Maintaining access using search order hijacking in standard software