Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attempt to exploit a buffer overflow vulnerability in Apple QuickTime. This vulnerability is due to boundary...

Dec 27, 2007
This indicates a possible exploit of a buffer-overflow vulnerability in Cerulean Studios Trillian.This vulnerability is caused...

Dec 27, 2007
This indicates a possible attempt to exploit a buffer overflow vulnerability in Mozilla Firefox, Thunderbird and SeaMonkey. These...

Dec 27, 2007
This indicates an attempt to exploit a format-string vulnerability in Perdition IMAP server.The vulnerability is due to the software's...

Dec 27, 2007
This indicates an attempt to exploit a buffer overflow vulnerability in Persists Software's XUpload.There is a buffer overflow...

Dec 27, 2007
This indicates an attempt to exploit a buffer-overflow vulnerability in IBM Lotus Domino Web Access.This vulnerability is caused...

Dec 21, 2007
This indicates an attempt to exploit a header overflow vulnerability in Lighttpd before version 1.4.18.There is a header overflow...

Dec 21, 2007
This indicates an attempt to exploit a denial of service vulnerability in Trend Micro ServerProtect.A remote attacker can trigger...

Dec 21, 2007
This indicates an attempt to exploit a man-in-the-middle vulnerability in the Software Update in Apple Mac OS X 10.5.1.The Software...

Dec 20, 2007
This indicates an attempt to exploit a format string vulnerability in Berlios GPSD. The vulnerability is caused by the application's...

Dec 20, 2007
This indicates detection of network traffic that may be generated by the W32/Pushdo virus.W32/Pushdo is malicious program that...

Dec 20, 2007
This indicates an attempt to exploit a cross site scripting (XSS) vulnerability in Apache HTTP Server. The vulnerability is caused...

Dec 19, 2007
This indicates an attempt to exploit a buffer overflow vulnerability in IBM Lotus Notes.The vulnerability is due to a flaw in...

Dec 19, 2007
This indicates an attempt to exploit a memory corruption vulnerability in iMesh. The vulnerability is caused by an input validation...

Dec 19, 2007
This indicates an attempt to exploit one of several integer overflow vulnerabilities in libFLAC. LibFLAC is used by numerous media...

Dec 19, 2007
This indicates an attempt to exploit a boundry error vulnerability in Samba server.The vulnerability is caused by a boundary error...

Dec 19, 2007
This indicates an attempt to exploit a buffer overflow vulnerability in Apple QuickTime. The vulnerability is due to boundary...

Dec 18, 2007
This indicates an attempt to exploit a buffer-overflow vulnerability in Apple QuickTime.The vulnerability occurs when processing...

Dec 18, 2007
This indicates an attempt to exploit a heap based buffer overflow in Novell NetMail. The vulnerability is caused by failure to...

Dec 18, 2007
This indicates an attempt to exploit a PHP code injection vulnerability in TikiWiki.The vulnerability is caused by failure to...

Dec 18, 2007