Exploitdb Exploits

3,149 exploits tracked across all sources.

Sort: Activity Stars
CVE-2010-3125 EXPLOITDB c
TeamMate Audit Mgmt <8.0-2 - RCE
Untrusted search path vulnerability in TeamMate Audit Management Software Suite 8.0 patch 2 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse mfc71enu.dll that is located in the same folder as a .tmx file.
by Beenu Arora
CVE-2010-3136 EXPLOITDB c VERIFIED
Skype <4.2.0.169 - RCE
Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file.
by Glafkos Charalambous
EIP-2026-117881 EXPLOITDB c
Roxio Photosuite 9 - 'homeutils9.dll' DLL Hijacking
by Beenu Arora
CVE-2010-5195 EXPLOITDB c
Roxio MyDVD 9 - Privilege Escalation
Untrusted search path vulnerability in Roxio MyDVD 9 allows local users to gain privileges via a Trojan horse HomeUtils9.dll file in the current working directory, as demonstrated by a directory that contains a .dmsd or .dmsm file. NOTE: some of these details are obtained from third party information.
by storm
CVE-2010-5236 EXPLOITDB c
Roxio Easy Media Creator Home 9.0.136 - Privilege Escalation
Untrusted search path vulnerability in Roxio Easy Media Creator Home 9.0.136 allows local users to gain privileges via a Trojan horse homeutils9.dll file in the current working directory, as demonstrated by a directory that contains a .roxio, .c2d, or .gi file. NOTE: some of these details are obtained from third party information.
by storm
EIP-2026-117713 EXPLOITDB c
Nvidia Driver - 'nview.dll' DLL Hijacking
by Encrypt3d.M!nd
CVE-2010-3137 EXPLOITDB c VERIFIED
Nullsoft Winamp 5.581 - RCE
Untrusted search path vulnerability in Nullsoft Winamp 5.581, and probably other versions, allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wnaspi32.dll that is located in the same folder as a .669, .aac, .aiff, .amf, .au, .avr, .b4s, .caf or .cda file.
by LiquidWorm
CVE-2010-3131 EXPLOITDB c VERIFIED
Mozilla Firefox < & Thunderbird < & SeaMonkey <3.5.12-3.6.9 <3.0.7-3.1.3 - DLL Hijacking
Untrusted search path vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Windows XP allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .htm, .html, .jtx, .mfp, or .eml file.
by h4ck3r#47
CVE-2010-3140 EXPLOITDB c VERIFIED
Microsoft Windows Internet Communication Settings - RCE
Untrusted search path vulnerability in Microsoft Windows Internet Communication Settings on Windows XP SP3 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse schannel.dll that is located in the same folder as an ISP file.
by ALPdaemon
CVE-2010-3147 EXPLOITDB c VERIFIED
Windows Address Book <6.00.2900.5512 - Privilege Escalation
Untrusted search path vulnerability in wab.exe 6.00.2900.5512 in Windows Address Book in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a Trojan horse wab32res.dll file in the current working directory, as demonstrated by a directory that contains a Windows Address Book (WAB), VCF (aka vCard), or P7C file, aka "Insecure Library Loading Vulnerability." NOTE: the codebase for this product may overlap the codebase for the product referenced in CVE-2010-3143.
by storm
CVE-2010-3148 EXPLOITDB c
Microsoft Visio 2003 SP3 - Privilege Escalation
Untrusted search path vulnerability in Microsoft Visio 2003 SP3 allows local users to gain privileges via a Trojan horse mfc71enu.dll file in the current working directory, as demonstrated by a directory that contains a .vsd, .vdx, .vst, or .vtx file, aka "Microsoft Visio Insecure Library Loading Vulnerability."
by Beenu Arora
CVE-2010-3142 EXPLOITDB c
Microsoft Office PowerPoint 2007 - RCE
Untrusted search path vulnerability in Microsoft Office PowerPoint 2007 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse rpawinet.dll that is located in the same folder as a .odp, .pothtml, .potm, .potx, .ppa, .ppam, .pps, .ppt, .ppthtml, .pptm, .pptxml, .pwz, .sldm, .sldx, and .thmx file.
by storm
CVE-2011-0108 EXPLOITDB c
Rejected
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none
by Beenu Arora
CVE-2010-3139 EXPLOITDB c VERIFIED
Microsoft Windows Progman Group Converter - RCE
Untrusted search path vulnerability in Microsoft Windows Progman Group Converter (grpconv.exe) allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse imm.dll that is located in the same folder as a .grp file.
by Beenu Arora
CVE-2010-3147 EXPLOITDB c VERIFIED
Windows Address Book <6.00.2900.5512 - Privilege Escalation
Untrusted search path vulnerability in wab.exe 6.00.2900.5512 in Windows Address Book in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a Trojan horse wab32res.dll file in the current working directory, as demonstrated by a directory that contains a Windows Address Book (WAB), VCF (aka vCard), or P7C file, aka "Insecure Library Loading Vulnerability." NOTE: the codebase for this product may overlap the codebase for the product referenced in CVE-2010-3143.
by Beenu Arora
CVE-2010-3138 EXPLOITDB c VERIFIED
Microsoft Windows XP SP3 - Privilege Escalation
Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information.
by LiquidWorm
CVE-2010-3138 EXPLOITDB c
Microsoft Windows XP SP3 - Privilege Escalation
Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information.
by Encrypt3d.M!nd
EIP-2026-117339 EXPLOITDB c
InterVideo WinDVD 5 - 'cpqdvd.dll' DLL Hijacking
by Beenu Arora
CVE-2010-3134 EXPLOITDB c VERIFIED
Google Earth <5.1.3535.3218 - RCE
Untrusted search path vulnerability in Google Earth 5.1.3535.3218 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse quserex.dll that is located in the same folder as a .kmz file.
by LiquidWorm
EIP-2026-117144 EXPLOITDB c
Ettercap NG-0.7.3 - 'wpcap.dll' DLL Hijacking
by anonymous
CVE-2010-5239 EXPLOITDB c
DAEMON Tools Lite/Pro <4.35.6.0091-4.36.0309.0160 - Privilege Escal...
Untrusted search path vulnerability in DAEMON Tools Lite 4.35.6.0091 and Pro Standard 4.36.0309.0160 allows local users to gain privileges via a Trojan horse mfc80loc.dll file in the current working directory, as demonstrated by a directory that contains a .mds file. NOTE: some of these details are obtained from third party information.
by Mohamed Clay
CVE-2014-8393 EXPLOITDB HIGH c VERIFIED
Coreldraw - Uncontrolled Search Path
DLL Hijacking vulnerability in CorelDRAW X7, Corel Photo-Paint X7, Corel PaintShop Pro X7, Corel Painter 2015, and Corel PDF Fusion.
by LiquidWorm
CVSS 7.8
CVE-2014-8393 EXPLOITDB HIGH c VERIFIED
Coreldraw - Uncontrolled Search Path
DLL Hijacking vulnerability in CorelDRAW X7, Corel Photo-Paint X7, Corel PaintShop Pro X7, Corel Painter 2015, and Corel PDF Fusion.
by LiquidWorm
CVSS 7.8
CVE-2010-3135 EXPLOITDB c
Cisco Packet Traver <5.2 - RCE
Untrusted search path vulnerability in Cisco Packet Tracer 5.2 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wintab32.dll that is located in the same folder as a .pkt or .pkz file.
by CCNA
EIP-2026-116929 EXPLOITDB c
BS.Player 2.56 build 1043 - 'mfc71loc.dll' DLL Hijacking
by diwr