Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates a possible exploit of a known spoof of Washington Mutual Inc.'s URL because of phishing activity.Phishing is the...

Dec 21, 2006
This indicates detection of an HTTP web page with abnormally long content-encoding field.There are vulnerabilities in Microsoft...

Dec 21, 2006
Webmin and Usermin are prone to an unspecified information-disclosure vulnerability. This issue is due to a failure in the applications...

Dec 21, 2006
A directory traversal vulnerability in HAURI Anti-Virus products, including ViRobot Expert 4.0, Advanced Server, Linux Server...

Dec 19, 2006
Heap-based buffer overflow in the demo version of Bakbone Netvault, and possibly other versions, allows remote attackers to execute...

Dec 19, 2006
The SpamThru Trojan uses peer-to-peer technology to send commands to hijacked computers. It can control the victim system, and...

Dec 18, 2006
This indicates an attempt to exploit a command execute vulnerability in the OS X Terminal of Mac OS X. A remote attacker could...

Dec 17, 2006
Microsoft Internet Explorer has a Mouse Event Hijacking vulnerability. A remote attacker could perform unauthorized actions on...

Dec 17, 2006
This indicates a possible exploit of a memory manipulation vulnerability in Microsoft Word, that may allow user-assisted remote...

Dec 14, 2006
This indicates an attempt to exploit a buffer overflow vulnerability in Novell eDirectory.The vulnerability is caused by an error...

Dec 14, 2006
This indicates an attempt to exploit a buffer overflow vulnerability in Symantec Veritas NetBackup.The vulnerability is caused...

Dec 14, 2006
A remote code execution vulnerability exists in the way Internet Explorer interprets certain DHTML script function calls to incorrectly...

Dec 12, 2006
A remote code execution vulnerability exists in Internet Explorer due to attempt to access previously freed memory when handling...

Dec 12, 2006
This indicates an attack attempt against a heap-based buffer overflow in Microsoft Windows Media Player (WMP).The vulnerability...

Dec 12, 2006
Internet Explorer does not correctly handle ActiveX controls. Certain COM objects can be called by Internet Explorer and executed...

Dec 10, 2006
This indicates an attack attempt against a heap-based buffer-overflow vulnerability in Microsoft Windows Media Player (WMP).The...

Dec 07, 2006
This indicates an attempt to exploit a buffer overflow vulnerability in IBM Tivoli Storage Manager. The vulnerability is caused...

Dec 05, 2006
It indicates a possible exploit of a memory corruption vulnerability in Microsoft Word, that may allow remote attackers to execute...

Dec 05, 2006
This indicates an attempt to exploit a buffer overflow vulnerability in Citrix MetaFrame Presentation Server. The vulnerability...

Dec 04, 2006
This indicates an attempt to exploit a buffer overflow vulnerability in the Web Console of F-Secure Anti-Virus for Microsoft Exchange...

Dec 04, 2006