exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 128 RSS Feed

Files Date: 2010-08-26 to 2010-08-27

TechSmith Snagit 10 Build 788 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Encrypt3d.M!nd

TechSmith Snagit version 10 build 788 DLL hijacking exploit that leverages dwmapi.dll.

tags | exploit
SHA-256 | 07419f11918cae3129ef939ea6211d4f1b503801c1dbd1b2908cda10f52cc964
Microsoft Group Convertor DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Group Convertor DLL hijacking exploit that leverages imm.dll.

tags | exploit
SHA-256 | b3073d944be9dd9a308cfc510cc96753487c9aa684cdbeb98bc7195d441a99d9
TeamMate Audit Management Software Suite DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

TeamMate Audit Management Software Suite DLL hijacking exploit.

tags | exploit
SHA-256 | 513327618ac8756646178f1c4048f7a241d4988a8bf12c0c6331fa4a0a321f87
Microsoft Office Groove 2007 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Office Groove 2007 DLL hijacking exploit.

tags | exploit
SHA-256 | f0258ce9b5a28500bd848a587b3984889e0bce3643e1adcd3dc8e5ddf1fa8ff9
Microsoft Address Book DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Address Book DLL hijacking exploit.

tags | exploit
SHA-256 | 4f13c8d637df82e2669e80503452e208a22553dcc70cc3695cdef1089e39e778
Microsoft Visio 2003 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Visio 2003 DLL hijacking exploit.

tags | exploit
SHA-256 | 3e00f49e2eb44c58485e53faebeef2a18d390f7268fa849ffcd59787dddf2ad4
Adobe Shockwave Player Memory Corruption
Posted Aug 26, 2010
Authored by Rodrigo Rubira Branco

Checkpoint has released advisories detailing memory corruption vulnerabilities in Adobe Shockwave Player.

tags | advisory, vulnerability
advisories | CVE-2010-2868, CVE-2010-2882, CVE-2010-2869, CVE-2010-2864, CVE-2010-2881, CVE-2010-2880
SHA-256 | 4829efd722cb176afb7773873dd385fa21fc3c8bb1ec6cd4af10f5f67b7a7e38
Adobe Shockwave TextXtra Allocator Integer Overflow Remote Code Execution
Posted Aug 26, 2010
Authored by Aaron Portnoy, Logan Brown, Team Montreal Hotties | Site dvlabs.tippingpoint.com

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists due to a faulty allocation routine within the TextXtra.x32 module. This allocator allocates a buffer on the heap based on arithmetic involving a number of elements and a size of an individual element. As the fields come from the file, if either of them are large enough, the value used for the number of bytes to allocate can be made to overflow. As the return value is rarely checked any caller of this function can usually be made to overflow the returned buffer with user-supplied data. An attacker can leverage this to execute remote code under the context of the user running the browser.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2010-2879
SHA-256 | 4a81213c5116b85cea84b6f555ccca604792fb22767b6dc4fdeb0994c35e2ed6
Adobe Shockwave tSAC Chunk Pointer Offset Memory Corruption Remote Code Execution
Posted Aug 26, 2010
Authored by Aaron Portnoy, Logan Brown, Team lollersk8erz | Site dvlabs.tippingpoint.com

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within DIRAPIX.dll which is responsible for parsing the Director movies, a RIFF-based file format. The code sign-extends a value from the input file and uses it as an offset to seek into a heap buffer before performing a write operation. By crafting particular values for this field, an attacker can force the process to seek beyond the allocated bounds of the buffer. This can be leveraged by an attacker to execute arbitrary code under the context of the user running the web browser.

tags | advisory, remote, web, arbitrary
advisories | CVE-2010-2874
SHA-256 | a5b00042c264d908492a78e03e2b000c4d556668645f8023c4c9840bbe65d7af
Bloodshed Dev-C++ 4.9.9.2 Binary Hijacking Exploit
Posted Aug 26, 2010
Authored by storm

Bloodshed Dev-C++ version 4.9.9.2 binary hijacking exploit.

tags | exploit
SHA-256 | 16300887f58277ffca751559c90146dde9497f2ed7ef22b60f007d59118c05ed
Nagios XI users.php SQL Injection
Posted Aug 26, 2010
Authored by Adam Baldwin

Nagios XI suffers from a remote SQL injection vulnerability in users.php.

tags | exploit, remote, php, sql injection
SHA-256 | d8d2f7e65ebe2221b126cfd1ff208afff750e76c28afe69103b749f4529db049
Adobe Acrobat Reader Memory Corruption
Posted Aug 26, 2010
Authored by ItSecTeam

Adobe Acrobat Reader memory corruption proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 8fc261f2d8d0d08c86fa0cb8ceb18cd67318957f9ef172a189d1f24a8d8ef2ec
Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption Remote Code Execution
Posted Aug 26, 2010
Authored by Aaron Portnoy, Logan Brown, Team lollersk8erz | Site dvlabs.tippingpoint.com

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within DIRAPIX.dll which is responsible for parsing the Director movies, a RIFF-based file format. The code directly uses a value from the file while seeking into a heap buffer. The process then attempts to write a NULL byte to the seeked address. By specifying a large enough value for this field, an attacker can force the process to seek beyond the allocated bounds of the buffer. This can be leveraged by an attacker to execute arbitrary code under the context of the user running the web browser.

tags | advisory, remote, web, arbitrary
advisories | CVE-2010-2878
SHA-256 | 434a38f35c1ac47096e5844b388206de10edb7761328457c75b27d8e27b0ba9d
Safari 5.0.1 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Secfence

Safari version 5.0.1 DLL hijacking exploit.

tags | exploit
SHA-256 | 1f5dcb28d22d7170aef020b9adbecf856b53d0b34e631483a6e6f1fc13dcaab2
Opera 10.61 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Glafkos Charalambous

Opera versions 10.61 and below DLL hijacking exploit.

tags | exploit
SHA-256 | 45121eea2141996c6a917e5c3b7a7f9c24d2f02315ff67aec8c258dd48ce57c9
Adobe Shockwave CSWV Chunk Memory Corruption Remote Code Execution
Posted Aug 26, 2010
Authored by Aaron Portnoy, Logan Brown, Team lollersk8erz | Site dvlabs.tippingpoint.com

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within IML32X.dll and DIRAPIX.dll which are responsible for parsing the Director movies, a RIFF-based file format. The code trusts a value from the file as a count and performs an endian-flipping loop on data in heap memory. If the value is large enough the process can be made to seek outside the bounds of the allocation and thus corrupt memory in a controlled fashion. This can be leveraged by an attacker to execute arbitrary code under the context of the user running the web browser.

tags | advisory, remote, web, arbitrary
advisories | CVE-2010-2877
SHA-256 | faf8a920a8245da335a891be6f9204c81adce0ab5f1ccbafaff30a2ab25425e5
Zero Day Initiative Advisory 10-161
Posted Aug 26, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-161 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the code responsible for parsing Director files. When the application parses the pami RIFF chunk, it trusts an offset value and seeks into the file data. If provided with signed values in the data at the given offset, the process can be made to incorrectly calculate a pointer and operate on the data at it's location. This can be abused by an attacker to execute arbitrary code under the context of the user running the browser.

tags | advisory, remote, arbitrary
advisories | CVE-2010-2872
SHA-256 | 0ff5eea7227df3db0dd19d0135245e3eb0f5df882a04e74dcc6e592691042b63
Microsoft Internet Connection Signup Wizard DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Internet Connection Signup Wizard DLL hijacking exploit.

tags | exploit
SHA-256 | 48ee2fa44f4b8de751510aba4e53106abfc05a765d4579c77f071cdeeb0adfbe
InterVideo WinDVD 5 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

InterVideo WinDVD 5 DLL hijacking exploit.

tags | exploit
SHA-256 | cac6b9223489fff004dc5b9aee239c6fb45e84c04fa91e3899e29927ffd2f900
Zero Day Initiative Advisory 10-160
Posted Aug 26, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-160 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the application's support for 3D objects. While parsing the 0xFFFFFF45 RIFF record type, the process performs arithmetic on a size value and uses the result for a heap-based allocation. By specifying a large enough value an attacker can force the integer to wrap and thus the process will under-allocate the buffer. This memory is later copied into using a different size value which results in object corruption that can be leveraged to execute arbitrary code under the context of the user running the browser.

tags | advisory, remote, arbitrary
advisories | CVE-2010-2871
SHA-256 | 6ad883a685106b3bb15fd333725fd957445ac15739ae3e8356989e36253182d9
VLC Media Player DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Secfence

VLC Media Player DLL hijacking exploit.

tags | exploit
SHA-256 | c95feac7f2f2bc26ac00abebebf12b6ccb5a23e4c5093ccc89398390f0c77155
Acunetix Web Vulnerability Scanner DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Kolor

Acunetix Web Vulnerability Scanner version 6.5.20100616 DLL hijacking exploit.

tags | exploit, web
SHA-256 | 574cb607e414615566d29ba4c06752d8bef73d1f950a405b49161ffdb1b9f779
uTorrent DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Dr_IDE

uTorrent versions 2.0.3 and below DLL hijacking exploit.

tags | exploit
SHA-256 | 724101f279a68d428b17097695903cb010afd9a36dd2078ae8983ef15a496033
Adobe PDF Escape EXE Social Engineering (No JavaScript)
Posted Aug 26, 2010
Authored by Jeremy L. Gaddis | Site metasploit.com

This Metasploit module embeds a Metasploit payload into an existing PDF file in a non-standard method. The resulting PDF can be sent to a target as part of a social engineering attack.

tags | exploit
advisories | CVE-2010-1240
SHA-256 | 8bcacab5da9e75189a9aa64e4febeb62b8b46efb7f7f815fdc5788b4c5cf89ea
Debian Linux Security Advisory 2096-1
Posted Aug 26, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2096-1 - Jeremy James discovered that in zope-ldapuserfolder, a Zope extension used to authenticate against an LDAP server, the authentication code does not verify the password provided for the emergency user. Malicious users that manage to get the emergency user login can use this flaw to gain administrative access to the Zope instance, by providing an arbitrary password.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2010-2944
SHA-256 | a78f393d182db7f8affd9dead5ad66efec31e5bb7de574df24217170e7a1ed02
Page 4 of 6
Back23456Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close