Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against a Memory Corruption vulnerability in Foxit Reader or PhantomPDF.The vulnerability is...

May 21, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

May 20, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in Adobe Flash Player.The vulnerability is due to an...

May 20, 2015
This indicates an attack attempt to exploit a Sandbox Bypass vulnerability in Adobe Flash Player.The vulnerability is due to the...

May 20, 2015
This indicates an attack attempt to exploit a Sandbox Bypass vulnerability in Adobe Flash Player.The vulnerability is due to an...

May 20, 2015
This indicates an attack attempt to exploit a Directory Traversal vulnerability in Adobe Flash Player.The vulnerability is due...

May 20, 2015
This indicates an attack attempt to exploit an Integer Overflow vulnerability in Adobe Flash Player.The vulnerability is due to...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

May 20, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in Adobe Flash Player.The vulnerability is due to an...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

May 20, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Adobe Flash Player.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Adobe Flash Player.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Sandbox Bypass vulnerability in Adobe Flash Player.The vulnerability is due to the...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015