Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Remote File Inclusion vulnerability in Wordpress Spicy Blogroll Plugin.The vulnerability...

Aug 21, 2013
This indicates an attack attempt to exploit a Denial of Service vulnerability in Apache HTTP Server.The vulnerability is due to...

Aug 20, 2013
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Oracle Java.The vulnerability is due to an improper...

Aug 20, 2013
This indicates an attack attempt to exploit a remote Code Execution Vulnerability in PineApp Mail-SeCure Server.The vulnerability...

Aug 20, 2013
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in XnSoft XnView.The vulnerability is due to an error...

Aug 20, 2013
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 15, 2013
This indicates an attack attempt to exploit a Denial of Service vulnerability in Windows.The vulnerability is due to an error...

Aug 15, 2013
This indicates that a system might be infected by the Metus botnet.

Aug 15, 2013
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Artweaver.The vulnerability is due to an error...

Aug 14, 2013
This indicates an attack attempt to exploit a remote Code Execution vulnerability in D-Link Multiple Router UPnP SOAP Inerface.The...

Aug 14, 2013
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in ERS Viewer 2013.The vulnerability is due to an...

Aug 14, 2013
This indicates an attack attempt to exploit an Insecure Library Loading vulnerability in Foxit Reader. The vulnerability is due...

Aug 14, 2013
This indicates an attack attempt to exploit a Command Injection vulnerability in Red Hat OpenStack/Satellite.The vulnerability...

Aug 14, 2013
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 14, 2013
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 14, 2013
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 14, 2013
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 14, 2013
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 14, 2013
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 14, 2013
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 14, 2013