Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 20, 2015
This indicates an attack attempt to exploit a Restrictions Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability...

May 20, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 20, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 20, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt against a Denial of Service vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 20, 2015
This indicates an attack attempt against a Cross-site request forgery (CSRF) vulnerability in Electric Sheep Fencing pfSense firewall.The...

May 20, 2015
This indicates detection of HTTP Chunk Transfer Encoding traffics that does not comply with RFC2616.This usually occurs with mobile...

May 20, 2015