has a service called...

Jun 17, 2005