Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against a Use-After-Free vulnerability in Mozilla Firefox.The vulnerability is caused by an error...

Sep 26, 2013
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Kingsoft Writer.The vulnerability is due to an...

Sep 26, 2013
BIND is an implementation of the DNS protocol.The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2,...

Sep 26, 2013
PHP is a scripting language designed for CGI applications that is used on many websites.Session fixation vulnerability in the...

Sep 26, 2013
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Ruby on Rails.The vulnerability is due to...

Sep 26, 2013
This indicates an attack attempt to exploit a remote Code Execution vulnerability in HP LoadRunner.The vulnerability, which is...

Sep 26, 2013
These packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Software Development Kit.The update has fixed...

Sep 26, 2013
Kernel is a core component of an operating system.There are several vulnerabilities identified in the kernel:The Bluetooth protocol...

Sep 26, 2013
In August 2013, Ubuntu released update packages for linux-lts-raring that fixed multiple vulnerabilities:net/ceph/auth_none.c...

Sep 26, 2013
Joomla! is a free and open-source content management system) written in PHP. It uses object-oriented programming techniques and...

Sep 26, 2013
This indicates an attack attempt against a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability is...

Sep 26, 2013
Libgcrypt is a cryptographic library based on the GnuPG code. GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG...

Sep 26, 2013
Joomla! is a free and open source content management system written in PHP. It uses object-oriented programming techniques and...

Sep 26, 2013
This indicates an attack attempt to exploit an Insecure Library Loading vulnerability in EC Software Help & Manual. The vulnerability...

Sep 26, 2013
This indicates an attack attempt to exploit a remote Code Injection Vulnerability in Oracle Endeca Server.The vulnerability is...

Sep 26, 2013
This indicates an attack attempt to exploit a remote Code Execution Vulnerability in PineApp Mail-SeCure Server.The vulnerability...

Sep 26, 2013
This indicates an attack attempt against a Memory Corruption vulnerability in Microsoft Office.The vulnerability is caused by...

Sep 26, 2013
This indicates an attack attempt to exploit a Remote Command Injection vulnerability in Sophos Web Protection Appliance.The vulnerability...

Sep 26, 2013
Apache is an open source web server available in various platforms.There are two vulnerabilities identified in the application.mod_dav.c...

Sep 26, 2013
Joomla! is a free and open source content management system written in PHP. It uses object-oriented programming techniques and...

Sep 26, 2013