Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 16, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 16, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 16, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 16, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 16, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 16, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 16, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 16, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 16, 2015
This indicates an attack attempt against a Code Execution vulnerability in Apache Commons Collections library.The vulnerability...

Nov 16, 2015
This indicates a possible attack against an Elevation of Privileges vulnerability in Microsoft .NET framework.The vulnerability...

Nov 13, 2015
This indicates an attack attempt to exploit a Cross-Site Scripting vulnerability in WordPress WooCommerce Plugin, which is discovered...

Nov 13, 2015
This indicates a potential buffer overflow in a FTP server.File Transfer Protocol (FTP) is a way of transferring files over the...

Nov 12, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Internet Explorer.The vulnerability...

Nov 12, 2015
This indicates an attack attempt to exploit an Information Spoofing vulnerability in in Microsoft Outlook.The vulnerability is...

Nov 12, 2015
This indicates an attack attempt to exploit an SQL injection vulnerability in ManageEngine Applications Manager.The vulnerability...

Nov 12, 2015
This indicates an attack attempt against a Remote Code Execution vulnerability in Samsung SmartViewer.The vulnerability, which...

Nov 12, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 10, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 10, 2015
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.The vulnerability is due to...

Nov 10, 2015