This exploit targets Roxio MyDVD 9 software and utilizes a DLL hijacking technique. By placing a malicious DLL file named HomeUtils9.dll in the same directory as the vulnerable software, an attacker can execute arbitrary code with the privileges of the user running the software. This can lead to unauthorized access, privilege escalation, or remote code execution.
This exploit targets Adobe Illustrator CS4 version 14.0.0 by hijacking the aires.dll file. When the DLL is loaded, it displays a message box with the text 'Adobe DLL Hijacking!'
This exploit allows an attacker to hijack the HomeUtils9.dll file in Roxio Creator DE. By exploiting this vulnerability, an attacker can execute arbitrary code with the privileges of the user running the affected software.
This exploit allows an attacker to hijack the DLL file used by Skype version 4.2.0.169 and earlier, specifically the wab32.dll file. By placing a malicious wab32.dll file in the appropriate directory, an attacker can execute arbitrary code when Skype is launched.
This exploit targets a memory corruption vulnerability in all versions of Adobe Acrobat Reader. By exploiting this vulnerability, an attacker can execute arbitrary code on the affected system.
This exploit allows an attacker to hijack the Microsoft Internet Connection Signup Wizard DLL and execute arbitrary code. By compiling and renaming the provided code as smmscrpt.dll and creating a file with one of the vulnerable extensions (.isp) in the same directory, the attacker can trigger the execution of the 'evil' function, which opens the Windows calculator (calc).
This module exploits a code execution vulnerability in the Mozilla Firefox browser. To reliably exploit this vulnerability, we need to fill almost a gigabyte of memory with our nop sled and payload. This module has been tested on Gentoo Linux with the stock Firefox 1.5.0 package.
This exploit allows an attacker to hijack the dwmapi.dll file in Firefox version 3.6.8 or earlier. The vulnerable extensions are .htm, .html, .jtx, and .mfp. By exploiting this vulnerability, an attacker can execute arbitrary code on the victim's system.
This exploit targets a vulnerability in MS Excel which allows an attacker to execute arbitrary code by exploiting a malformed FEATHEADER record. The vulnerability has been assigned CVE-2009-3129 and is covered by the Microsoft security bulletin MS09-067. The affected versions of MS Office are 2003 and 2007. The exploit has been tested on Windows XP SP2 with MS Office 2003 v. 11.5604.5606. The original discovery of this exploit was made by Sean Larsson.
This exploit targets a buffer overflow vulnerability in Microsoft HTML Help Workshop. By creating a specially crafted .hhp file, an attacker can trigger a buffer overflow and execute arbitrary code on the target system. The exploit code includes a bindshell payload that opens a listening port (13579) on the target machine. This exploit is based on code from realplayer .smil exploit.