Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against a remote Code Execution vulnerability in AjaXplorer.The vulnerability is due to how the...

Oct 31, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in WebKit, a component of Apple Safari.The vulnerability...

Oct 31, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Cisco WebEx Recording Format (WRF) Player.The...

Oct 31, 2012
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Mozilla Firefox.The vulnerability is due...

Oct 31, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Novell File Reporter.The vulnerability is due to...

Oct 31, 2012
This indicates an attack attempt against an arbitrary File Upload vulnerability in Project Pier.The vulnerability is caused by...

Oct 31, 2012
This indicates an attempt to exploit a Code Execution vulnerability in Adobe Shockwave Player.This vulnerability is due to an...

Oct 30, 2012
This indicates an attack attempt against an arbitrary File Upload vulnerability in Avaya IP Office Customer Call Reporter.The...

Oct 30, 2012
This indicates an attack attempt to exploit a Denial of Service vulnerability in Ekiga.The vulnerability is due to an input validation...

Oct 30, 2012
This indicates an attack attempt against a Command Execution vulnerability in PhpTax.The vulnerability is caused by an error when...

Oct 30, 2012
This indicates a possible attack against a remote Command Execution vulnerability in QNX QCONN.The vulnerability is due to the...

Oct 25, 2012
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Microsoft Word.The vulnerability is caused...

Oct 24, 2012
This indicates an attack attempt to exploit a blind SQL injection vulnerability in Symantec Web Gateway.The vulnerability is a...

Oct 24, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Oct 23, 2012
This indicates detection of DHL Botnet attempting to download malware from its control server. The botnet spreads via email.

Oct 23, 2012
This indicates an attack attempt to exploit a Denial of Service vulnerability in ISC BIND.The vulnerability is due to an error...

Oct 23, 2012
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Oracle Database 11g authentication protocol.The...

Oct 23, 2012
This indicates an attack attempt to exploit a SQL Injection vulnerability in Trend Micro Control Manager.The vulnerability is...

Oct 23, 2012
This indicates an attack attempt to exploit a Backdoor in phpMyAdmin.A backdoor allows for security bypass and remote access to...

Oct 23, 2012
This indicates an attack attempt to exploit a Security Bypass vulnerability in Cisco AnyConnect VPN client.The vulnerability is...

Oct 18, 2012