Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Aug 27, 2015
This indicates an attack attempt against an Arbitrary File Upload vulnerability in SysAid Help Desk.The vulnerability is due to...

Aug 27, 2015
This indicates an attack attempt to exploit a vulnerability in Adobe Flash Player.This signature detects malicious obfuscated...

Aug 27, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in Adobe Flash Player.The vulnerability is due to an...

Aug 27, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Aug 27, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in Adobe Flash Player.The vulnerability is due to an...

Aug 27, 2015
This indicates an attack attempt against a persistent cross-site scripting vulnerability in Microsoft SharePoint Server. This...

Aug 27, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

Aug 25, 2015
This indicates an attack attempt to exploit a Security Bypass Vulnerability in Adobe Acrobat Reader.The vulnerability is due to...

Aug 25, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Aug 25, 2015
This indicates an attack attempt to exploit a Denial-Of-Service vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Aug 25, 2015
This indicates detection of a Zero-Day vulnerability protected by a signature from Fortinet's FortiGuard Labs.This signature should...

Aug 25, 2015
This indicates an attack attempt to exploit a Replay Attack vulnerability in Oracle Java SE.The vulnerability is due to an error...

Aug 25, 2015
This indicates an attack attempt to exploit an Integer Overflow vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Aug 25, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Adobe Acrobat Reader.The vulnerability...

Aug 25, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Apple QuickTime.The vulnerability is due to insufficient...

Aug 25, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

Aug 25, 2015
This indicates an attack attempt to exploit an Integer Overflow vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Aug 25, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Adobe Acrobat Reader.The vulnerability...

Aug 25, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Adobe Acrobat Reader.The vulnerability...

Aug 25, 2015