Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Information Disclosure vulnerability in Adobe Reader and Acrobat.The vulnerability...

May 10, 2016