The Joomla BC component suffers from a cross site scripting vulnerability.
78256eebd76275c19dcb6ce5bcf21d10d0399aa957ee109a9fc1da50a8b46308
Ettercap NG version 0.7.3 DLL hijacking exploit that leverages wpcap.dll.
1e76412c698a23529eb8a3ecf7a57abc3def1f271ecb87ef0476d1937fbaef78
Windows Internet Communication Settings DLL hijacking exploit that leverages schannel.dll.
7a06550af8b95f70d717ae55a2c4f2bf8cf88bc106daa65a8418881f2dd0711a
Autodesk AutoCAD 2007 DLL hijacking exploit.
5c5956599e539bd880732e5c73d896d926501b53317a1de04e72e54345c392f5
Ananta Gazelle CMS suffers from a remote shell upload vulnerability.
b7fb7559715ca74fc7d53634e32a73c79d2e424a5c9a61a93669b5fe566d81c4
Brief write up discussing exploitation of the Linux linker.
e6a4092d9c7f6bfe19a47771315ef0b1edbedff573ad3adc8783e68166ac9c97
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the code responsible for parsing Director's RIFF-based file format. While parsing the tSAC chunk, the DIRAPI module does not properly verify the signedness of a count value within an undocumented structure. By providing a large enough negative value a pointer can be miscalculated leading to memory corruption. This can be exploited by a remote attacker to execute arbitrary code under the context of the user running the web browser.
86a222ba1e8cbc3a092252acfbbfd4d5af69f70800dc8b82c9dfe26831862381
Media Player Classic version 1.3.2189.0 DLL hijacking exploit that leverages iacenc.dll.
a5155ff4a238df513660a714b643bdae1d889580b93c246d24c207d913eb9061
Demon Tool Lite DLL hijacking exploit that leverages mfc80loc.dll.
7a12853362ac28f7394f87d7593969601505d3eb2017e9c1369f3a11d7abba76
Adobe Premier Pro CS4 DLL hijacking exploit that leverages ibfs32.dll.
2e534786f9330372e98738b276b6c7d5a8f947fa4243bc5ffda32824175b516d
Adobe On Location CS4 DLL hijacking exploit that leverages ibfs32.dll.
d5305e9abef3ec5d8120c23d744231c4971203a3142401c4dae22be3ca4a87ea
Adobe InDesign CS4 DLL hijacking exploit that leverages ibfs32.dll.
bcd139eae8faab3f9c359327dfb1b281a9bba59aae8a8543c2536bc02afd66a4
Adobe Illustrator CS4 DLL hijacking exploit that leverages aires.dll.
b1844eb9abcf78cc269a107443d6478c37a0dd6f3f5f18ff4cb8c64c4e4d7558
Skype versions 4.2.0.169 and below DLL hijacking exploit that leverages wab32.dll.
1dc9ab9214f52af84cad865cee20c04573afdca03114518ac2f62b433d256a0e
Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.
7b2d817665fefd9979ac07a468b98449733d8648aa3605b24e288364a26a0290
Nvidia Driver DLL hijacking exploit.
b4b425568bc70847d4517b90650e630430916355d901cfe112a4edbf1cea3737
Windows Program Group DLL hijacking exploit that leverages imm.dll.
1cda1501da5eb728461531723dd934d53902be0b396568d8c84ee71f8e4ac514
PuTTY version 0.60 DLL hijacking exploit.
0bf025dd1119e3646f5ccf42df4b502bca4bf9d0449fea49cf34ebe8e59c4f4f
wscript.exe DLL hijacking exploit that leverages wshfra.dll.
b9c1096b8c4a579bbcb4e6061c617b3798a6ac4d747aff7b244e8997dfc13624
Adobe Device Central CS5 DLL hijacking exploit that leverages qtcf.dll.
e8cef321b35ff31bd0b305c3e668587929995c82fe8144bcf7933b24c091e2d1
Zero Day Initiative Advisory 10-162 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of the rcsL RIFF chunk within director files of extension DIR or DCR. While parsing this undocumented structure, the application blindly trusts an offset value and uses it while operating on heap memory. An attacker can abuse this to corrupt a function pointer which can lead to arbitrary code execution under the context of the user running the web browser.
14a57217361bd108df70649c6ddc760d2e13bbc98ad7750e7f4cb2f96339937e
Microsoft Office PowerPoint 2007 DLL hijacking exploit.
c4f23f144b58315e09f72ffefe5786a37b59d14dc615df7275b1c71ff498b57b
Roxio MyDVD 9 DLL hijacking exploit that leverages HomeUtils9.dll.
8d32d3c6c71eb31a13caf25feb55c7a9f7bbed47c3bfa030f1fb71d42f094cdd
Microsoft Windows Contacts DLL hijacking exploit.
d769c05449d6f22baca4fa83bf3822a66534d4f3fdb144ff18583175873d1197
Roxio Creator DE DLL hijacking exploit.
c0108b90d65c12d8a439c8864b1d38aed2bc51aec64bd7b53ff54e34cfa96cec