Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Popups vulnerability in Microsoft Internet Explorer.The vulnerability is located...

Oct 21, 2011
This indicates an attack attempt against a Cross Site Scripting vulnerability in Microsoft Internet Explorer.The vulnerability...

Oct 21, 2011
This indicates an attack attempt against a Memory Corruption vulnerability in Microsoft Internet Explorer.The memory corruption...

Oct 21, 2011
This indicates a possible attempt to exploit a Denial of Service vulnerability in Microsoft Internet Explorer.The vulnerability...

Oct 21, 2011
This indicates an attempt to exploit a Buffer Overflow vulnerability in Microsoft Internet Explorer.The vulnerability is caused...

Oct 21, 2011
This indicates detection of an attempt to exploit a Denial of Service vulnerability in Microsoft Internet Explorer 6 on Windows...

Oct 21, 2011
This indicates an attempt to exploit one of several integer overflow vulnerabilities in Microsoft XML Core Services (MSXML) and...

Oct 21, 2011
This indicates an attack attempt against a remote Code Execution vulnerability in Microsoft Office.The vulnerability may allow...

Oct 21, 2011
This indicates detection of an attempt to exploit a heap base vulnerability in Microsoft Outlook Express versions 5.5 and 6. The...

Oct 21, 2011
This indicates a possible attempt to exploit an unspecified vulnerability in Microsoft Outlook.The vulnerability is due to a design...

Oct 21, 2011
This indicates a possible attempt to exploit a Memory Corruption vulnerability in Microsoft PowerPoint.The vulnerability is a...

Oct 21, 2011
This indicates an attempt to exploit a vulnerability in Windows and Mac versions of PowerPoint.The vulnerability may allow user...

Oct 21, 2011
This indicates an attempt to exploit a remote Code Execution vulnerability in Microsoft PowerPoint. The vulnerability can be exploited...

Oct 21, 2011
This indicates an attempt to exploit a remote Code Execution vulnerability in Microsoft PowerPoint. The vulnerability can be exploited...

Oct 21, 2011
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Publisher.The vulnerability is caused...

Oct 21, 2011
This indicates a possible attempt to exploit a remote Code Execution vulnerability in Microsoft Data Access Components (MDAC).The...

Oct 21, 2011
This indicates an attempt to exploit a remote Code Execution vulnerability in a component of Microsoft Speech API 4. The vulnerability...

Oct 21, 2011
This indicates an attack attempt to exploit an Information Disclosure vulnerability in multiple vendor's Telnet clients.The vulnerability...

Oct 21, 2011
This indicates an attempt to exploit a Memory Corruption vulnerability in Microsoft Visual Basic Runtime Extended Files.The vulnerability...

Oct 21, 2011
This indicates a possible attempt to exploit a Memory Corruption vulnerability in Microsoft Visual Basic Runtime Extended Files.The...

Oct 21, 2011