Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates detection of Cobalt Strike Beacon Backdoor.Backdoor trojans have the capability to connect to remote hosts and...

Sep 30, 2014
Firefox is a browser. SeaMonkey is a suite of applications that includes a browser and an email client. Thunderbird is an email...

Sep 30, 2014
IBM J2SE version 5.0 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.Unspecified vulnerability...

Sep 30, 2014
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package...

Sep 30, 2014
The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security (TLS). Buffer...

Sep 30, 2014
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Sep 25, 2014
This indicates an attack attempt to exploit a Memory Leakage vulnerability in Adobe Flash Player.The vulnerability is due to an...

Sep 25, 2014
This indicates an attack attempt against a Denial Of Service vulnerability in OpenSSL.The vulnerability is due to an error in...

Sep 25, 2014
This indicates an attack attempt to exploit a Directory Traversal vulnerability in HP Network Visualization.The vulnerability...

Sep 25, 2014
This indicates an attack attempt to exploit a remote Code Execution Vulnerability in AlienVault OSSIM.The vulnerability is due...

Sep 25, 2014
This indicates an attack attempt to exploit a Memory Corruption vulnerability in PHP.The vulnerability is due to an error in the...

Sep 25, 2014
This indicates an attempt to perform a Brute Force attack against a Microsoft Outlook Web App server.The attack consists of multiple...

Sep 25, 2014
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Bash.The vulnerability is due to insufficient...

Sep 25, 2014
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Sep 25, 2014
This indicates an attack attempt to exploit Denial of Service vulnerability in Apache HTTP Server.The vulnerability is due to...

Sep 25, 2014
This indicates that a system might be infected by Mentor Botnet.

Sep 25, 2014
This indicates that a system might be infected by Neutrino Botnet.

Sep 25, 2014
This indicates an attack attempt to exploit a SQL Injection Vulnerability in Multiple ManageEngine products.The vulnerability...

Sep 23, 2014
Firefox is a browser. Thunderbird is an email client. Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox...

Sep 23, 2014
This indicates an attack attempt to exploit a Code Injection Vulnerability in HybridAuth.The vulnerability is due to an input...

Sep 23, 2014