A number of the most popular web browser add-ons have been identified by security researchers as potentially being used to trick users into installing malware on their computers.
These include Flash Player 10.0.1 (Flash Player 10) from Adobe, which was first spotted last week.
Another popular add-on is called Flashlight, which is an Adobe Flash Player plug-in that enables users to launch Web pages from a USB flash drive.
While this is obviously a security risk, a number of people have found ways around it in their browsers, according to researchers at Trend Micro.
The latest issue, published on Tuesday, notes that Flash Player version 10.2.1 of Flash Player, which Adobe announced in October, was also used to install malicious code on a number that the researchers found on a laptop.
“Affected users may be able to bypass the security warning that pops up when installing Flash Player by selecting the ‘Enable Adobe Flash’ option in the browser toolbar,” the researchers wrote in the latest security bulletin.
“However, they can still be tricked into installing malicious code by disabling the Flash plugin.”
The researchers also noted that some of the malicious code included in the Flash Player bundle could have been downloaded by malicious actors in the past, suggesting that a malicious actor could have used a previously-hidden Flash Player update in the future to install it on users’ machines.
The Flash Player extension in question appears to be called “Flashlight,” which is included in Flash Player 11.0 (Flash 11.1).
While the Flashlight plug-ins is not included in most Flash add-ins, researchers say that this version was.
The researchers added that they found the FlashLight code in a Windows XP SP3 system running a Windows 7 system.
This means that a malware actor could install the Flash Light code in Windows XP running on an older Windows version, or in a system running Windows 7.
However, it’s unclear whether the Flash plug-In is also included in these older Windows versions.
Researchers also noted in the security bulletin that several of the FlashPlug-in’s scripts were “shared among multiple hosts in a network” and that “these scripts could potentially be exploited to trigger the Flash Flash Player installation and subsequent execution.”
While FlashPlug is a fairly new plug–in and has only recently been made available for download, it has been around for a while, and it’s only recently come to the attention of security researchers.
The Flash Plug-In has been the subject of several vulnerabilities in recent years, including a FlashPlug exploit that could have enabled an attacker to take control of a target system.
The exploit also allowed attackers to bypass anti-virus software, and was one of the first known exploits to have been used to bypass a Windows update.
Researchers say that the Flash Plug in was also one of those that could potentially have been a tool for malware developers to install and run on machines.
“The Flash Plug Plug-in could potentially enable the use of other plug-Ins, such as Flash Player and Adobe Flash,” the researcher wrote.
“A FlashPlug plugin could also allow malware authors to upload malicious Flash files.”
According to the researchers, the Flash Plugin’s malicious code has been downloaded over 100,000 times.