Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against an Authentication Bypass vulnerability in MySQL.The vulnerability is due to the application...

Dec 20, 2012
This indicates an attack attempt to exploit a Format String vulnerability in VMware OVF Tools.The vulnerability is due to an error...

Dec 20, 2012
This indicates an attack attempt against a Code Execution vulnerability in Novell NetIQ Privileged User Manager.The vulnerability...

Dec 18, 2012
This indicates that the system might be infected with the B374K PHP Shell.

Dec 14, 2012
This indicates an attack attempt to exploit a Heap Overflow vulnerability in Adobe Flash Player.The vulnerability is due to an...

Dec 12, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Adobe Flash Player.The vulnerability is due to...

Dec 12, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Dec 12, 2012
This indicates an attack attempt against a Denial of Service vulnerability in Adobe Reader.The vulnerability is caused by an error...

Dec 12, 2012
This indicates an attack attempt against a Buffer Overflow vulnerability in Apple QuikeTime.The vulnerability is caused by an...

Dec 12, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Dec 12, 2012
This indicates an attack attempt against a Buffer Overflow vulnerability in Microsoft Office OneNote.The vulnerability is caused...

Dec 12, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Windows.The vulnerability is due to...

Dec 12, 2012
This indicates an attack attempt against a remote Code Execution vulnerability in ATMFD Adobe font driver included in Microsoft...

Dec 12, 2012
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Microsoft Office.The vulnerability is due...

Dec 12, 2012
This indicates an attack attempt against a remote Code Execution vulnerability in Narcissus.The vulnerability is due to insufficient...

Dec 12, 2012
This indicates an attack attempt to exploit an Arbitrary File Retrieval vulnerability in Novell File Reporter.The vulnerability...

Dec 12, 2012
This indicates an attack attempt against an Authentication Bypass vulnerability in Novell NetIQ Privileged User Manager.The vulnerability...

Dec 12, 2012
This indicates an attack attempt against a Cross-Site Scripting vulnerability in D-Link DSL-2640B Firmware.The vulnerability is...

Dec 11, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in D-Link DIR-605L routers.The vulnerability is due...

Dec 11, 2012
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Foxit Reader. The vulnerability is due to...

Dec 11, 2012