Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Novell iPrint Client.The vulnerability, which is...

Aug 28, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Oracle Outside In Technology.The vulnerability...

Aug 28, 2012
This indicates an attack attempt against a remote Command Execution vulnerability in Symantec Web Gateway.The vulnerability is...

Aug 28, 2012
This indicates an attack attempt against a Command Execution vulnerability in Zenoss.The vulnerability is caused by an error when...

Aug 28, 2012
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Adobe Flash Player.The vulnerability is due...

Aug 17, 2012
This indicates an attempt to exploit a Code Execution vulnerability in Adobe Shockwave Player.This vulnerability is due to an...

Aug 17, 2012
This indicates an attack attempt to exploit a Format String vulnerability in Microsoft Printer Spooler services.The vulnerability...

Aug 17, 2012
This indicates an attack attempt against a remote Command Execution vulnerability in AWStats Totals.The vulnerability is due to...

Aug 15, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Aug 15, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Aug 15, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Aug 15, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Aug 15, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Aug 15, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Aug 15, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Aug 15, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Adobe Acrobat and Reader.The vulnerability is caused...

Aug 15, 2012
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.The vulnerability is...

Aug 15, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Apple QuickTime Plugin.The vulnerability, which...

Aug 15, 2012
This indicates a potential XML External Entity attack.XXE (XML eXternal Entity) attack is a form of attack where applications...

Aug 15, 2012
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in HP StorageWorks.The vulnerability is due to insufficient...

Aug 15, 2012