Keyword: browser hijacker
300 Total Search   |   Showing Results : 161 - 180
This adware may arrive bundled with malware packages as a malware component.It is a component of other malware.It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits.It requires its main component to successfully pe...
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.It modifies the Internet Explorer Zone Se...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Mozilla Firefox or Microsoft Internet Explorer when used with Quicktime can be used to remotely execute commands with chrome privileges. Apple Quicktime 7.1.5,Microsoft Internet Explorer,Mozilla Firefox 2....
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.It registers itself as a Browser Helper Object (BHO) to ensure its ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version a...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Symantec Messaging Gateway is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute ...
Oracle Business Intelligence Discoverer contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the...
A remote code execution vulnerability exists in the following versions of Java: Java Development Kit 7 Update 10 and earlier Java Runtime Environment 7 Update 10 and earlier The...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.