Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against an integer-overflow vulnerability in Adobe products.The vulnerability is caused by an...

Oct 14, 2010
This indicates an attack attempt against an integer-overflow vulnerability inMicrosoft Windows(T2EMBED.DLL).The vulnerability...

Oct 13, 2010
This indicates a possible attack against a file-parsing error in Microsoft Excel.The vulnerability is caused by improper sanitizing...

Oct 13, 2010
This indicates a possible attack against a pointer-malfunction vulnerability in Microsoft Excel.The vulnerability is caused by...

Oct 13, 2010
This indicates a possible attack against a remote code-execution vulnerability in Microsoft Excel.The vulnerability could be triggered...

Oct 13, 2010
This indicates a possible attack against an integer-overflow vulnerability in Microsoft Excel.The vulnerability is caused by improper...

Oct 13, 2010
This indicates an attack attempt against an information-disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

Oct 13, 2010
This indicates an attack attempt against an information-disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

Oct 13, 2010
This indicates an attack attempt against an information-disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

Oct 13, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Microsoft Internet Explorer.The vulnerability is...

Oct 13, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Microsoft Internet Explorer.The vulnerability is...

Oct 13, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Microsoft Internet Explorer.The vulnerability is...

Oct 13, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Microsoft Internet Explorer.The vulnerability is...

Oct 13, 2010
This indicates an attack attempt against an information-disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

Oct 13, 2010
This indicates an attack attempt against a memory-corruption vulnerability inMicrosoft Media.Player.It allows a remote attacker...

Oct 13, 2010
This indicates a possible attack against a vulnerability in the MS OpenType Font format driver.The vulnerability is caused by...

Oct 13, 2010
This indicates a possible attack against a vulnerability in the MS OpenType Font format driver.The vulnerability is caused by...

Oct 13, 2010
This indicates an attack attempt against a memory-corruption vulnerability inWindows Media Player.The vulnerability is cause by...

Oct 13, 2010
This indicates a possible attack against a vulnerability in Microsoft Word.The vulnerability is caused by the software's inability...

Oct 13, 2010
This indicates an attack attempt to exploit a memory-corruption vulnerability in Apple Safari Webkit.The vulnerability is caused...

Oct 12, 2010