Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

Spy/GhostKeyLogger is classified as Spyware.   Spyware are software components responsible for logging online activities. The...

Jul 25, 2005
HackerTool/Uploader.B is classified as a Hackertool.   Hacker Tools are pieces of software utilized for subverting...

Jul 25, 2005
Keylog/IK97 is classified as a Keylogger.   Keyloggers are applications that log keyboard and/or mouse input. The...

Jul 25, 2005
HackerTool/DreamPackPL is classified as a Hackertool.   Hacker Tools are pieces of software utilized for subverting...

Jul 25, 2005
HackerTool/IPScan is classified as a Hackertool.   Hacker Tools are pieces of software utilized for subverting host...

Jul 25, 2005
Adware/QDown is classified as Adware.   Adware are software components that display unsolicited advertisements. The...

Jul 25, 2005
Dial/212 is classified as a Dialer.   Dialers are programs that utilize a host's modem to secretly dial phone numbers. The...

Jul 25, 2005
Dial/Dykon.A is classified as a Dialer.   Dialers are programs that utilize a host's modem to secretly dial phone...

Jul 25, 2005
Adware/FWNToolbar is classified as Adware.   Adware are software components that display unsolicited advertisements. The...

Jul 25, 2005
It indicates a possible exploit of a Buffer Overflow vulnerability in the Name Server Daemon (pdnsd) for the AIX Source Code Browser....

Jul 22, 2005
It indicate a possible exploit of a Remote Command Execution vulnerability in Big Nose Bird. Big Nose Bird provides a script,...

Jul 22, 2005
This indicates an attempt to exploit denial of service and information disclosure vulnerabilities in Cisco VoIP Phone system.There...

Jul 22, 2005
It indicates a possible exploit of an LCD Display Modification bug in HP JetDirect printers. JHP JetDirect printers contain...

Jul 22, 2005
It indicates a possible exploit of a File Upload vulnerability in OReilly WebSite Pro 2.3.7 OReilly WebSite Pro 2.3.7 ships...

Jul 22, 2005
It indicates a possible exploit of a Denial of Service vulnerability in Coldfusion. Coldfusion Administrator will hang if...

Jul 22, 2005
This indicates a possible exploit of an Access vulnerability in Jakarta Tomcat. Jakarta Tomcat contains a vulnerability that could...

Jul 22, 2005
It indicate a possible exploit of an Information Disclosure vulnerability in Apache Tomcat. Apache Tomcat is suffers from...

Jul 22, 2005
It indicates a possible exploit of SQL Injection Vulnerability in iisProtect, a web interface for ISS server, that may allow...

Jul 22, 2005
This indicates a possible exploit of a format-string vulnerability in the logging function of ISC DHCPD daemon.ISC DHCPD Daemons...

Jul 22, 2005
It indicates a possible exploit of a unauthorized Command Execution vulnerability in Ikonboard. Ikondboard contains an error...

Jul 22, 2005