Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit an Integer Overflow vulnerability in Android.The vulnerability is due to a numeric...

Jul 31, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in SolarWinds Storage Manager.The vulnerability is...

Jul 30, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Accellion File Transfer.The vulnerability...

Jul 28, 2015
This indicates an attack attempt against a Remote Code Injection vulnerability in Accellion File Transfer.The vulnerability is...

Jul 28, 2015
This indicates an attack attempt to exploit a system through the CK Exploit Kit.The CK Exploit Kit attempts to compromise a system...

Jul 28, 2015
This indicates an attack attempt to exploit a Stack based Buffer Overflow vulnerability in PHP.The vulnerability is due to an...

Jul 28, 2015
This indicates an attack attempt against a Remote Code Execution vulnerability in Western Digital Arkeia Appliance.The vulnerability...

Jul 28, 2015
This indicates that a system might be infected by TorrentLocker Botnet

Jul 23, 2015
This indicates an attack attempt against a DNS Cache Poisoning vulnerability in Microsoft DNS server.The vulnerability is caused...

Jul 22, 2015
This indicates an attack attempt to exploit a Remote Command Injection vulnerability in EMC AutoStart.The vulnerability is due...

Jul 22, 2015
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Microsoft Office.The vulnerability is due...

Jul 22, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

Jul 22, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

Jul 22, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Office.The vulnerability is due to...

Jul 22, 2015
This indicates an attack attempt to exploit an Privilege Escalation vulnerability in Microsoft Internet Explorer.The vulnerability...

Jul 22, 2015
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Windows.The vulnerability is due to an error...

Jul 22, 2015
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Microsoft Windows.The vulnerability is due...

Jul 22, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Office.The vulnerability is due to...

Jul 22, 2015
This indicates an attack attempt to exploit a Denial of Service vulnerability in PHP.The vulnerability is a result of the application's...

Jul 22, 2015
This indicates an attack attempt to exploit an Use After Free Memory Corruption vulnerability in Adobe Flash Player.The vulnerability...

Jul 21, 2015