Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Information Disclosure vulnerability in Adobe Reader and Acrobat.The vulnerability...

May 10, 2016
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Denial of Service vulnerability in ISC DHCP.The vulnerability is due to an error...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Edge.The vulnerability is due to an...

May 10, 2016
This indicates an attack attempt against an Information Disclosure vulnerability in Microsoft Windows.The vulnerability is due...

May 10, 2016
This indicates an attack attempt against an Information Disclosure vulnerability in Microsoft Windows.The vulnerability is due...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Windows.The vulnerability is due to...

May 10, 2016
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Microsoft Internet Explorer.The vulnerability is...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

May 10, 2016
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Office.The vulnerability is due to...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Office.The vulnerability is due to...

May 10, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Office.The vulnerability is due to...

May 10, 2016