Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates a detection of at least 200 failed POP3 logins in 10 seconds which indicate a possible POP3 logins brute force...

May 14, 2010
This indicates a detection of at least 60 failed Telnet logins in one minute which indicate a possible Telnet logins brute force...

May 14, 2010
This indicates an attack attempt against a cross-site scripting vulnerability in Adobe ColdFusion.The vulnerability exists in...

May 13, 2010
This indicates an attack attempt to exploit a memory-corruption vulnerability in Adobe Shockwave Player.The vulnerability is caused...

May 13, 2010
This indicates an attack attempt to exploit a memory-corruption vulnerability in Adobe Shockwave Player.The vulnerability is caused...

May 13, 2010
This indicates an attack attempt to exploit a memory-corruption vulnerability in Adobe Shockwave Player.The vulnerability is caused...

May 13, 2010
This indicates an attack attempt to exploit a memory-corruption vulnerability in Adobe Shockwave Player.The vulnerability is caused...

May 13, 2010
This indicates an attack attempt to exploit a memory-corruption vulnerability in Adobe Shockwave Player.The vulnerability is caused...

May 13, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Adobe Shockwave Player.The vulnerability is caused...

May 13, 2010
This indicates an attack attempt to exploit a memory-corruption vulnerability in Adobe Shockwave Player.The vulnerability is caused...

May 13, 2010
This indicates an attack attempt against a buffer-overflow vulnerability in Adobe Shockwave Player.The vulnerability is caused...

May 13, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Adobe Shockwave Player.The vulnerability is caused...

May 13, 2010
This indicates an attempt to exploit a buffer-overflow vulnerability in Microsoft Visio.The vulnerability is caused by an error...

May 13, 2010
This indicates a possible attack against an SQL-injection vulnerability in multiple products by Oracle.The vulnerability is caused...

May 13, 2010
This indicates an attack attempt to exploit a code-execution vulnerability in Sun Microsystems Directory Server.The vulnerability...

May 13, 2010
This indicates a possible attack against an integer-overflow vulnerability in Oracle Java SE and Java for Business 6 Update 18,...

May 13, 2010
This indicates an attack attempt to exploit a remote code-execution vulnerability in Adobe Shockwave Player.The vulnerability...

May 12, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Adobe Shockwave Player.The vulnerability is caused...

May 12, 2010
This indicates an attack attempt to exploit a remote code-execution vulnerability in Adobe Shockwave Player.The vulnerability...

May 12, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Adobe Shockwave Player. The vulnerability is caused...

May 12, 2010