Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against a Security Bypass vulnerability in Oracle Java JRE.The vulnerability is due to a design...

Jul 23, 2013
MantisBT is a popular free web-based bug tracking system.This application is prone to multiple vulnerabilities:MantisBT before...

Jul 23, 2013
This indicates that the system might be infected with the Mazben botnet.

Jul 23, 2013
This indicates that a system might be infected by the Netbot botnet.

Jul 23, 2013
The Apache Struts web framework is a free open source solution for creating Java web applications.Apache Struts Showcase App 2.0.0...

Jul 23, 2013
Apache Tomcat is an open source web server and servlet container developed by the Apache Software Foundation. Apache Tomcat 7.0.x...

Jul 23, 2013
This indicates an attack attempt to exploit a Command Injection vulnerability in ZPanel.The vulnerability is due to flaw in a...

Jul 23, 2013
This indicates detection of a specific redirection message used to download malware and adware.

Jul 23, 2013
MantisBT is a popular free web-based bug tracking system.This application is prone to the following cross-site scripting vulnerabilities:CVE-2013-1932,...

Jul 23, 2013
This indicates an attack attempt against a Memory Corruption vulnerability in Apple QuickTime. The vulnerability is caused by...

Jul 18, 2013
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Apple QuickTime.The vulnerability is due to an...

Jul 18, 2013
Winamp is a media player for Windows-based PCs, written by Nullsoft.Winamp fails to properly check the length of an argument leading...

Jul 18, 2013
This indicates an attack attempt against a Stack Buffer Overflow vulnerability in HP Data Protector.The vulnerability is due to...

Jul 18, 2013
Joomla is a free and open source content management system (CMS) for publishing content.The application is prone to the following...

Jul 18, 2013
IBM WebSphere Application Server is an application aim to host enterprise Web applications. Cross-site scripting (XSS) vulnerability...

Jul 18, 2013
BIND is an implementation of the DNS protocol.The target host is not using the latest ISC BIND ESV version (9.6-ESV-R9-P1) which...

Jul 17, 2013
The implementation of TLS and SPDY protocols are vulnerable to CRIME attacks.The TLS protocol 1.2 and earlier can encrypt compressed...

Jul 17, 2013
This indicates an attack attempt to exploit a Directory Traversal vulnerability in Adobe ColdFusion server.The vulnerability is...

Jul 17, 2013
Java Runtime Environment (JRE) is a platform that supports the execution of programs that are developed using the Java programming...

Jul 17, 2013
BlogEngine.NET is an open source .NET blogging project.BlogEngine.NET is prone to an information-disclosure vulnerability because...

Jul 17, 2013