This exploit is a DLL hijacking vulnerability in TeamViewer version 5.0.8703. It allows an attacker to execute arbitrary code on the vulnerable system by placing a malicious DLL in the same directory as the vulnerable application. The vulnerable extensions are .tvs and .tvc.
A vulnerability exists in Microsoft Windows 7 wab.exe which allows an attacker to execute arbitrary code by placing a malicious DLL in the same directory as a file with one of the following extensions: .vcf, .p7c, .group, or .contact. When the file is double-clicked, the malicious DLL is loaded and executed.
This exploit is based on the exploit from 'TheLeader' and affects Opera 10.61 on Windows XP SP3. It hijacks the dwmapi.dll library and executes a malicious payload when vulnerable extensions such as .htm, .mht, .mhtml, .xht, .xhtm, and .xhtl are opened.
Microsoft Windows Movie Maker is vulnerable to DLL Hijacking. An attacker can create a malicious DLL file and place it in the same directory as a .mswmm file. When the .mswmm file is opened, the malicious DLL will be executed.
This exploit is based on the exploit from 'TheLeader' and is used to hijack Windows Live Email DLLs. It is tested on Windows XP SP3 and vulnerable extensions are .eml, .nws and .rss. The code includes a function 'evil()' which executes the Windows calculator when called.
Compile and rename to plugin_dll.dll, create a file in the same dir with one of the following extensions: .torrent / .btsearch. Double click & watch a nice calculator pop =]
This exploit allows an attacker to execute arbitrary code by placing a malicious DLL in the same directory as a vulnerable Microsoft PowerPoint 2010 file. The malicious DLL must be named pptimpconv.dll and the vulnerable file must have one of the following extensions: .odp / .pot / .potm / .potx / .ppa / .pps / .ppsm / .ppsx / .ppt / .pptm / .pptx / .pwz / .sldm / .sldx. When the vulnerable file is opened, the malicious DLL will be executed, allowing the attacker to run arbitrary code.
A vulnerability exists in Joomla! 1.5 and all versions down, which allows an attacker to redirect users to a malicious website. This is due to the lack of proper validation of the 'return' parameter in the 'index.php' script. An attacker can exploit this vulnerability by crafting a malicious URL and enticing an unsuspecting user to click on it.
This exploit allows an attacker to execute arbitrary code on a vulnerable system by hijacking a DLL file associated with Wireshark. The attacker can create a malicious DLL file with the same name as the legitimate DLL file and place it in the same directory as the vulnerable application. When the vulnerable application is executed, the malicious DLL file will be loaded and executed instead of the legitimate DLL file.
A buffer overflow vulnerability exists in MicroP 0.1.1.1600, which can be exploited by malicious people to execute arbitrary code. The vulnerability is caused due to a boundary error within the processing of MPPL files. This can be exploited to cause a stack-based buffer overflow via an overly long, specially crafted MPPL file. Successful exploitation may allow execution of arbitrary code.