Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against an arbitrary File Upload vulnerability in Project Pier.The vulnerability is caused by...

Oct 31, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Novell File Reporter.The vulnerability is due to...

Oct 31, 2012
JIRA is a proprietary issue tracking product, developed by Atlassian, commonly used for bug tracking, issue tracking, and project...

Oct 31, 2012
TinyBrowser is a Joomla! component for browsing files, built for the popular Javascript TinyMCE WYSIWYG content editor.The Joomla!...

Oct 31, 2012
jCart is a free Ajax shopping cart based on jQuery and PHP.jCart is prone to a cross-site scripting vulnerability because it fails...

Oct 31, 2012
RSLogix 5000 is programming software. This application is prone to a vulnerability:RnaUtility.dll in RsvcHost.exe 2.30.0.23 in...

Oct 31, 2012
In Oct. 2012, several Linux vendors, including Oracle, RedHat and CentOS released packages for OpenJDK 6 Java Runtime Environment...

Oct 31, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Cisco WebEx Recording Format (WRF) Player.The...

Oct 31, 2012
Geeklog is an open source content management system written in PHP.A SQL injection vulnerability exists in Geeklog. The vulnerability...

Oct 31, 2012
IBM Lotus Domino is a client/server product designed for collaborative working environments. This application is prone to a vulnerability:Stack-based...

Oct 31, 2012
JIRA is a proprietary issue tracking product, developed by Atlassian, commonly used for bug tracking, issue tracking, and project...

Oct 31, 2012
HP Data Protector provides automated backup and recovery of physical and virtual servers from disk or tape.This application is...

Oct 31, 2012
The remote host if running Microsoft Windows operating system. The administrator account password is blank. It's possible for...

Oct 31, 2012
This indicates an attack attempt against a remote Code Execution vulnerability in AjaXplorer.The vulnerability is due to how the...

Oct 31, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in WebKit, a component of Apple Safari.The vulnerability...

Oct 31, 2012
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Mozilla Firefox.The vulnerability is due...

Oct 31, 2012
jRSS Widget is a jquery based RSS reader widget for WordPress.The jRSS Widget Plugin for WordPress is prone to an information-disclosure...

Oct 31, 2012
In Oct. 2012, several Linux vendors, including Oracle, RedHat and CentOS released packages for java-1.7.0-openjdk that fix multiple...

Oct 31, 2012
This indicates an attack attempt against an arbitrary File Upload vulnerability in Avaya IP Office Customer Call Reporter.The...

Oct 30, 2012
This indicates an attempt to exploit a Code Execution vulnerability in Adobe Shockwave Player.This vulnerability is due to an...

Oct 30, 2012