Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt against a Cross Site Request Forgery vulnerability in Adobe Acrobat Reader.The vulnerability...

Aug 25, 2015
This indicates an attack attempt to exploit an Integer Overflow vulnerability in Adobe Acrobat Reader.The vulnerability is due...

Aug 25, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

Aug 25, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Aug 25, 2015
This indicates an attack attempt to exploit a Denial-Of-Service vulnerability in Adobe Reader and Acrobat.The vulnerability is...

Aug 25, 2015
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Adobe Acrobat Reader.The vulnerability...

Aug 25, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Adobe Reader and Acrobat.The vulnerability is due...

Aug 25, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Apple QuickTime.The vulnerability is due to insufficient...

Aug 25, 2015
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in IBM Lotus Domino.The vulnerability is caused by...

Aug 25, 2015
This indicates detection of a Zero-Day vulnerability protected by a signature from Fortinet's FortiGuard Labs.This signature should...

Aug 25, 2015
This indicates an attack attempt to exploit a Replay Attack vulnerability in Oracle Java SE.The vulnerability is due to an error...

Aug 25, 2015
This indicates an attack attempt against a Denial of Service vulnerability in Apple OS X.The vulnerability is caused by an error...

Aug 19, 2015
This indicates an attack attempt to exploit a Heap based Buffer Overflow in multiple Foxit products.The vulnerability is due to...

Aug 19, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Aug 19, 2015
This indicates an attack attempt to exploit a system through an Exploit Kit.Nuclear Pack Exploit Kit attempts to compromise a...

Aug 19, 2015
This indicates an attack attempt against a Command Execution vulnerability in ASUS Router.The vulnerability is caused by an error...

Aug 18, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Aug 18, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Aug 18, 2015
This indicates an attack attempt against a remote Code Execution vulnerability in D-Link devices.The vulnerability is caused by...

Aug 18, 2015
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Heroes of Might and Magic III.The vulnerability...

Aug 18, 2015