E - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 51-96 of 96 for "E" found.

Page 1 | Page 2

Name Nível da ameaça Descrição
Exploit.DirectAnimation High Exploit.DirectAnimation exploits a buffer overflow vulnerability in Microsoft ...
Exploit.Flash.G High Exploit.Flash.G attempts to exploit a vulnerability found in Adobe Flash Player ...
Exploit.FlashPix High A vulnerability in DirectX Media SDK, which can be exploited by malicious ...
Exploit.FTPD High Exploit.FTPD attempts to exploit remote machines using a multitude of embedded ...
Exploit.Gumblar High Exploit.Gumblar injects malicious code into websites and attempt to infect user ...
Exploit.Host_file_location_redirect Medium A threat has changed the default host file location on your computer and may ...
Exploit.HTML.ASCII High Exploit.HTML.ASCII is an exploit that uses instructions based on HTML data ...
Exploit.IframeBof High Exploit.IframeBof exploits a known vulnerability in order to gain control of a ...
Exploit.IMG-WMF High Exploit.IMG-WMF is a malformed image file that exploits a stack buffer overflow ...
Exploit.Internet_Explorer_Security_Settings Info Internet Explorers security settings are set dangerously low. Low settings may ...
Exploit.Java.ByteVerify High Exploit.Java.ByteVerify contains malicious code which exploits vulnerability in ...
Exploit.Java.GEN High Exploit.Java.GEN attempts to exploit a vulnerability found in Java to perform ...
Exploit.Java.OpenStream High Exploit.Java.OpenStream attempts to exploit a vulnerability found in Java to ...
Exploit.JetDB4 High Explot.JetDB4 is a malicious Microsoft Access Database (.MDB) file that ...
Exploit.JS.Agent High Exploit.JS.Agent contains encrypted Java Script codes that uses a vulnerability ...
Exploit.KaHT_II High KaHT II is a RPC DCOM exploit. It allows an intruder to locate a vulnerable ...
Exploit.LHA High Exploit.LHA is an exploit that will try to use the vulnerbilities in older ...
Exploit.Microsoft.hta High A HTA file that usually runs on Windows startup and creates executables on the ...
Exploit.Mpack High Mpack is an exploit that try to infect web servers and then use the man in the ...
Exploit.MS07-055 Elevated Exploit.MS07-055 exploits vulnerability in Kodak Image Viewer to allow an ...
Exploit.MS08-67 High Exploit.MS08-67 attempts to connect to another computer to exploit ...
Exploit.MS10-002 High Exploit.MS10-002 exploits IE vulnerability to allow remote code execution.It ...
Exploit.MSDirShowX High Exploit.MSDirShowX exploits vulnerabilities found in Microsoft DirectShow ...
Exploit.MSExcel High Exploit.MSExcel exploits Microsoft Excel's vulnerabilities to install and ...
Exploit.MSPpt High Exploit.MSPpt exploits a vulnerability found in Microsoft PowerPoint that ...
Exploit.MSWord High Exploit.MSWord is a crafted document file that exploits known vulnerability ...
Exploit.MSWord.MS06-027 High Exploit.MSWord.MS06-027 exploits a buffer overflow using Malformed Object ...
Exploit.PDF_Exploit High A maliciously crafted PDF file that could install or download malware when ...
Exploit.Pidief.AP High Exploit.Pidief.AP contains malicious code that allows remote execution of ...
Exploit.Pidief.BO High Exploit.Pidief.BO is a threat that exploits the Adobe PDF structure in hopes to ...
Exploit.Pidief.D High Exploit.Pidief.D exploits a vulnerability in the PDF file format that allows ...
Exploit.Pidief.G High Exploit.Pidief.G exploits vulnerabilities found in Adobe Flash Player and Adobe ...
Exploit.Pidief.QC High Exploit.Pidief.QC is a detection of the code that takes advantage of an ...
Exploit.RealPlayer Medium Exploit.RealPlayer exploits a vulnerability in an ActiveX browser helper object ...
Exploit.Script.Pdf High Exploit.Script.Pdf attempts to exploit the vulnerability found in PDF to ...
Exploit.SQLInject High Exploit.SQLInject exploits aa known vulnerability in order to take control of a ...
Exploit.SWF High Exploit.SWF makes use of vulnerabilities found in Adobe Shockwave Flash files ...
Exploit.SWF.Downloader.HN High Exploit.SWF.Downloader.HN exploits a vulnerability found in Adobe Shockwave ...
Exploit.TaroDrop Medium Trojan.Tarodrop is a Trojan horse that drops other malware on the compromised ...
Exploit.WebViewFolderIcon High Exploit.WebViewFolderIcon exploits an integer overflow vulnerability in ...
Exploit.Windows_ZoneMap_Protocol_Defaults Low A threat exists which can set all the Restricted Zone Map Sites to be Trusted ...
Exploit.Winrar High Exploit.Winrar exploits a buffer overflow vulnerability found in Winrar version ...
Exploit.WMEncoder Medium Exploit.WMEncoder exploits the vulnerability existing in the WMEX.DLL ActiveX ...
Exploit.WMF High Exploit.WMF exploits the Windows Meta File (WMF) vulnerability to download ...
Exploit.Wordjmp High Exploit.Wordjmp exploits the vulnerability CVE-2006-2492 found in Microsoft ...
Exploit.XMLid Medium XMLid.Exploit is an exploit that can run executable files on the local file ...

Page 1 | Page 2

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware