Keyword: browser hijacker
4876 Total Search   |   Showing Results : 241 - 260
%User Temp%\adobe{12 Random Characters}\Autofill\{Web Browser Name}_Default.txt %User Temp%\adobe{12 Random Characters}\CC\{Web Browser Name}_Default.txt %User Temp%\adobe{12 Random Characters}\Cookies\
\ Internet Explorer\TabbedBrowsing HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ dosearches Browser Protecter HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall
\ Internet Explorer\TabbedBrowsing HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ dosearches Browser Protecter HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall
\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{54192079-8E8A-43D8-BCBC-3874916159AF} Other System Modifications This Trojan adds the following registry keys: HKEY_CLASSES_ROOT
IBM WebSphere Portal is prone to an unspecified cross-site scripting vulnerability. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the
the application, which will execute within the browser of any logged-in admin who views the page with injected code. Apply associated Trend Micro DPI Rules. 1000552|
the application, which will execute within the browser of any logged-in admin who views the page with injected code. Apply associated Trend Micro DPI Rules. 1000552|
\Software\Description\ Microsoft\Rpc\UuidTemporaryData HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows
\Software\Description\ Microsoft\Rpc\UuidTemporaryData HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows
every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{EABD249F-430F-47EB-882A-C851253E4BD9}
vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications.
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{4078CCAF-8646-3E2D-B409-8280BB025A60}
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{6255103E-B323-3ED2-96ED-4AD67CD07AC1}
malicious browser extensions, the plugin will close this tab immediately. It removes the security option from HTTP response header. This security option is typically used to avoid cross-site scripting
from the following applications: 7Star Amigo BlackHawk Brave CentBrowser Chedot Chrome Chromium Coccoc Comodo Dragon Cool Novo CoreFTP CyberFox DynDNS Elements Browser Epic Privacy Eudora FileZilla
Browser Home Page and Search Page Modification This Trojan lowers the security setting of Internet Explorer. Download Routine This Trojan accesses websites to download the following files: http://{random
bypasses popup blockers from Norton , Internet Explorer, and Google Toolbar. It opens a new browser window to the URL http://{BLOCKED}n.com/MzPD . Trojan:JS/Agent.FA(Microsoft),Trojan-Downloader.JS.IstBar.ce
Stack-based buffer overflow in the Agent Browser in Veritas Backup allows remote attackers to execute arbitrary code via a registration request with a long hostname. Symantec Veritas Backup Exec
Stack-based buffer overflow in the Agent Browser in Veritas Backup allows remote attackers to execute arbitrary code via a registration request with a long hostname. Symantec Veritas Backup Exec