Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit a vulnerability in Adobe Flash Player.This signature detects malicious obfuscated...

Jul 17, 2015
This indicates detection of a Zero-Day vulnerability protected by a signature from Fortinet's FortiGuard Labs.This signature should...

Jul 07, 2015
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in cURL/libcurl.The vulnerability is caused by an...

Jul 07, 2015
This indicates an attack attempt against a Cross-Site Scripting vulnerability in WordPress.The vulnerability is due to insufficient...

Jul 02, 2015
This indicates an attack attempt to exploit a Remote Command Injection vulnerability in EMC AutoStart.The vulnerability is due...

Jul 22, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit a Use After Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit an Use After Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt against a Directory Traversal vulnerability in Bonita BPM.The vulnerability is due to insufficient...

Jul 21, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Google Chrome.The vulnerability is due to an...

Jul 17, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Jul 16, 2015
This indicates an attack attempt to exploit an Type Confusion Memory Corruption vulnerability in Adobe Flash Player.The vulnerability...

Jul 14, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Jul 10, 2015
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in IBM Lotus Domino.The vulnerability is due to insufficient...

Jul 10, 2015
This indicates an attack attempt to exploit a Security Policy Bypass vulnerability in Digium Asterisk.The vulnerability is due...

Jul 07, 2015
This indicates detection of an Insecure Remote Access to a Java Management Extensions (JMX) interface.A JMX interface without...

Jul 07, 2015
This indicates an attack attempt against an Arbitrary File Upload vulnerability in WordPress Showbiz Pro Responsive Teaser PluginPlugin...

Jul 07, 2015
This indicates an attack attempt against a Remote Code Injection vulnerability in Accellion File Transfer.The vulnerability is...

Jul 28, 2015
This indicates an attack attempt to exploit a Stack based Buffer Overflow vulnerability in PHP.The vulnerability is due to an...

Jul 28, 2015