Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Adobe Reader and Acrobat.The vulnerability...

Jul 21, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Excel.The vulnerability is due to an error...

Jul 14, 2015
This indicates an attack attempt to exploit a Denial of Service vulnerability in PHP.The vulnerability is a result of the application's...

Jul 22, 2015
This indicates an attack attempt to exploit a Memory Corruption Vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit an Use After Free vulnerability in Adobe Acrobat Reader.The vulnerability is due to...

Jul 21, 2015
This indicates an attack attempt to exploit an Use After Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit a Security Bypass Vulnerability in Adobe Acrobat Reader.The vulnerability is due to...

Jul 21, 2015
This indicates an attack attempt to exploit an Use After Free vulnerability in Adobe Acrobat Reader.The vulnerability is due to...

Jul 21, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Jul 16, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Flash Player.The vulnerability is due to...

Jul 14, 2015
This indicates an attack attempt to exploit an Type Confusion Memory Corruption vulnerability in Adobe Flash Player.The vulnerability...

Jul 14, 2015
This indicates an attack attempt to exploit a Use After Free vulnerability in Microsoft Excel.The vulnerability is due to an error...

Jul 14, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit an Use After Free vulnerability in Adobe Acrobat Reader.The vulnerability is due to...

Jul 21, 2015
This indicates an attack attempt to exploit a Use After Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

Jul 21, 2015
This indicates an attack attempt to exploit an Use After Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

Jul 21, 2015