what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 118 RSS Feed

Files from Stefan Kanthak

Email addressstefan.kanthak at nexgo.de
First Active2007-10-22
Last Active2023-06-08
Nmap 7.00 DLL Hijacking
Posted Dec 16, 2015
Authored by Stefan Kanthak

Nmap versions 7.00 and below for Windows suffer from a DLL hijacking vulnerability.

tags | advisory
systems | windows
SHA-256 | 089e1861a1d4fdd2cdd69f741ed43b204fa79e9339d09bb6bf79333ae77611d2
McAfee Security Products DLL Hijacking
Posted Dec 16, 2015
Authored by Stefan Kanthak

McAfee security products executable installers suffer from a DLL hijacking vulnerability.

tags | advisory
systems | windows
SHA-256 | e376234826ed6225a88e501590a6c820800acc5378cf79d77889ccc9b9a2331e
Google Chrome DLL Hijack
Posted Dec 11, 2015
Authored by Stefan Kanthak

Google Chrome's executable installers suffer from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 224bde92e1c40f51d2ba4b1e631e936dfa88b0fa7bd117702757729ad0205941
7-Zip DLL Hijack
Posted Dec 10, 2015
Authored by Stefan Kanthak

7-Zip executable installers suffer from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | a259b0953e210ae02ad72512f7e8c51dc0cd1cf3d177364e8af93dd658d937b4
JRSoft InnoSetup DLL Hijack
Posted Dec 8, 2015
Authored by Stefan Kanthak

JRSoft InnoSetup executable installers suffer from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 23c3a9d703e6f64f18b7c20de18f64f87a8815cce1acfca84716961420cfefe4
NSIS DLL Hijack
Posted Dec 8, 2015
Authored by Stefan Kanthak

The executable installer for Nullsoft Scriptable Install System suffers from DLL hijacking vulnerabilities.

tags | exploit, vulnerability
systems | windows
SHA-256 | ccdd46e5818b0dbedc4279878178a5cf6e2457038d1d43966c56612639a16f64
VLC DLL Hijack
Posted Dec 8, 2015
Authored by Stefan Kanthak

The executable installer for the VideoLAN Client suffers from DLL hijacking vulnerabilities.

tags | exploit, vulnerability
systems | windows
SHA-256 | 06d549ebc07d5067e07e42895a4d82a9fa7b46ae2fc9574aec65049b635ccd48
SumatraPDF DLL Hijack
Posted Dec 8, 2015
Authored by Stefan Kanthak

SumatraPDF suffers from multiple DLL hijacking vulnerabilities.

tags | exploit, vulnerability
systems | windows
SHA-256 | 27dc14dd449f0656362e2a1fa165d4528d2383f2dcf213a1d7c74b9e5a2afc1e
Mozilla SETUP.EXE DLL Injection
Posted Oct 29, 2015
Authored by Stefan Kanthak

Mozilla's SETUP.exe suffers from a classic DLL injection vulnerability.

tags | exploit
SHA-256 | f0f3561003f9aad503eddd10d186760a70b521b4ca5d80ae51ab265713117c58
Windows Mail Rogue Program.exe Execution
Posted Jul 24, 2014
Authored by Stefan Kanthak

Windows Mail will execute a rogue program if it is sitting at C:\Program.exe.

tags | exploit
systems | windows
SHA-256 | f3534d160722b0c8512076ca40f68dc52eb9958ad735b147cbbd847d80bd678a
Apple iTunes 11.2.2 Insecure Libraries
Posted Jul 7, 2014
Authored by Stefan Kanthak

Apple iTunes version 11.2.2 for Windows comes with outdated and vulnerable libraries.

tags | advisory
systems | windows, apple
advisories | CVE-2013-0339, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2419
SHA-256 | 06dd04f00b24ec800040eaaa5b70fc019fae6203350c787c6d149bfb0721507b
WHQL-signed Synaptics Touchpad Driver Rogue Program Execution
Posted May 9, 2014
Authored by Stefan Kanthak

The WHQL-signed Synaptics touchpad driver delivered via Windows Update executes a rogue program C:\Program.exe with system privileges after its installation.

tags | advisory
systems | windows
SHA-256 | 404715addcfed1bb09a24b3d012bd09aa7ac32c25420053cfa249818f2df19aa
McAfee Security Scanner Plus Rogue Binary Execution
Posted Apr 17, 2014
Authored by Stefan Kanthak

Poor treatment of file paths may lead to rogue binary execution in McAfee Security Scanner Plus.

tags | advisory
SHA-256 | 1f27a310e8ba534f86eb471ef915bc94b1c682806e2c9e1eb7e4cbce7b1f69a1
Exact Audio Copy 1.0 Beta 3 Vulnerable Components
Posted Aug 9, 2013
Authored by Stefan Kanthak

Exact Audio Copy version 1.0 beta 3 ship with outdated, unsupported, and vulnerable third party components.

tags | advisory
SHA-256 | d7401c6892ad2df18ff9b12c1511d96fd4462a5e69d677d669cd5e0b25e1edee
Adobe Reader 11.0.03 Insecure Third Party Components
Posted Jul 10, 2013
Authored by Stefan Kanthak

Adobe Reader version 11.0.03 installs multiple vulnerable third party components.

tags | advisory
SHA-256 | 92867cb438017412891299d6363d515d6e808f27508933657856de2352bdc38c
Defense In Depth The Microsoft Way Part 3
Posted Jun 17, 2013
Authored by Stefan Kanthak

This is a long advisory detailing a lot of back and forth between Microsoft and a researcher in regards to thousands of binary planting issues.

tags | advisory
SHA-256 | 4e3fd4327955e3fdb8ef5db89ace7b235c3daf12236f829844f610a702d23c65
Microsoft Visual C++ Runtime Libraries Out Of Date
Posted Jun 3, 2013
Authored by Stefan Kanthak

Many Microsoft products install outdated and vulnerable Microsoft Visual C++ Runtime Libraries MSVC?80.DLL version 8.0.50727.42.

tags | advisory
SHA-256 | 79d41b28c3cca91d28fadfcdc33dd2ddd6f4aeafcc354d1098eef8ce90448472
Fujitsu Desktop Update Privilege Escalation
Posted May 8, 2013
Authored by Stefan Kanthak

Fujitsu's update utility "Fujitsu Desktop Update", which is factory-preinstalled on every Fujitsu (Siemens) PC with Windows, has a vulnerability which allows the execution of a rogue program in the security context of the current user.

tags | advisory
systems | windows
SHA-256 | 2202eecc6bc0de9cf753988607db78f29bba9e60d2f845aacd1b52e1a0106eeb
3CX Phone 11 Outdated Libraries
Posted May 6, 2013
Authored by Stefan Kanthak

3CXPhoneSystem11.exe (for Windows) comes with vulnerable outdated third party libraries and components.

tags | advisory
systems | windows
SHA-256 | 69cba503c241948b132b39eaebd4d6ea204480f2f09dd78aff20760fcccfa577
3CX Phone 6 Outdated Libraries
Posted May 6, 2013
Authored by Stefan Kanthak

3CXPhone6.msi (for Windows) comes with vulnerable outdated third party libraries and components.

tags | advisory
systems | windows
SHA-256 | bb201f262088d88b08a2e77776c0afb02bbbe6e69f68855536164dd78da9e033
Fujitsu Lifebook A512 Out Of Date
Posted May 6, 2013
Authored by Stefan Kanthak

The Fujitsu Lifebook A512 with Windows 8 Professional x64 factory preinstallation comes shipped with out of date vulnerability components and insecure installations.

tags | advisory
systems | windows
SHA-256 | 149be66ca877ed618264fb078501befafb7a2310c8c9244bbcb494a5d08d46b6
Microsoft Security Essentials Code Execution
Posted May 5, 2013
Authored by Stefan Kanthak

Microsoft Security Essentials versions prior to 4.2 have a vulnerability that could lead to execution of arbitrary code in the security context of the LocalSystem account.

tags | exploit, arbitrary
SHA-256 | 630839495c69bb80d036def90337a0a1056ac7d933a99a4be17cb22ed523c8b4
eM Client 4 Vulnerable Runtime DLLs
Posted Nov 2, 2012
Authored by Stefan Kanthak

eM Client 4 ships with deprecated and vulnerable Microsoft Visual C++ 2008 runtime DLLs.

tags | advisory
SHA-256 | 6b09813e63424906cd88cf7e406e13caa79e7f3a4fc8f530ead65701b478e952
Ogg DirectShow Vulnerable Libraries
Posted Oct 4, 2012
Authored by Stefan Kanthak

Ogg DirectShow filters are distributed and installed with vulnerable MSVC++ 2008 runtime libraries.

tags | advisory
SHA-256 | b06efefa49fe4a839ba260c3501c2c5e9f23dfff7b6ac56b0a3f398118641d05
Dell Data Protection | Access (DDPA) Vulnerable Components
Posted Sep 25, 2012
Authored by Stefan Kanthak

The current version of Dell's Data Protection | Access (DDPA) software for Windows (Build 2.2.00003.008 from 2012-06-14, released August 2012) contains and installs several outdated, superfluous and vulnerable Windows system components as well as outdated and vulnerable 3rd party components and drivers.

tags | advisory
systems | windows
SHA-256 | 94bd37cd29972c65c66ecaa5cf64277fc3f8e5d39650d0466b7af17303cc6c54
Page 4 of 5
Back12345Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close