«
Expand/Collapse
502 items tagged "dll"
Related tags:
windows [+],
exploit [+],
reader [+],
multiple [+],
foxit [+],
activex [+],
exploits [+],
mozilla [+],
firefox [+],
adobe [+],
workstation [+],
snagit [+],
msvcr71 dll [+],
module [+],
google [+],
activex buffer overflow [+],
vulnerability [+],
vmware [+],
supercopier [+],
player [+],
jetaudio [+],
foxit reader [+],
xilisoft [+],
video converter [+],
video [+],
version 6 [+],
umplayer [+],
txt [+],
manual [+],
loading code [+],
exe [+],
dvd [+],
downloader [+],
converter [+],
babylon [+],
audio [+],
xtreme [+],
workstation version [+],
webclient service [+],
vmware workstation [+],
understand [+],
ulead [+],
tom sawyer software [+],
tom sawyer [+],
tipard [+],
target host [+],
system privileges [+],
system [+],
stdu [+],
scitools [+],
remote buffer overflow vulnerability [+],
rat [+],
professional edition [+],
professional [+],
powerdvd [+],
outlook 6 [+],
outlook [+],
native [+],
mirc [+],
microsoft windows [+],
microsoft products [+],
microsoft excel [+],
metro [+],
meo [+],
menager [+],
libraries [+],
irfanview [+],
integer overflow vulnerability [+],
integer [+],
injection [+],
imxcf [+],
imgburn [+],
gdi [+],
free [+],
factory [+],
extension [+],
explorer dll [+],
ettercap [+],
embarcadero technologies [+],
embarcadero software [+],
editor [+],
dynamic link library [+],
driver dll [+],
director agent [+],
desktop [+],
delphi [+],
dell webcam [+],
datev [+],
createdashedpath [+],
crazytalk [+],
cool [+],
bugtraq [+],
borland delphi [+],
borland [+],
blueftp [+],
arora [+],
application loading [+],
active x control [+],
arbitrary code execution [+],
zdi [+],
windows address book [+],
vmware player [+],
vista [+],
virusscan enterprise [+],
virusscan [+],
viewer [+],
version [+],
trojan horse [+],
trace tool [+],
sap gui [+],
sap [+],
poc [+],
photoshop [+],
opera browser [+],
opera [+],
media [+],
mcafee [+],
lpksetup [+],
loading [+],
hanso [+],
gui [+],
full disclosure [+],
editor dll [+],
dwmapi [+],
crystal reports [+],
code [+],
click [+],
browser [+],
attackers [+],
atl [+],
hijack [+],
zero [+],
xaurora [+],
xara web [+],
xaml [+],
workshop [+],
wise [+],
wintab [+],
winsock functions [+],
windir [+],
winavi [+],
whatsize [+],
website [+],
webservices [+],
vuris [+],
vulnerabilities [+],
vlc [+],
visual basic for applications [+],
visual [+],
visio [+],
virtual dj [+],
virtual [+],
view [+],
ultraiso [+],
uis [+],
trigger [+],
total [+],
temp [+],
techsmith snagit [+],
techsmith [+],
t termis [+],
stack overflow [+],
stack [+],
sso [+],
specific software [+],
speak [+],
sony pc [+],
sony [+],
smartftp [+],
sisoftware sandra [+],
sisoftware [+],
shockwave [+],
shmedia [+],
security advisory [+],
security [+],
screen [+],
sandra [+],
safer use [+],
ringtone [+],
revolution [+],
remote buffer overflow [+],
remote [+],
registry cleaner [+],
registry [+],
reflection [+],
recover [+],
recorder [+],
record [+],
realnetworks [+],
real player [+],
read [+],
rarmaradio [+],
radio [+],
quserex [+],
pthreads win [+],
pthreads [+],
proxy [+],
proxocket [+],
prog [+],
premium [+],
powerproducer [+],
platinum [+],
pixel [+],
photo [+],
phoenix [+],
pc companion [+],
orbicam [+],
openview [+],
office component [+],
office [+],
nvu [+],
nnm [+],
nessus [+],
myfiles [+],
music [+],
msn [+],
microsoft works 7 [+],
microsoft visual basic [+],
microsoft visio 2003 [+],
microsft [+],
memoriesontv [+],
mediacentre [+],
media revolution [+],
magix [+],
mabezat [+],
m player [+],
logo designer [+],
logo [+],
livecycle [+],
live [+],
lite [+],
libtaglib [+],
launchhelp [+],
iworkstation [+],
iphone [+],
internet music [+],
internet [+],
international [+],
input validation [+],
indesign [+],
imagemagick [+],
illustrator [+],
i.d.manager [+],
hp openview [+],
hot [+],
hex workshop [+],
hex editor [+],
hex [+],
hamster [+],
hacking [+],
guliverkli [+],
gtk [+],
godfather [+],
gamehouse [+],
free tv [+],
free antivirus [+],
foxtag [+],
flv to mp4 [+],
flv [+],
finder [+],
file [+],
extractor [+],
explorer [+],
eximioussoft [+],
ec software [+],
dwf file [+],
downlwithidm [+],
download [+],
display [+],
directory [+],
dirapi [+],
device [+],
designer [+],
day [+],
darknet [+],
cyberlink powerproducer [+],
cyberlink [+],
cve [+],
cs4 [+],
control [+],
contentman [+],
component [+],
companion [+],
comet [+],
cofee [+],
clubdjprovj [+],
cisco webex [+],
christv [+],
checkpoint [+],
central cs [+],
cd extractor [+],
cara web [+],
cain and abel [+],
cain and [+],
cain [+],
build [+],
bta [+],
blu ray [+],
beta [+],
besextension [+],
based buffer overflow [+],
barcodewiz [+],
balabolka [+],
avira [+],
avi file [+],
avi [+],
avast [+],
audiograil [+],
audio companion [+],
attachmate [+],
atas [+],
arbitrary [+],
aloud [+],
advisory [+],
adobe shockwave player [+],
adobe photoshop 7 0 [+],
adobe photoshop 7 [+],
adobe photoshop [+],
adobe livecycle [+],
adobe indesign [+],
adobe illustrator [+],
admixdj [+],
adminstudio [+],
activex control [+],
acer [+],
abel [+],
Tools [+],
Software [+],
microsoft [+],
code execution [+],
hijacking [+],
dll loading [+],
buffer overflow vulnerability [+],
ydownloader,
xp sp3,
wpcap,
wnaspi32 dll,
wlm dll hijack,
winstyler,
windvd,
windows works,
windows program,
windows power,
windows media player,
windows live messenger,
winamp version,
winamp 5,
winamp,
win32,
win,
webdav,
wadmxhtml,
virit,
videocharge,
video workstation,
vacation,
utilities,
user,
update,
ultravnc viewer,
ultravnc,
ultraedit,
tracker,
tracer,
tortoise svn,
tortoise,
torrent,
toolkit,
toolbar,
thunderbird,
text style,
text,
testscriptrunner dllhijack,
testscriptrunner,
teamviewer,
tag,
swishmax,
svn,
sunlitgreen,
studio,
standard,
stack buffer,
software update,
snowfox,
smartsniff,
smartftp dllhijack,
signedness,
shellcode,
security technologies,
sec,
seasyofficerecovery,
seamonkey,
scriptingobjectmodel,
script host,
schannel,
sapgui,
salaty,
safari for windows,
safari,
rumba,
roxio mydvd,
roxio,
registry defrag,
real player 10,
qtweb,
putty,
program group,
program,
process,
prevx,
premier,
powerpoint,
power,
plugins,
player versions,
player utilities,
pixplay,
pictureviewer,
photosuite,
photo paint,
pgp,
pdftoword,
pdf xchange,
pdf,
ownership,
overflow,
oovoo,
object tag,
nvidia,
nullsoft winamp,
nullsoft,
notepad,
nokia pc,
nokia,
nitro,
nimbuzz,
news,
network node manager,
netstumbler,
netcut,
nero express,
nero 6,
nero,
mysql,
mydvd,
msvisio,
mspowerp,
mshtml,
mplayerc,
mozilla thunderbird,
mozilla firefox,
microsoft visio 2007,
microsoft power point,
microsoft office,
microsoft internet connection,
microosft,
mfc,
metasploit,
messenger,
memory leak,
memory corruption,
mediaplayerclassic,
mediaplayer,
media player classic,
manycam,
manager. authentication,
manager module,
manager cs,
manager,
mail version,
mail,
macromedia,
lostmon,
location,
local buffer overflow,
local,
liquidxml,
linux,
librpc,
kmplayer,
kingsoft,
kaspersky,
jet,
javascriptcore,
java,
izarc,
isobuster,
invalid,
intervideo windvd 5,
intervideo,
internet security,
internet explorer 8,
internet explorer,
internet communication,
infosec world,
incredimail,
imshextu,
ieframe,
idea,
ibm informix,
hijacker,
helpctr,
heap corruption,
heap,
hacker,
group,
groove,
greenbrowser,
googlee,
gom,
getright,
genericasktoolbar,
gdoc,
fusion,
function,
ftp client,
ftp,
flashplayer,
flash player 9,
flash,
file extensions,
extension manager,
extendedscript,
express,
exhaustion,
enye,
embarcadero,
elite 2,
elite,
ela salaty,
ela,
earth version,
earth,
e press,
dxf file,
dupehunter,
duite,
drm,
driver,
dreamweaver,
dllhijack,
dll windows,
dll version,
dll module,
dll c,
desktop version,
demon tool,
demon,
default extensions,
daemon tools,
daemon,
ctimeouteventlist,
cs5,
creator,
crash,
cpp,
corelpp,
coreldraw,
corel,
core,
convertor,
connection,
communicrypt,
communication settings,
client,
classic,
cisco packet tracer,
cisco packet,
cisco,
celframe,
camtasia,
c dll,
bug,
buffer overflow,
brava,
bof,
bluejay,
bifrsot,
bifrost,
batchblitz,
based,
backup utility,
autodesk autocad 2007,
autodesk,
autocad,
audio converter,
application type,
apple software,
apple safari,
apple quicktime,
alzip,
ainvo,
adobe reader plugin,
adobe premier,
adobe photoshop cs4,
adobe photoshop cs2,
adobe flash player,
active x,
accelerator,
ExploitsVulnerabilities
-
-
19:17
»
Packet Storm Security Exploits
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
19:17
»
Packet Storm Security Exploits
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
19:17
»
Packet Storm Security Recent Files
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
19:17
»
Packet Storm Security Recent Files
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
19:17
»
Packet Storm Security Misc. Files
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
19:17
»
Packet Storm Security Misc. Files
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
-
15:33
»
Packet Storm Security Exploits
Sony PC Companion version 2.1 suffers from a boundary error in WebServices.dll when handling the value assigned to the 'bstrFile' item in the DownloadURLToFile function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
-
16:00
»
SecuriTeam
UMPlayer is prone to a vulnerability that lets attackers execute arbitrary code.
-
-
21:21
»
Packet Storm Security Exploits
This Metasploit module abuses the "wmicimsv" service on IBM System Director Agent 5.20.3 to accomplish arbitrary DLL injection and execute arbitrary code with SYSTEM privileges. In order to accomplish remote DLL injection it uses a WebDAV service as disclosed by kingcope on December 2012. Because of this, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled. It is enabled and automatically started by default on Windows XP SP3, but disabled by default on Windows 2003 SP2.
-
21:21
»
Packet Storm Security Recent Files
This Metasploit module abuses the "wmicimsv" service on IBM System Director Agent 5.20.3 to accomplish arbitrary DLL injection and execute arbitrary code with SYSTEM privileges. In order to accomplish remote DLL injection it uses a WebDAV service as disclosed by kingcope on December 2012. Because of this, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled. It is enabled and automatically started by default on Windows XP SP3, but disabled by default on Windows 2003 SP2.
-
21:21
»
Packet Storm Security Misc. Files
This Metasploit module abuses the "wmicimsv" service on IBM System Director Agent 5.20.3 to accomplish arbitrary DLL injection and execute arbitrary code with SYSTEM privileges. In order to accomplish remote DLL injection it uses a WebDAV service as disclosed by kingcope on December 2012. Because of this, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled. It is enabled and automatically started by default on Windows XP SP3, but disabled by default on Windows 2003 SP2.
-
-
17:00
»
SecuriTeam
This allow local users to gain privileges via a Trojan horse (1) dwmapi.dll, (2) whiptk_wt.7.12.601.dll, or (3) xaml_wt.7.6.0.dll file in the current working directory, as demonstrated by a directory that contains a .dwf file.
-
-
17:00
»
SecuriTeam
This allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .doc, .ppt, or .xls file, aka "Office Component Insecure Library Loading Vulnerability."
-
-
17:00
»
SecuriTeam
xAurora is prone to a vulnerability that lets attackers execute arbitrary code.
-
-
17:04
»
Packet Storm Security Exploits
Google Chrome developers, while trying to be adaptive and current, added some windows 8 helper functions to aid the development of Metro style behavior, but does not include the library file itself, thus resulting in an unqualified dynamic-link library call to 'metro_driver.dll'. A user with local disk access can carefully construct a DLL that suits the pattern that is being traversed by the client and implement it somewhere along the search path and the client will load it seamlessly.
-
17:04
»
Packet Storm Security Recent Files
Google Chrome developers, while trying to be adaptive and current, added some windows 8 helper functions to aid the development of Metro style behavior, but does not include the library file itself, thus resulting in an unqualified dynamic-link library call to 'metro_driver.dll'. A user with local disk access can carefully construct a DLL that suits the pattern that is being traversed by the client and implement it somewhere along the search path and the client will load it seamlessly.
-
17:04
»
Packet Storm Security Misc. Files
Google Chrome developers, while trying to be adaptive and current, added some windows 8 helper functions to aid the development of Metro style behavior, but does not include the library file itself, thus resulting in an unqualified dynamic-link library call to 'metro_driver.dll'. A user with local disk access can carefully construct a DLL that suits the pattern that is being traversed by the client and implement it somewhere along the search path and the client will load it seamlessly.
-
-
14:40
»
Packet Storm Security Exploits
This Metasploit module exploits a remote code execution vulnerability in the tsgetx71ex553.dll ActiveX control installed with Tom Sawyer GET Extension Factory due to an incorrect initialization under Internet Explorer. While the Tom Sawyer GET Extension Factory is installed with some versions of VMware Infrastructure Client, this module has been tested only with the versions installed with Embarcadero Technologies ER/Studio XE2 / Embarcadero Studio Portal 1.6. The ActiveX control tested is tsgetx71ex553.dll, version 5.5.3.238. This Metasploit module achieves DEP and ASLR bypass using the well known msvcr71.dll rop chain. The dll is installed by default with the Embarcadero software, and loaded by the targeted ActiveX.
-
14:40
»
Packet Storm Security Recent Files
This Metasploit module exploits a remote code execution vulnerability in the tsgetx71ex553.dll ActiveX control installed with Tom Sawyer GET Extension Factory due to an incorrect initialization under Internet Explorer. While the Tom Sawyer GET Extension Factory is installed with some versions of VMware Infrastructure Client, this module has been tested only with the versions installed with Embarcadero Technologies ER/Studio XE2 / Embarcadero Studio Portal 1.6. The ActiveX control tested is tsgetx71ex553.dll, version 5.5.3.238. This Metasploit module achieves DEP and ASLR bypass using the well known msvcr71.dll rop chain. The dll is installed by default with the Embarcadero software, and loaded by the targeted ActiveX.
-
14:40
»
Packet Storm Security Misc. Files
This Metasploit module exploits a remote code execution vulnerability in the tsgetx71ex553.dll ActiveX control installed with Tom Sawyer GET Extension Factory due to an incorrect initialization under Internet Explorer. While the Tom Sawyer GET Extension Factory is installed with some versions of VMware Infrastructure Client, this module has been tested only with the versions installed with Embarcadero Technologies ER/Studio XE2 / Embarcadero Studio Portal 1.6. The ActiveX control tested is tsgetx71ex553.dll, version 5.5.3.238. This Metasploit module achieves DEP and ASLR bypass using the well known msvcr71.dll rop chain. The dll is installed by default with the Embarcadero software, and loaded by the targeted ActiveX.
-
-
8:18
»
Packet Storm Security Exploits
A vulnerability in SciTools Understand version 2.6 is caused due to the application loading libraries (wintab32.dll) in an insecure manner. This can be exploited to load arbitrary libraries by tricking a user into opening an Understand Project file (.UDB) located on a remote WebDAV or SMB share.
-
8:18
»
Packet Storm Security Recent Files
A vulnerability in SciTools Understand version 2.6 is caused due to the application loading libraries (wintab32.dll) in an insecure manner. This can be exploited to load arbitrary libraries by tricking a user into opening an Understand Project file (.UDB) located on a remote WebDAV or SMB share.
-
8:18
»
Packet Storm Security Misc. Files
A vulnerability in SciTools Understand version 2.6 is caused due to the application loading libraries (wintab32.dll) in an insecure manner. This can be exploited to load arbitrary libraries by tricking a user into opening an Understand Project file (.UDB) located on a remote WebDAV or SMB share.
-
-
16:21
»
Packet Storm Security Advisories
Foxit Reader is vulnerable to a insecure library loading vulnerability. The libraries identified as being vulnerable are dwmapi.dll, dwrite.dll and msdrm.dll.
-
16:21
»
Packet Storm Security Recent Files
Foxit Reader is vulnerable to a insecure library loading vulnerability. The libraries identified as being vulnerable are dwmapi.dll, dwrite.dll and msdrm.dll.
-
16:21
»
Packet Storm Security Misc. Files
Foxit Reader is vulnerable to a insecure library loading vulnerability. The libraries identified as being vulnerable are dwmapi.dll, dwrite.dll and msdrm.dll.
-
-
21:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - I.D.Manager 6.06 Build 8 (downlWithIDM.dll) Remote BOF Exploit
-
-
21:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Adobe Device Central CS4 DLL Hijacking Exploit
-
-
21:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Mozilla Firefox 5.0 DLL Hijacking Exploit(softokn3.dll)
-
-
21:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - 4Media FLV to MP4 Converter 6 DLL Hijacking Exploit (wintab32.dll)
-
-
21:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Nvu (N-view) Html-Builder v1.0 DLL Hijacking Exploit (js3250.dll)
-
-
21:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Msn Live Messenger14.0 Plus! DLL Hijacking Exploit (dwmapi.dll)
-
-
21:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Opera Browser 11.10 DLL Hijacking Exploit(opera.dll)
-
21:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Mozilla Firefox 4.0 (xul.dll) DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Mozilla Firefox 4.0 (xul.dll) DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Opera Browser 11.10 DLL Hijacking Exploit(opera.dll)
-
-
21:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Mozilla Firefox 4.0.1 DLL Hijacking Exploit(freebl3.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Mozilla Firefox 4.0.1 DLL Hijacking Exploit(freebl3.dll)
-
-
21:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - JetAudio 8.0.7.1000 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - JetAudio 8.0.7.1000 DLL Hijacking Exploit
-
-
19:00
»
SecuriTeam
Microsoft Windows shmedia.dll Division By Zero, Explore.exe DOS Exploit
-
-
15:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - iWorkstation DLL Hijacking Exploit (iacenc.dll)
-
15:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Internet Music Capture DLL Hijacking Exploit (iacenc.dll)
-
15:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - AudioGrail DLL Hijacking Exploit (azid.dll)
-
-
15:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - WinAVI All in One Converter DLL Hijacking (wintab32.dll ; nvcuda.dll)
-
15:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Tipard M2TS Converter DLL Hijacking Exploit (quserex.dll)
-
15:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Tipard DVD Ripper DLL Hijacking Exploit (quserex.dll)
-
15:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Tipard Blu-ray Converter DLL Hijacking Exploit (quserex.dll)
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Real Player 11.0.0.477 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Audio Editor DLL Hijacking Exploit (iacenc.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - ChrisTV Lite DLL Hijacking Exploit (avrt.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - AdmixDJ DLL Hijacking Exploit (svctaglib.dll)
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Prog Finder DLL Hijacking Exploit ( avrt.dll )
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Total Recorder 8.2(build 4100) DLL Hijacking Exploit (iacenc.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - ImageMagick Display v 1.0 DLL Hijacking Exploit
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Microsoft excel.exe 2010 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Microsoft excel.exe 2007 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Microsoft excel.exe 2003 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Mozilla FireFox 4 beta 6 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Mozilla FireFox 3.6.2 DLL Hijacking Exploit
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - MemoriesOnTv v3.1.8 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[webapps / 0day] - Snagit v 8.2.1 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Snagit v 8.2.1 DLL Hijacking Exploit
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - RarmaRadio DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - EximiousSoft Logo Designer v2.58 DLL Hijacking Exploit (dwmapi.dll)
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - PowerDVD.exe 5.00.1107 DLL Hijacking Exploit
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - FoxTag Editor DLL Hijacking Exploit (dwmapi.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Comet Player DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Audio Companion 1.5.7 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - MediaCentre V 4.0.52 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Radio Free TV for PC DLL Hijacking Exploit
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - M-Player V 0.2.8 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Hanso Converter DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Hanso CD Extractor DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Audio Record Expert DLL Hijacking Exploit (dwmapi.dll)
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Acer OrbiCam DLL Hijacking Exploit (mfc71ptb.dll)
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - avira premium 9.0.0.420 DLL Hijacking Exploit (dwmapi.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Avast Free Antivirus 5.0.677 DLL Hijacking Exploit (dwmapi.dll)
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - 1Click DVD Copy Pro 4.2.3.1 DLL Hijacking Exploit (dvd43.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - 1Click DVD To ipod DLL Hijacking Exploit (dvd43.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Vuris win32/mabezat DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Microsft COFEE v1.1.2 DLL Hijacking Exploit
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Cool Iphone Ringtone DLL Hijacking Exploit (dwmapi.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Phoenix DLL Hijacking Exploit (wbtrv32.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - MP3 Converter DLL Hijacking Exploit (iacenc.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - HAMSTER Video Converter DLL Hijacking Exploit (dwmapi.dll)
-
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - MEO DLL Hijacking Exploit (dwmapi.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - STDU explorer DLL Hijacking Exploit (dwmapi.dll)
-
14:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - Adobe Photoshop 7.0.1 ME DLL Hijacking Exploit