Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Use After Free vulnerability in Adobe Acrobat Reader.The vulnerability is due to...

Feb 22, 2019
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Feb 22, 2019
This indicates an attack attempt against a Cross-Site Scripting vulnerability in BACNet devices.The vulnerability is due to insufficient...

Feb 22, 2019
This indicates an attack attempt to exploit a Denial Of Service Vulnerability in Google Chrome.The vulnerability is due to an...

Feb 22, 2019
This indicates an attack attempt to exploit a Security Bypass vulnerability in the InduSoft Web Studio and InTouch Edge HMI.The...

Feb 22, 2019
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in LibreOffice.A remote attacker can exploit...

Feb 22, 2019
This indicates an attack attempt againts a Buffer Overflow vulnerability in Microsoft Windows DHCP Server.A remote attacker can...

Feb 22, 2019
This indicates an attack attempt to exploit an Out of Bounds Read vulnerability in Adobe Acrobat and Reader.The vulnerability...

Feb 21, 2019
This indicates an attack attempt against a Code Execution vulnerability in ZTE ZXV10 Routers.The vulnerability is due to insufficient...

Feb 21, 2019
This indicates an attack attempt to exploit a Code Injection vulnerability in JBoss RichFaces.The vulnerability is due to insufficient...

Feb 21, 2019
This indicates an attack attempt to exploit a Memory Corruption vulnerability in VLC Media Player.The vulnerability is due to...

Feb 21, 2019
This indicates an attack attempt against a Cross-Site Request-Forgery vulnerability in WordPress MapSVG Lite.The vulnerability...

Feb 21, 2019
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Apple iOS WebKit.The vulnerability is due to...

Feb 20, 2019
This indicates an attack attempt to exploit a Command Injection vulnerability in Drobo 5N2 devices.The vulnerability is due to...

Feb 20, 2019
This indicates detection of maliciously obfuscated VBScript codes embedded in web pages which can exploit critical vulnerabilities...

Feb 20, 2019
This indicates an attack attempt to exploit a Denial Of Service Vulnerability in Mosca MQTT.The vulnerability is due to an error...

Feb 20, 2019
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Mozilla Firefox.The vulnerability is due...

Feb 20, 2019
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Rockwell Automation RSLinx Classic.The vulnerability...

Feb 20, 2019
This indicates detection of an attempted scan from WPScan WordPress Vulnerability Scanner.WPScan is an open-source WordPress vulnerability...

Feb 20, 2019
This indicates an attack attempt against a Local File Inclusion vulnerability in phpMyAdmin.A remote, authenticated attacker could...

Feb 20, 2019