Keyword: browser hijacker
4876 Total Search   |   Showing Results : 521 - 540
zero-day exploit for the following vulnerability: CVE-2015-0311 NOTES: Once a compromised website is visited, the user's browser with a vulnerable version of Adobe Flash will load a specially crafted Flash
zero-day exploit for the following vulnerability: CVE-2015-0311 NOTES: Once a compromised website is visited, the user's browser with a vulnerable version of Adobe Flash will load a specially crafted Flash
malicious sites. Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details This Trojan connects to the following possibly malicious URL:
Google Chrome Upon Execution, It uses Google Chrome to access the following URL: http://{BLOCKED}ps.com/all/ Added the following process to execute the browser and access the URL: %System%>start "" "
following registry entries: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKS = "1" HKEY_CURRENT_USER\Software\db564e47745587cacb5501b7df0b93a2 US = "@" Web Browser Home Page and Search Page Modification
other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This spyware drops the following files: c:\autoexec.bat Web Browser Home Page and Search Page
zero-day exploit for the following vulnerability: CVE-2015-0311 NOTES: Once a compromised website is visited, the user's browser with a vulnerable version of Adobe Flash will load a specially crafted Flash
malicious sites. Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details This Trojan connects to the following possibly malicious URL:
CVE-2015-2502 This vulnerability exists in several versions of the Windows browser Internet Explorer. The vulnerability lies in the way Internet Explorer accesses objects in memory. Attackers could
CVE-2004-1172 cve: Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute
CVE-2010-3175 Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service
by using the AddString and Post methods and a modified PostURL to construct an HTTP POST request. NOTE: this issue might only be exploitable in limited environments or non-default browser settings.
CVE-2007-5095 Microsoft Windows Media Player (WMP) 9 on Windows XP SP2 invokes Internet Explorer to render HTML documents contained inside some media files, regardless of what default web browser is
CVE-2009-1392,CVE-2009-1832,CVE-2009-1833 The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{4B7B8BCE-7E00-450D-BFBF-4F49F21BE610}
is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3} HKEY_LOCAL_MACHINE
Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{b6b571fb-b71d-449c-ad70-82e966328795} Other System
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It acts as a Browser Helper Object (BHO) that monitors
ensure its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\