Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a memory-corruption vulnerability in Apple Quicktime.The vulnerability is located...

Jun 29, 2010
This indicates a possible attack against buffer-overflow vulnerability in EvoCam HTTP server.The vulnerability is due to the vulnerable...

Jun 29, 2010
This indicates an attack attempt against a remote code-execution vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Jun 29, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Apple Webkit.The vulnerability is caused by an error...

Jun 29, 2010
This indicates a possible attack from a backdoor planted in Unreal which could allow any command to be executed with the privileges...

Jun 29, 2010
This indicates an attack attempt to exploit a denial-of-service vulnerability in GNU Mailman.The vulnerability is caused by an...

Jun 29, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Adobe Reader and Acrobat, which could lead to arbitrary...

Jun 28, 2010
This indicates an attack attempt against a remote code-execution vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Jun 28, 2010
This indicates an attack attempt against a remote code-execution vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Jun 28, 2010
This indicates an attack attempt against a memory-corruption vulnerability inAdobe Reader and Acrobat.The vulnerability is caused...

Jun 28, 2010
This indicates an attack attempt against a memory-corruption vulnerability inAdobe Reader and Acrobat.The vulnerability is caused...

Jun 28, 2010
This indicates an attack attempt against a memory-corruption vulnerability inAdobe Reader and Acrobat.The vulnerability is caused...

Jun 28, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Adobe Reader and Acrobat, which could lead to denial...

Jun 28, 2010
This indicates an attack attempt against a buffer-overflow vulnerability in ZipWrangler.The vulnerability is caused by an error...

Jun 24, 2010
This indicates an attack attempt against a buffer-overflow vulnerability in Archive Searcher.The vulnerability is caused by an...

Jun 24, 2010
This indicates an attack attempt against a Code Execution vulnerability in Apple Webkit. The vulnerability is caused by an...

Jun 24, 2010
This indicates an attack attempt against a buffer-overflow vulnerability in Novell ZENworks. The vulnerability is caused...

Jun 24, 2010
This indicates an attack attempt against a memory-corruption vulnerability in RealVNC VNC Server.The vulnerability is caused by...

Jun 24, 2010
This indicates an attack attempt against a format-string vulnerability in HP OpenView. The vulnerability is caused by an...

Jun 24, 2010
This indicates an attack attempt against a buffer-overflow vulnerability in Microsoft Office Visio.The vulnerability is caused...

Jun 24, 2010