Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit an Information Disclosure Vulnerability in Apache Solr.The vulnerability is due to...

Apr 20, 2018
This indicates an attack attempt to exploit a Denial of Service Vulnerability in Digium Asterisk.The vulnerability is due to an...

Apr 20, 2018
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in Pivotal Spring Framework.The vulnerability...

Apr 20, 2018
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Omron CX-Supervisor.The vulnerability is due to...

Apr 20, 2018
This indicates an attack attempt against a Cross-Site Scripting (XSS) vulnerability in HP System Management Homepage.The vulnerability...

Apr 19, 2018
This indicates an attack attempt to exploit a Denial of Service vulnerability in Cisco IOS with Smart Install Client feature enabled.The...

Apr 18, 2018
This indicates an attack attempt to exploit a Security Bypass vulnerability in Microsoft Internet Explorer.The vulnerability is...

Apr 18, 2018
This indicates an attack attempt to exploit a Security Bypass vulnerability in a Router or Gateway with UPnP services enabled.The...

Apr 18, 2018
This indicates an attack attempt to exploit a Directory Traversal Vulnerability in NetGain Systems Enterprise Manager.The vulnerability...

Apr 18, 2018
This indicates an attack attempt against a Remote Code Execution vulnerability in PHPUnit.The vulnerability, which is located...

Apr 18, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Apr 18, 2018
This indicates an attack attempt to exploit an Information Disclosure Vulnerability in Microsoft Outlook email client.The vulnerability...

Apr 13, 2018
This indicates an attempt to upload a malicious plugin in ProcessMaker.ProcessMaker is a workflow software solution, but it can...

Apr 12, 2018
This indicates an attack attempt to exploit an Memory Corruption vulnerability in Microsoft Windows.The vulnerability is due to...

Apr 11, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Apr 11, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Edge.The vulnerability is due to an...

Apr 11, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Edge and IE.The vulnerability is due...

Apr 11, 2018
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Microsoft Windows.The vulnerability is due...

Apr 11, 2018
This indicates an attack attempt to exploit a Heap Overflow vulnerability in Adobe Flash Player.The vulnerability is due to an...

Apr 11, 2018
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Microsoft Office.The vulnerability is due...

Apr 11, 2018