Threat Encyclopedia

Browse the Fortiguard Labs extensive encyclopedia of threats. Click any title to view more details of the threat. Can't find what you are looking for? Try using the search bar above to find a specific threat description.

This indicates an attack attempt to exploit an Out Of Bounds Read vulnerability in Adobe Acrobat and Reader.The vulnerability...

Oct 03, 2018
This indicates an attack attempt to exploit a Use After Free vulnerability in Adobe Acrobat and Reader.The vulnerability is due...

Oct 03, 2018
This indicates detection of an attempted data exfiltration using DET.DET (Data Exfiltration Toolkit) supports multiple protocols,...

Oct 03, 2018
This indicates an attack attempt to exploit an Out of Bounds Read Vulnerability in GNU Libextractor.The vulnerability is due to...

Oct 03, 2018
This indicates an attack attempt to perform an Arbitrary File Upload vulnerability in Joomla Facileforms Plugin.The vulnerability...

Oct 03, 2018
This indicates an attack attempt to perform an Arbitrary File Upload vulnerability in Joomla Jwallpapers Plugin.The vulnerability...

Oct 03, 2018
This indicates an attack attempt to perform an Arbitrary File Upload vulnerability in Joomla Rokdownloads Plugin.The vulnerability...

Oct 03, 2018
This indicates an attack attempt to exploit an Arbitrary File Upload vulnerability in Joomla Sexycontactform Plugin.The vulnerability...

Oct 03, 2018
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Jet DB Engine.The vulnerability is...

Oct 03, 2018
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in Red Hat 389 Directory Server.The vulnerability...

Oct 03, 2018
This indicates an attack attempt to exploit a Null Pointer Dereference Vulnerability in Samba.The vulnerability is due to an error...

Oct 03, 2018
This indicates an attack attempt to exploit a SQL Injection Vulnerability in Dolibarr.The vulnerability is a result of the application's...

Oct 02, 2018
This indicates an attack attempt to exploit a SQL Injection Vulnerability in Pimcore.The vulnerability is a result of the application's...

Oct 02, 2018