Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Flash Player.The vulnerability is due to...

Jul 14, 2015
This indicates an attack attempt to exploit an Type Confusion Memory Corruption vulnerability in Adobe Flash Player.The vulnerability...

Jul 14, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Flash Player.The vulnerability is due to...

Jul 14, 2015
This indicates an attack attempt to exploit an Use After Free vulnerability in Adobe Flash Player.The vulnerability is due to...

Jul 14, 2015
This indicates an attack attempt to exploit an Type Confusion Memory Corruption vulnerability in Adobe Flash Player.The vulnerability...

Jul 14, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Jul 14, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Microsoft Excel.The vulnerability is due...

Jul 14, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Excel.The vulnerability is due to an error...

Jul 14, 2015
This indicates an attack attempt to exploit a Use After Free vulnerability in Microsoft Excel.The vulnerability is due to an error...

Jul 14, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Excel.The vulnerability is due to an error...

Jul 14, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

Jul 14, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Internet Explorer.The vulnerability is...

Jul 14, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Jul 14, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Internet Explorer.The vulnerability is...

Jul 14, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Jul 14, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Internet Explorer.The vulnerability is...

Jul 14, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Jul 14, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Jul 14, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Jul 14, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Jul 14, 2015