header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Magneto Software Net Resource ActiveX v4.0.0.5 NetConnectionEnum SEH Exploit (Universal)

This exploit targets the Magneto Software Net Resource ActiveX v4.0.0.5 component. It uses a universal SEH exploit to execute arbitrary code, in this case launching the calculator (calc.exe). The original proof of concept was developed by s4squatch and can be found at http://www.exploit-db.com/exploits/12208.

Aircrack-ng Remote Exploit

A remote exploit against the aircrack-ng tools that allows for remote code execution. The exploit takes advantage of a vulnerability in the code responsible for parsing IEEE802.11 packets, specifically EAPOL packets. By manipulating the proclaimed length of the EAPOL packet and the packet's padding, an attacker can cause heap corruption and potentially gain control over $EIP. This exploit requires Scapy >= 2.x and Pyrit >= 0.3.1-dev r238 to work.

Magneto Software SNTP ActiveX SntpGetReply BOF

The vulnerability is caused due to a boundary error when processing the 'SntpGetReply' function in the SKSntp.ocx ActiveX control. This can be exploited to cause a buffer overflow by passing an overly long string to the affected function. Successful exploitation could allow execution of arbitrary code.

Magneto Software ICMP ActiveX Control Buffer Overflow

The Magneto Software ICMP ActiveX Control is vulnerable to a buffer overflow. This vulnerability can be exploited by an attacker to execute arbitrary code on a target system. The vulnerability was discovered by s4squatch and was published on 04/13/10. The exploit involves sending a specially crafted buffer to the SKIcmp.ocx ActiveX control, causing it to overwrite the EIP register with a malicious address, leading to code execution. The exploit includes a shellcode payload that spawns the Windows calculator (calc.exe).

Openurgence vaccin 1.03 (RFI/LFI) Multiple File Include Vulnerability

The Openurgence vaccin 1.03 software is vulnerable to multiple file inclusion vulnerabilities, which can be exploited by remote or local attackers to include arbitrary files. This can lead to remote code execution, information disclosure, or denial of service attacks.

Recent Exploits: