Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates that a system might be infected by Gnatspy.Gnatspy is an Android malware that steals information from users' phones.

Feb 23, 2018
This indicates an attack attempt to exploit an Information Disclsoure vulnerability in Oracle Hospitality Simphony.The vulnerability...

Feb 23, 2018
This indicates that a system might be infected by Ghost Team.Ghost Team is an Android malware that steals Facebook's information...

Feb 23, 2018
This indicates an attack attempt to exploit an Out of Bounds Write Vulnerability in Adobe Acrobat and Reader.The vulnerability...

Feb 21, 2018
This indicates an attack attempt to exploit a remote Code Execution vulnerability in HPE Intelligent Management Center.The vulnerability...

Feb 21, 2018
This indicates an attack attempt to exploit an Out of Bounds Read Vulnerability in Quagga.The vulnerability is due to an input...

Feb 21, 2018
This indicates an attack attempt to exploit a Integer Underflow Vulnerability in Mozilla Foundation Firefox ESR.The vulnerability...

Feb 20, 2018
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Adobe Acrobat and Reader.The vulnerability...

Feb 20, 2018
This indicates an attack attempt to exploit an Out of Bounds Write Vulnerability in Adobe Acrobat and Reader.The vulnerability...

Feb 20, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Feb 16, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Feb 16, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Feb 16, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Feb 16, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Feb 16, 2018
This indicates an attack attempt to exploit a Heap Overflow vulnerability in Adobe Acrobat and Reader.The vulnerability is due...

Feb 16, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Feb 16, 2018
This indicates an attack attempt to exploit an Out of Bound Read vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Feb 16, 2018
This indicates an attack attempt to exploit a Code Execution vulnerability in Adobe Acrobat and Reader.The vulnerability is due...

Feb 16, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Feb 16, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Feb 16, 2018