header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Roxio MyDVD 9 DLL Hijacking Exploit (HomeUtils9.dll)

This exploit targets Roxio MyDVD 9 software and utilizes a DLL hijacking technique. By placing a malicious DLL file named HomeUtils9.dll in the same directory as the vulnerable software, an attacker can execute arbitrary code with the privileges of the user running the software. This can lead to unauthorized access, privilege escalation, or remote code execution.

Roxio Creator DE DLL Hijacking Exploit (HomeUtils9.dll)

This exploit allows an attacker to hijack the HomeUtils9.dll file in Roxio Creator DE. By exploiting this vulnerability, an attacker can execute arbitrary code with the privileges of the user running the affected software.

Skype <= 4.2.0.169 DLL Hijacking Exploit (wab32.dll)

This exploit allows an attacker to hijack the DLL file used by Skype version 4.2.0.169 and earlier, specifically the wab32.dll file. By placing a malicious wab32.dll file in the appropriate directory, an attacker can execute arbitrary code when Skype is launched.

Firefox location.QueryInterface() Code Execution (Linux x86)

This module exploits a code execution vulnerability in the Mozilla Firefox browser. To reliably exploit this vulnerability, we need to fill almost a gigabyte of memory with our nop sled and payload. This module has been tested on Gentoo Linux with the stock Firefox 1.5.0 package.

MS Excel Malformed FEATHEADER Record Exploit

This exploit targets a vulnerability in MS Excel which allows an attacker to execute arbitrary code by exploiting a malformed FEATHEADER record. The vulnerability has been assigned CVE-2009-3129 and is covered by the Microsoft security bulletin MS09-067. The affected versions of MS Office are 2003 and 2007. The exploit has been tested on Windows XP SP2 with MS Office 2003 v. 11.5604.5606. The original discovery of this exploit was made by Sean Larsson.

Microsoft HTML Help Workshop .hhp file Buffer Overflow Exploit

This exploit targets a buffer overflow vulnerability in Microsoft HTML Help Workshop. By creating a specially crafted .hhp file, an attacker can trigger a buffer overflow and execute arbitrary code on the target system. The exploit code includes a bindshell payload that opens a listening port (13579) on the target machine. This exploit is based on code from realplayer .smil exploit.

Recent Exploits: