Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Denial of Service vulnerability in ISC BIND.The vulnerability is due to an error...

Jan 29, 2016
This indicates an attack attempt against a Memory Corruption vulnerability in Audacity.The vulnerability is caused by an error...

Jan 29, 2016
This indicates detection of a Zero-Day vulnerability protected by a signature from Fortinet's FortiGuard Labs.This signature should...

Jan 29, 2016
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Kaspersky Anti-Virus.The vulnerability is due to...

Jan 29, 2016
This indicates an attack attempt to exploit a Directory Traversal and Arbitrary Command Execution Vulnerability in Ruby on Rails.The...

Jan 29, 2016
This indicates an attack attempt to exploit a Privilege Escalation vulnerability in Linux Kernel.The vulnerability is due to an...

Jan 28, 2016
This indicates an attack attempt against an Information Disclosure vulnerability in OpenSSH Client.The vulnerability is caused...

Jan 27, 2016
This indicates that a system might be infected by XorDDOS Botnet.XorDDOS is a trojan that performs DDOS attacks on a specified...

Jan 27, 2016
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Easy File Management Web Server.The vulnerability...

Jan 27, 2016
This indicates detection of an Arbitrary File Access vulnerability in Samsung SRN-1670D camera web viewer services.The vulnerability...

Jan 26, 2016
This indicates an attack attempt to exploit an Integer Overflow vulnerability in Apache Subversion.The vulnerability is due to...

Jan 26, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Jan 25, 2016
This indicates that a system might be infected by TrochilusRAT Botnet.

Jan 25, 2016
This indicates an attack attempt to exploit a Denial of Service vulnerability in ISC BIND.The vulnerability is due to an assertion...

Jan 22, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Jan 22, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Jan 22, 2016
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Autodesk Design Review.The vulnerability is due...

Jan 22, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Jan 22, 2016
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Jan 22, 2016
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

Jan 22, 2016