Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Illustrator.The vulnerability is due to...

Jan 20, 2020
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Illustrator.The vulnerability is due to...

Jan 20, 2020
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Illustrator.The vulnerability is due to...

Jan 20, 2020
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Illustrator.The vulnerability is due to...

Jan 20, 2020
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Illustrator.The vulnerability is due to...

Jan 20, 2020
This indicates an attack attempt to exploit a Directory Traversal Vulnerability in Alcatel-Lucent Omnivista 4760.The vulnerability...

Jan 20, 2020
This indicates an attack attempt to exploit an Information Disclosure Vulnerability in Alcatel-Lucent OmniVista devices.The vulnerability...

Jan 20, 2020
This indicates detection of an attempted scan from DFind Vulnerability Scanner.

Jan 20, 2020
This indicates an attack attempt to exploit a Command Injection vulnerability in EyeLock nano NXT.The vulnerability is due to...

Jan 20, 2020
This indicates an attack attempt to exploit am Information Disclosure Vulnerability in Microsoft Sharepoint Server.The vulnerability...

Jan 20, 2020
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in TightVNC.The vulnerability is due to the application...

Jan 20, 2020
This indicates the detection of a CSV Injection vulnerability in WordPress plugin Flamingo.The vulnerability is due to insufficient...

Jan 20, 2020
This indicates an attack attempt to exploit a Denial of Service Vulnerability in ELOG Project ELOG.The vulnerability is due to...

Jan 16, 2020
This indicates an attack attempt to exploit an Input Validation Error Vulnerability in OpenEMR.The vulnerability is due to insufficient...

Jan 16, 2020
This indicates an attack attempt to exploit an Out of Bounds Write Vulnerability in Advantech WebAccess.The vulnerability is due...

Jan 15, 2020
This indicates an attempt to exploit a Use After Free vulnerability in Apple WebKit.The vulnerability is due to an error when...

Jan 15, 2020
This indicates an attempt to exploit a Use After Free vulnerability in Apple WebKit.The vulnerability is due to an error when...

Jan 15, 2020
This indicates an attack attempt to exploit a Use After Free Vulnerability in EmbedThis GoAhead.The vulnerability is due to insufficient...

Jan 15, 2020
This indicates an attack attempt to exploit an SQL Injection Vulnerability in Oracle E-Business Suite.The vulnerability is due...

Jan 15, 2020
This indicates an attack attempt to exploit a Command Injection vulnerability in Petwant or Petalk AI.The vulnerability is due...

Jan 15, 2020