Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attempt to exploit of a buffer-overflow vulnerability in Oracle9i 9.2.0.1 database server.Oracle 9i has a service...

Dec 23, 2008
This indicates an attack attempt against a buffer-overflow vulnerability in Realtek Media Player. The vulnerability is caused...

Dec 23, 2008
This indicate a download attempt of Adware VUNDO.Adware VUNDO is a malware component that displays unsolicited advertisements.

Dec 23, 2008
This indicates a download attempt of a password stealing trojan.This password Stealing Trojan searches the infected system for...

Dec 23, 2008
This indicates an attempt to exploit a directory traversal vulnerability in the Rhino Software Serv-U FTP Server. The vulnerability...

Dec 18, 2008
This indicates an attack attempt against a memory corruption vulnerability in Microsoft WordPad Text Converter.The vulnerability...

Dec 15, 2008
This indicates an attack attempt against a code-execution vulnerability in Microsoft Word.The vulnerability is caused by an error...

Dec 15, 2008
This indicates an attack attempt to exploit a memory corruption vulnerability in Microsoft Common ActiveX control.The vulnerability...

Dec 12, 2008
This indicates an attempt to exploit a function pointer override vulnerability in Microsoft Excel products, which is due to insufficient...

Dec 12, 2008
This indicates a possible attempt to exploit a stack-overrun vulnerability in Microsoft Office Excel.This vulnerability is caused...

Dec 12, 2008
This indicates an attack attempt to exploit a remote code-execution vulnerability in Microsoft Office products.This vulnerability...

Dec 12, 2008
This indicates an attempt to exploit a buffer-overflow vulnerability inMicrosoft Windows GDI.The vulnerability is caused by an...

Dec 12, 2008
This indicates an attempt to exploit a buffer-overflow vulnerability in Microsoft Internet Explorer.The vulnerability is caused...

Dec 12, 2008
This indicates an attempt to exploit a buffer overflow vulnerability in Microsoft Internet Explorer.The vulnerability is caused...

Dec 12, 2008
This indicates an attack attempt to exploit a vulnerability in Microsoft Internet Explorer.The vulnerability is due to the way...

Dec 12, 2008
This indicates an attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer.The vulnerability is caused...

Dec 12, 2008
This indicates an attack attempt against a vulnerability in Microsoft Windows Explorer.The vulnerability is caused by an error...

Dec 12, 2008
This indicates an attempt to exploit a memory corruption vulnerability in Microsoft Visual Basic Runtime Extended Files.The vulnerability...

Dec 12, 2008
This indicates a possible attempt to exploit a memory corruption vulnerability in Microsoft Visual Basic Runtime Extended Files.The...

Dec 12, 2008
This indicates an attempt to exploit a memory corruption vulnerability in Microsoft Visual Basic Runtime Extended Files.The vulnerability...

Dec 12, 2008