Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Use After Free vulnerability in Microsoft Internet Explorer and Edge.The vulnerability...

Aug 09, 2016
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 09, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 09, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Office.The vulnerability is due to...

Aug 09, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Office.The vulnerability is due to...

Aug 09, 2016
This indicates an attack attempt to exploit a Memory Corruption Vulnerability in Microsoft Office.The vulnerability is due to...

Aug 09, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Office.The vulnerability is due to...

Aug 09, 2016
This indicates an attack attempt to exploit a Privilege Escalation vulnerability in Microsoft Windows.The vulnerability is due...

Aug 09, 2016
This indicates an attack attempt to exploit a Stack Buffer Overflow in Foxit Reader.The vulnerability is due to improper handling...

Aug 05, 2016
This indicates an attack attempt against a Heap Buffer Overflow vulnerability in WECON LeviStudio.The vulnerability is due to...

Aug 04, 2016
This indicates an attack attempt to exploit a Denial of Service vulnerability in Apache Struts.The vulnerability is due to insufficient...

Aug 03, 2016
This indicates that a system might be infected by Bayrob Botnet.Bayrob is a trojan.

Aug 03, 2016
This indicates that a system might be infected by DroidJack Botnet.DroidJack is a remote administrative tool for Android.

Aug 03, 2016
This indicates an attempt to exploit a Malicious Redirection vulnerability in Multiple web servers.The vulnerability is due to...

Aug 03, 2016
This indicates an attack attempt to exploit a SQL Injection vulnerability in Joomla Huge-IT Image Gallery Extension.The vulnerability...

Aug 03, 2016
This indicates an attack attempt against a Cross Site Scripting vulnerability in Joomla Huge-IT Image Gallery Extension.The vulnerability...

Aug 03, 2016
This indicates detection of a Security Bypass vulnerability in Netcore/Netis Devices.The vulnerability is due to a single hard-coded...

Aug 03, 2016
This indicates an attack attempt against a Stack Buffer Overflow vulnerability in WECON LeviStudio.The vulnerability is due to...

Aug 03, 2016