Browser exploit: Difference between revisions

Content deleted Content added
Factual inaccuracies corrected
Heavily updated the article with information from a trustworthy source.
Line 1:
A '''browser exploit''' is a pieceform of malicious code that exploitstakes advantage of a softwareflaw [[computeror bug|bug]]vulnerability in aan [[weboperating browser]]system suchor thatpiece theof codesoftware makeswith the intent to alter a user's browser dosettings without somethingtheir unexpectedknowledge. Malicious code may exploit [[HTMLActiveX]], [[JavaScriptHTML]], Images, [[ActiveX]]images, [[Java (programming language)|Java]], [[JavaScript]], and other Web technologies and cause the browser to run arbitrary code.
{{Unreferenced|date=December 2009}}
A '''browser exploit''' is a piece of code that exploits a software [[computer bug|bug]] in a [[web browser]] such that the code makes the browser do something unexpected. Malicious code may exploit [[HTML]], [[JavaScript]], Images, [[ActiveX]], [[Java (programming language)|Java]] and other Web technologies and cause the browser to run arbitrary code.
 
==Symptoms==
==Browser exploits families==
 
[[Cross-zone scripting]] exploits vulnerabilities related to the "zone" concept in some browsers; i.e. a page in "Internet zone" is able to initiate execution with "Local Computer", "Local Intranet" or "Trusted Sites" zone privileges.
Users whose web browsers have fallen victim of a successful browser exploit may find their homepage, search page, and/or favorites have been changed. Other signs include Internet settings options within the browser being altered, access being blocked to specific functions, and the redirection of incorrectly typed URL prefixes.
 
==Prevention==
 
There are multiple ways users can protect their web browsers from falling victim to a browser exploit. Such things include installing firewall software, keeping software updated, being cautious when downloading files, and not opening email attachments from unknown sources.
 
==See also==
*[[Comparison_of_web_browsers#Vulnerabilities|Comparison of web browser vulnerabilities]]
 
==External Links==
 
*[http://www.mywot.com/en/online-threats/browser-exploits Online Threats - Browser exploits | WOT Web of Trust]
 
{{DEFAULTSORT:Browser Exploit}}