Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Citrix Access Gateway Plug-in for Windows.The vulnerability...

Aug 30, 2012
This indicates an attack attempt against a Cross Site Request Forgery vulnerability in in the "Web Gateway" component of IBM WebSphere...

Aug 30, 2012
This indicates an attack attempt against an Authentication Bypass vulnerability in Oracle Business Transaction Management Server.The...

Aug 30, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in IBM Lotus iNotes.The vulnerability, which is located...

Aug 29, 2012
This indicates an attack attempt against a Sandbox Bypass Vulnerability in Oracle Java Runtime Environment.The vulnerability is...

Aug 29, 2012
This indicates an attack attempt against a Command Execution vulnerability in PHP IRC Bot.The vulnerability is due to insufficient...

Aug 29, 2012
This indicates an attack attempt against a Security Bypass vulnerability in The MySQL component in Plixer Scrutinizer aka Dell...

Aug 29, 2012
This indicates an attack attempt to exploit a SQL Injection vulnerability in Symantec Web Gateway.The vulnerability is due to...

Aug 29, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Aug 28, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Aug 28, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in WebKit, a component of Apple Safari.The vulnerability...

Aug 28, 2012
This indicates an attack attempt against a Command Execution vulnerability in Basilic.The vulnerability is caused by an error...

Aug 28, 2012
It indicates an attempt to exploit a Denial of Service vulnerability in some versions of CiscoSecure ACS for Windows NT.The vulnerability...

Aug 28, 2012
This indicates a possible attempt to exploit a Buffer Overflow vulnerability Cisco Linksys PlayerPT ActiveX control.The vulnerability,...

Aug 28, 2012
This indicates an attack attempt against an Arbitrary File Upload vulnerability in CuteFlow.The vulnerability is caused by an...

Aug 28, 2012
This indicates a system might be infected by DistTrack botnet.DistTrack, also known as Shamoon, is a computer virus that attacks...

Aug 28, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in HP Operations Agent.The vulnerability is due to...

Aug 28, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in HP Operations Agent.The vulnerability is due to...

Aug 28, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in ISC DHCP Server.The vulnerability is due to an...

Aug 28, 2012
This indicates an attack attempt to exploit a Privilege Escalation vulnerability in multiple Linux Systems.The vulnerability is...

Aug 28, 2012