Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 6851-6900 de 11067 encontradas.

Page 1 ... Page 134 | Page 135 | Page 136 | Page 137 | Page 138 | Page 139 | Page 140 | Page 141 | Page 142 ... Page 222

Name Nível da ameaça Descrição
Exploit.MS10-002 High Exploit.MS10-002 exploits IE vulnerability to allow remote code execution.It ...
Exploit.MSDirShowX High Exploit.MSDirShowX exploits vulnerabilities found in Microsoft DirectShow ...
Exploit.MSExcel High Exploit.MSExcel exploits Microsoft Excel's vulnerabilities to install and ...
Exploit.MSPpt High Exploit.MSPpt exploits a vulnerability found in Microsoft PowerPoint that ...
Exploit.MSWord High Exploit.MSWord is a crafted document file that exploits known vulnerability ...
Exploit.MSWord.MS06-027 High Exploit.MSWord.MS06-027 exploits a buffer overflow using Malformed Object ...
Exploit.PDF_Exploit High A maliciously crafted PDF file that could install or download malware when ...
Exploit.Pidief.AP High Exploit.Pidief.AP contains malicious code that allows remote execution of ...
Exploit.Pidief.BO High Exploit.Pidief.BO is a threat that exploits the Adobe PDF structure in hopes to ...
Exploit.Pidief.D High Exploit.Pidief.D exploits a vulnerability in the PDF file format that allows ...
Exploit.Pidief.G High Exploit.Pidief.G exploits vulnerabilities found in Adobe Flash Player and Adobe ...
Exploit.Pidief.QC High Exploit.Pidief.QC is a detection of the code that takes advantage of an ...
Exploit.RealPlayer Medium Exploit.RealPlayer exploits a vulnerability in an ActiveX browser helper object ...
Exploit.Script.Pdf High Exploit.Script.Pdf attempts to exploit the vulnerability found in PDF to ...
Exploit.SQLInject High Exploit.SQLInject exploits aa known vulnerability in order to take control of a ...
Exploit.SWF High Exploit.SWF makes use of vulnerabilities found in Adobe Shockwave Flash files ...
Exploit.SWF.Downloader.HN High Exploit.SWF.Downloader.HN exploits a vulnerability found in Adobe Shockwave ...
Exploit.TaroDrop Medium Trojan.Tarodrop is a Trojan horse that drops other malware on the compromised ...
Exploit.WebViewFolderIcon High Exploit.WebViewFolderIcon exploits an integer overflow vulnerability in ...
Exploit.Windows_ZoneMap_Protocol_Defaults Low A threat exists which can set all the Restricted Zone Map Sites to be Trusted ...
Exploit.Winrar High Exploit.Winrar exploits a buffer overflow vulnerability found in Winrar version ...
Exploit.WMEncoder Medium Exploit.WMEncoder exploits the vulnerability existing in the WMEX.DLL ActiveX ...
Exploit.WMF High Exploit.WMF exploits the Windows Meta File (WMF) vulnerability to download ...
Exploit.Wordjmp High Exploit.Wordjmp exploits the vulnerability CVE-2006-2492 found in Microsoft ...
Exploit.XMLid Medium XMLid.Exploit is an exploit that can run executable files on the local file ...
Flooder.Skypflood Medium Flooder.Skypflood is an application that allows user to send much messages and ...
Hacktool.ACE_Password_Sniffer Medium ACE Password Sniffer monitors the network and captures passwords through FTP, ...
HackTool.AntiCNN Low HackTool.AntiCNN send multiple http packets to cnn.com in an attempted attack ...
HackTool.ARPSpoofer.A High Hacktool.ARPSpoofer.A when installed on an infected computer will perform ...
Hacktool.BackWeb_Lite Medium BackWeb is a generic, background downloading tool that software vendors can ...
HackTool.BitCoinMiner Low HackTool.BitCoinMiner is a malicious application that could be used by ...
HackTool.CGM Low HackTool.CGM may be used to crack capcha images. If this file was not installed ...
HackTool.CloneDVD Low HackTool.CloneDVD is an applicationi that generates a serial licence for the ...
HackTool.CrackDownloader Low HackTool.CrackDownloader is a hacktool that searches for cracks/serials over ...
HackTool.CrackPDF Low HackTool.CrackPDF is program that used to remove the security on PDF d ...
HackTool.CrackSecureCRT Low Hacktool.CrackSecureCRT is a Hack program to create license key for the ...
HackTool.CrackWonderPhoto Low HackTool.CrackWonderPhoto is a hacktool that cracks the program Wondershare ...
HackTool.Daniel High This is a hacking tool that is capable of performing Denial of Service to a ...
HackTool.DarkstRat Medium HackTool.DarkstRat is a malicious application that could be used by attackers ...
HackTool.Dos.Smurfic Medium Dos.Smurfic is a remote administration tool that allows users to manage and ...
HackTool.EvID Low Hacktool.EvID is potentially unwanted tool which allows user to change TCP IP ...
Hacktool.FireDaemon Medium Hacktool.FireDaemon is a potentially unwanted application that is frequently ...
HackTool.Flooder High Hacktool Flooder is a program used by hackers to create trojans for spamming ...
HackTool.GameTools Low HackTool.GameTools are applications that are used by users to employ cheats, ...
HackTool.Hackdos Medium HackTool.Hackdos is a remote administration tool that allows users to manage ...
Hacktool.HIDD High Hacktool.HIDD is a Rootkit program used by hackers to drop hidden Trojan that ...
HackTool.HideWindows Low HideWindows is a potentially unwanted application which can be used for ...
HackTool.Hupigon Low Hacktool.Hupigon is a tool used by malware writers to generate new variants of ...
HackTool.IDMPatcher Low HackTool.IDMPatcher is a hacking software that patches Internet Download ...
Hacktool.Ipcscan.C High Hacktool.Ipcscan.C is a hacktool for the windows platform which allows ...

Page 1 ... Page 134 | Page 135 | Page 136 | Page 137 | Page 138 | Page 139 | Page 140 | Page 141 | Page 142 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware