Keyword: browser hijacker
4876 Total Search   |   Showing Results : 761 - 780
depends on the parameter passed on to it by its components. Other Details This is the Trend Micro detection for: Browser extensions that contains malicious script JS/ExtenBro.Agent.AD trojan (ESET-NOD32)
as a web plugin. Once clicked, the browser will be redirected to the following URL and download another malware: http://{BLOCKED}k.{BLOCKED}-ups.org/WebTracking/JavaJREInstaller.exe - detected as
URL(s): https://suporteinfo.{BLOCKED}o.org This is a Google browser extension named Interface Online . The extension monitors all web accesses. Malicious code activates only for the following url: *://
order to hide its infostealing routines. It can steal (SMS), photos, videos, contacts, email accounts, calendar events, and browser histories (i.e., Chrome and Samsung Internet Browser). It has the
files: 59.txt It adds the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\FireFox Description = "FireFox Browser Driver" Other Details This backdoor connects to the following
feature bypass if a user views a specially crafted webpage in a web browser capable of instantiating COM components, such as Internet Explorer. In a web-browsing attack scenario, an attacker who
default value data of the said registry entry is 1 .) Web Browser Home Page and Search Page Modification This backdoor modifies the Internet Explorer Zone Settings. Trojan:Win32/Alureon.CT (Microsoft);
\ MJ CLSID = "{random}" Web Browser Home Page and Search Page Modification This backdoor modifies the Internet Explorer Zone Settings. Other Details This backdoor connects to the following possibly
following vulnerability: Adobe Flash Player Buffer Overflow Vulnerability (CVE-2014-0515) NOTES: Once a compromised website is visited, the user's browser with a vulnerable version of Adobe Flash loads a
following registry entries: HKEY_CURRENT_USER\Software\NVIDIA Corporation\ Global\nvUpdSrv value = "{date}" HKEY_CURRENT_USER\Software\NVIDIA Corporation\ Global\nvUpdSrv GUID = "{GUID}" Web Browser Home Page
Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Download Routine This Trojan connects to the following URL(s) to download its component file
\CurrentVersion\Run NetworkChecker = "{Original File Path}\porn.exe" Propagation This worm drops copies of itself into all the removable drives connected to an affected system. Web Browser Home Page and Search Page
Arrival Details This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Web Browser Home Page and Search Page
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects Riskware/MultiPlug (Fortinet), a variant of Win32/AdWare.MultiPlug.N application (NOD32), AdWare.MegaSearch (Ikarus)
Adobe Flash Player Remote Code Execution Vulnerability (CVE-2015-3113) NOTES: Once a compromised website is visited, the user's browser with a vulnerable version of Adobe Flash loads a specially-crafted
CVE-2010-0159 The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of
5.0,OpenBSD OpenBSD 4.5 Apply associated Trend Micro DPI Rules. 1003908| 1003908 - Opera Web Browser 'dtoa()' Remote Code Execution Vulnerability
Thunderbird shares the browser engine with Firefox and could be vulnerable if JavaScript were to be enabled in mail. This is not the default setting and we strongly discourage users from running JavaScript in
information, poison the browser cache, and possibly enable further attack vectors via (1) HTTP 302 redirect controls, (2) XMLHttpRequest, or (3) view-source URIs. Mozilla Firefox 1.0,Mozilla Firefox
selection, and the "g" character; and (3) interaction of the nsFrameList::SortByContentOrder function with a certain insufficient protection of inline frames. nvd: NOTE: Thunderbird shares the browser engine