Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attempt to exploit a memory-corruption vulnerability in the Adobe PDF Reader JavaScript engine. By passing crafted...

Feb 09, 2011
This indicates an attack attempt against a memory-corruption vulnerability in Adobe Flash Player.The vulnerability is caused by...

Feb 09, 2011
This indicates an attack attempt against an integer-overflow vulnerability in Adobe Flash Player.The vulnerability is caused by...

Feb 09, 2011
This indicates an attack attempt against a memory-corruption vulnerability in Adobe Flash Player.The vulnerability is caused by...

Feb 09, 2011
This indicates an attack attempt against a memory-corruption vulnerability in Adobe Flash Player.The vulnerability is caused by...

Feb 09, 2011
This indicates an attack attempt to exploit a remote code-execution vulnerability in Adobe Illustrator.The vulnerability is caused...

Feb 09, 2011
This indicates an attack attempt against a memory-corruption vulnerability in Adobe products.

Feb 09, 2011
This indicates an attack attempt against an input-validation vulnerability in Adobe products.This vulnerability is due to the...

Feb 09, 2011
This indicates an attack attempt against a memory-corruption vulnerability in Adobe products.This vulnerability is due to the...

Feb 09, 2011
This indicates an attack attempt against an input-validation vulnerability in Adobe products.This vulnerability is due to the...

Feb 09, 2011
This indicates an attack attempt against a memory-corruption vulnerability in Adobe products.This vulnerability is due to the...

Feb 09, 2011
This indicates an attack attempt against an input-validation vulnerability in Adobe products.This vulnerability is due to the...

Feb 09, 2011
This indicates an attack attempt against an input-validation vulnerability in Adobe products.This vulnerability is due to the...

Feb 09, 2011
This indicates an attack attempt against an input-validation vulnerability in Adobe products.This vulnerability is due to the...

Feb 09, 2011
This indicates an attack attempt against a vulnerability in Adobe products.This vulnerability is caused by the vulnerable software's...

Feb 09, 2011
This indicates an attack attempt against a memory-corruption vulnerability in Adobe products.This vulnerability is due to the...

Feb 09, 2011
This indicates an attack attempt against a memory-corruption vulnerability in Adobe products.This vulnerability is due to the...

Feb 09, 2011
This indicates a possible attack against an authentication-bypass vulnerability in the SAP BusinessObjects product.Any one who...

Feb 09, 2011
This indicates an attack attempt against an integer-overflow vulnerability in Apple Mac OS X.The vulnerability is caused by an...

Feb 09, 2011
This indicates an attempt to exploit a certificate-spoofing vulnerability in Microsoft Windows. The vulnerability is caused by...

Feb 09, 2011