Browser exploit: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: url. URLs might have been anonymized. Add: s2cid, authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | Category:Web browsers | #UCB_Category 41/125
{{R with history}}
 
(2 intermediate revisions by 2 users not shown)
Line 1:
*#REDIRECT [[Browser security]]
{{Refimprove|date=January 2017}}
A '''browser exploit''' is a form of malicious code that takes advantage of a flaw or vulnerability in an operating system or piece of software with the intent to breach [[browser security]] to alter a user's browser settings without their knowledge.<ref>{{Cite journal|last1=Sood|first1=Aditya K.|last2=Zeadally|first2=Sherali|date=2016-09-28|title=Drive-By Download Attacks: A Comparative Study|url=https://ieeexplore.ieee.org/document/7579103|journal=IT Professional|volume=18|issue=5|pages=18–25|doi=10.1109/MITP.2016.85|s2cid=27808214|issn=1520-9202}}</ref> Malicious code may exploit [[ActiveX]], [[HTML]], images, [[Java (programming language)|Java]], [[JavaScript]], and other Web technologies and cause the browser to run arbitrary code.
 
{{R with history}}
==Symptoms==
 
Users whose web browsers have fallen victim of a successful browser exploit may find their homepage, search page, and/or favorites have been changed. Other signs include Internet settings options within the browser being altered, access being blocked to specific functions, and the redirection of incorrectly typed URL prefixes.
 
==Prevention==
 
There are multiple ways users can protect their web browsers from falling victim to a browser exploit. Such things include installing firewall software, keeping software updated, being cautious when downloading files, and not opening email attachments from unknown sources.
 
==Notable browser exploits==
 
[[JailbreakMe]] is a series of browser based exploits used to [[IOS jailbreaking|jailbreak]] [[Apple Inc.|Apple]]'s [[iOS]] [[mobile operating system]]. It uses an exploit in the browser's PDF parser to execute unauthorised code and gain access to the underlying operating system.
 
==See also==
*[[Browser security]]
*[[Comparison of web browsers#Security and vulnerabilities|Comparison of web browser vulnerabilities]]
 
==References==
{{Reflist}}
 
==External links==
*[https://web.archive.org/web/20160308011850/https://www.mywot.com/en/online-threats/browser-exploits Online Threats - Browser exploits | WOT Web of Trust]
 
{{DEFAULTSORT:Browser Exploit}}
[[Category:Web security exploits]]
[[Category:Web browsers]]