Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates detection of a Zero-Day vulnerability protected by a signature from Fortinet's FortiGuard Labs. This signature...

Feb 12, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Feb 12, 2015
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Microsoft Internet Explorer.The vulnerability...

Feb 12, 2015
This indicates an attack attempt to exploit a remote Code Execution vulnerability in PHP.The vulnerability is due to a use after...

Feb 12, 2015
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Schneider Electric ProClima.The vulnerability...

Feb 12, 2015
This indicates an attack attempt to exploit an Integer Overflow vulnerability in Trihedral VTScada.The vulnerability is due to...

Feb 12, 2015
This indicates an attack attempt against an arbitrary File Upload vulnerability in WP Symposium Plugin for WordPress.The vulnerability...

Feb 12, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Feb 10, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Feb 10, 2015
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Adobe Flash Player.The vulnerability is due...

Feb 10, 2015
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Adobe Flash Player.The vulnerability is due...

Feb 10, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Feb 10, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Feb 10, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Feb 10, 2015
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Adobe Flash Player.The vulnerability is due...

Feb 10, 2015
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Adobe Flash Player.The vulnerability is due...

Feb 10, 2015
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Adobe Flash Player.The vulnerability is due...

Feb 10, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Feb 10, 2015
This indicates an attack attempt to exploit a Use After Free vulnerability in Adobe Flash Player.The vulnerability is due to an...

Feb 10, 2015
This indicates an attack attempt to exploit a Heap Overflow vulnerability in Adobe Flash Player.The vulnerability is due to an...

Feb 10, 2015