Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates that a system might be infected by CoreBot Botnet.CoreBot is a financial malware that specifically targets sensitive...

Sep 30, 2015
This indicates an attack attempt to exploit a vulnerability in Adobe Flash Player.This signature detects malicious obfuscated...

Sep 30, 2015
This indicates an attack attempt to exploit a Denial of Service vulnerability in FreeBSD.This issue is caused by an error in the...

Sep 30, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Hancom Office.The vulnerability is due to an...

Sep 30, 2015
This indicates an attack attempt against a Security Policy Bypass vulnerability in ManageEngine ServiceDesk.The vulnerability...

Sep 30, 2015
This indicates an attack attempt to exploit a Path Traversal vulnerability in Oracle Endeca Information Discovery Integrator ETL...

Sep 30, 2015
This indicates an attack attempt to exploit a Security Bypass vulnerability in Google Chrome.The vulnerability is due to an error...

Sep 29, 2015
This indicates that a system might be infected by Mikey Botnet

Sep 29, 2015
This indicates an attack attempt against a Cross Site Scripting vulnerability in Novell ZENworks Mobile Management.The vulnerability...

Sep 29, 2015
This indicates an attack attempt to exploit a Stack based Buffer Overflow vulnerability in the Reprise License Manager.The vulnerability...

Sep 29, 2015
This indicates that a system might be infected by Toopu Botnet

Sep 29, 2015
This indicates an attack attempt against a Buffer Overflow vulnerability in the Advantech WebAccess SCADA.The vulnerability, which...

Sep 24, 2015
This indicates detection of possible threats based on information obtained from CIG Circulars.

Sep 24, 2015
This indicates an attack attempt against a arbitrary file upload, and code execution vulnerability in Symantec Endpoint Protection.The...

Sep 24, 2015
This indicates an attack attempt to exploit an Integer Overflow vulnerability in VideoCharge Studio.The vulnerability is due to...

Sep 24, 2015
This indicates an attack attempt to exploit a Code Execution vulnerability in the Wordpress MailChimp Subscribe Form Plugin.The...

Sep 24, 2015
This indicates an attack attempt to exploit a system through Hunter Exploit Kit.Hunter Exploit Kit attempts to compromise a system...

Sep 22, 2015
This indicates that a system might be infected by Shifu Botnet

Sep 21, 2015
This indicates an attack attempt to exploit a Denial of Service vulnerability in ISC BIND.The vulnerability is due to an improper...

Sep 17, 2015
This indicates an attack attempt to exploit a Denial of Service vulnerability in ISC BIND.The vulnerability is due to an improper...

Sep 17, 2015