Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 6851-6900 of 11067 found.

Page 1 ... Page 134 | Page 135 | Page 136 | Page 137 | Page 138 | Page 139 | Page 140 | Page 141 | Page 142 ... Page 222

Name Threat Level Description
Exploit.MS10-002 High Exploit.MS10-002 exploits IE vulnerability to allow remote code execution.It ...
Exploit.MSDirShowX High Exploit.MSDirShowX exploits vulnerabilities found in Microsoft DirectShow ...
Exploit.MSExcel High Exploit.MSExcel exploits Microsoft Excel's vulnerabilities to install and ...
Exploit.MSPpt High Exploit.MSPpt exploits a vulnerability found in Microsoft PowerPoint that ...
Exploit.MSWord High Exploit.MSWord is a crafted document file that exploits known vulnerability ...
Exploit.MSWord.MS06-027 High Exploit.MSWord.MS06-027 exploits a buffer overflow using Malformed Object ...
Exploit.PDF_Exploit High A maliciously crafted PDF file that could install or download malware when ...
Exploit.Pidief.AP High Exploit.Pidief.AP contains malicious code that allows remote execution of ...
Exploit.Pidief.BO High Exploit.Pidief.BO is a threat that exploits the Adobe PDF structure in hopes to ...
Exploit.Pidief.D High Exploit.Pidief.D exploits a vulnerability in the PDF file format that allows ...
Exploit.Pidief.G High Exploit.Pidief.G exploits vulnerabilities found in Adobe Flash Player and Adobe ...
Exploit.Pidief.QC High Exploit.Pidief.QC is a detection of the code that takes advantage of an ...
Exploit.RealPlayer Medium Exploit.RealPlayer exploits a vulnerability in an ActiveX browser helper object ...
Exploit.Script.Pdf High Exploit.Script.Pdf attempts to exploit the vulnerability found in PDF to ...
Exploit.SQLInject High Exploit.SQLInject exploits aa known vulnerability in order to take control of a ...
Exploit.SWF High Exploit.SWF makes use of vulnerabilities found in Adobe Shockwave Flash files ...
Exploit.SWF.Downloader.HN High Exploit.SWF.Downloader.HN exploits a vulnerability found in Adobe Shockwave ...
Exploit.TaroDrop Medium Trojan.Tarodrop is a Trojan horse that drops other malware on the compromised ...
Exploit.WebViewFolderIcon High Exploit.WebViewFolderIcon exploits an integer overflow vulnerability in ...
Exploit.Windows_ZoneMap_Protocol_Defaults Low A threat exists which can set all the Restricted Zone Map Sites to be Trusted ...
Exploit.Winrar High Exploit.Winrar exploits a buffer overflow vulnerability found in Winrar version ...
Exploit.WMEncoder Medium Exploit.WMEncoder exploits the vulnerability existing in the WMEX.DLL ActiveX ...
Exploit.WMF High Exploit.WMF exploits the Windows Meta File (WMF) vulnerability to download ...
Exploit.Wordjmp High Exploit.Wordjmp exploits the vulnerability CVE-2006-2492 found in Microsoft ...
Exploit.XMLid Medium XMLid.Exploit is an exploit that can run executable files on the local file ...
Flooder.Skypflood Medium Flooder.Skypflood is an application that allows user to send much messages and ...
Hacktool.ACE_Password_Sniffer Medium ACE Password Sniffer monitors the network and captures passwords through FTP, ...
HackTool.AntiCNN Low HackTool.AntiCNN send multiple http packets to cnn.com in an attempted attack ...
HackTool.ARPSpoofer.A High Hacktool.ARPSpoofer.A when installed on an infected computer will perform ...
Hacktool.BackWeb_Lite Medium BackWeb is a generic, background downloading tool that software vendors can ...
HackTool.BitCoinMiner Low HackTool.BitCoinMiner is a malicious application that could be used by ...
HackTool.CGM Low HackTool.CGM may be used to crack capcha images. If this file was not installed ...
HackTool.CloneDVD Low HackTool.CloneDVD is an applicationi that generates a serial licence for the ...
HackTool.CrackDownloader Low HackTool.CrackDownloader is a hacktool that searches for cracks/serials over ...
HackTool.CrackPDF Low HackTool.CrackPDF is program that used to remove the security on PDF d ...
HackTool.CrackSecureCRT Low Hacktool.CrackSecureCRT is a Hack program to create license key for the ...
HackTool.CrackWonderPhoto Low HackTool.CrackWonderPhoto is a hacktool that cracks the program Wondershare ...
HackTool.Daniel High This is a hacking tool that is capable of performing Denial of Service to a ...
HackTool.DarkstRat Medium HackTool.DarkstRat is a malicious application that could be used by attackers ...
HackTool.Dos.Smurfic Medium Dos.Smurfic is a remote administration tool that allows users to manage and ...
HackTool.EvID Low Hacktool.EvID is potentially unwanted tool which allows user to change TCP IP ...
Hacktool.FireDaemon Medium Hacktool.FireDaemon is a potentially unwanted application that is frequently ...
HackTool.Flooder High Hacktool Flooder is a program used by hackers to create trojans for spamming ...
HackTool.GameTools Low HackTool.GameTools are applications that are used by users to employ cheats, ...
HackTool.Hackdos Medium HackTool.Hackdos is a remote administration tool that allows users to manage ...
Hacktool.HIDD High Hacktool.HIDD is a Rootkit program used by hackers to drop hidden Trojan that ...
HackTool.HideWindows Low HideWindows is a potentially unwanted application which can be used for ...
HackTool.Hupigon Low Hacktool.Hupigon is a tool used by malware writers to generate new variants of ...
HackTool.IDMPatcher Low HackTool.IDMPatcher is a hacking software that patches Internet Download ...
Hacktool.Ipcscan.C High Hacktool.Ipcscan.C is a hacktool for the windows platform which allows ...

Page 1 ... Page 134 | Page 135 | Page 136 | Page 137 | Page 138 | Page 139 | Page 140 | Page 141 | Page 142 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware