Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attempt to exploit an integer-overflow vulnerability in Adobe Acrobat Reader.The vulnerability is caused by...

Jan 13, 2010
This indicates an attack attempt against a use-after-free vulnerability in an ActiveX control in America Online (AOL).The vulnerability...

Jan 12, 2010
This indicates an attack attempt to exploit a remote code execution vulnerability in Adobe Illustrator.The vulnerability is caused...

Jan 12, 2010
This indicates an attempt to exploit a denial of service vulnerability in Adobe Acrobat Reader.The vulnerability is caused by...

Jan 12, 2010
This indicates an attack attempt against a JavaScript execution vulnerabilityin Adobe software.The vulnerability is caused by...

Jan 12, 2010
This indicates an attempt to exploit a code-execution vulnerability in the Adobe get_atlcom Class.The vulnerability is located...

Jan 12, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Adobe Acrobat and Adobe Reader.The vulnerability...

Jan 12, 2010
This indicates an attack attempt to exploit a remote code-execution vulnerability in Apple Quicktime.The vulnerability is caused...

Jan 12, 2010
This indicates that the system might be infected by the Gumblar trojan.

Jan 12, 2010
This indicates an attack attempt against a stack overflow vulnerability in HP Application Recovery Manager. The vulnerability...

Jan 12, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Microsoft Internet Explorer.The vulnerability is...

Jan 12, 2010
This indicates an attack attempt against a denial-of-service vulnerability in MySQL database server.The vulnerability is caused...

Jan 12, 2010
This indicates an attempt to exploit a code-execution vulnerability in Symantec Altiris Products. The vulnerability is located...

Jan 12, 2010
This indicates an attack attempt against an integer-overflow vulnerability in Synergy.This issue is caused by an error when the...

Jan 12, 2010
This indicates a possible attack against a heap-based buffer-overflow vulnerability in Apple QuickTime.The vulnerability is due...

Jan 07, 2010
This indicates a possible attack against a vulnerability in Darwin/QuickTime Streaming Servers which may lead to arbitrary code...

Jan 07, 2010
This indicates an attack attempt against a memory-corruption vulnerability in Apple Mac OS X's Finder.The vulnerability is caused...

Jan 07, 2010
This indicates an attack attempt against a buffer overflow vulnerability in Hewlett-Packard OpenView Network Node Manager.The...

Jan 07, 2010
This indicates a possible attack against a stack-based buffer-overflow vulnerability in the client in IBM Tivoli Storage Manager...

Jan 07, 2010
This indicates a possible attempt to exploit a memory-corruption vulnerability in Novell eDirectory.The vulnerability is caused...

Jan 07, 2010