This exploit targets the Magneto Software Net Resource ActiveX v4.0.0.5 component. It uses a universal SEH exploit to execute arbitrary code, in this case launching the calculator (calc.exe). The original proof of concept was developed by s4squatch and can be found at http://www.exploit-db.com/exploits/12208.
This exploit targets the Magneto Software Net Resource ActiveX v4.0.0.5 NetFileClose function, allowing arbitrary code execution. The exploit uses a shellcode to execute the calc.exe command.
The Joomla Component com_iproperty 1.5.3 (id) is vulnerable to SQL Injection. An attacker can exploit this vulnerability to execute arbitrary SQL commands on the target system.
This exploit targets the MCCS serverclient command and causes a denial of service by sending a bad string code.
A remote exploit against the aircrack-ng tools that allows for remote code execution. The exploit takes advantage of a vulnerability in the code responsible for parsing IEEE802.11 packets, specifically EAPOL packets. By manipulating the proclaimed length of the EAPOL packet and the packet's padding, an attacker can cause heap corruption and potentially gain control over $EIP. This exploit requires Scapy >= 2.x and Pyrit >= 0.3.1-dev r238 to work.
The vulnerability is caused due to a boundary error when processing the 'SntpGetReply' function in the SKSntp.ocx ActiveX control. This can be exploited to cause a buffer overflow by passing an overly long string to the affected function. Successful exploitation could allow execution of arbitrary code.
The Magneto Software ICMP ActiveX Control is vulnerable to a buffer overflow. This vulnerability can be exploited by an attacker to execute arbitrary code on a target system. The vulnerability was discovered by s4squatch and was published on 04/13/10. The exploit involves sending a specially crafted buffer to the SKIcmp.ocx ActiveX control, causing it to overwrite the EIP register with a malicious address, leading to code execution. The exploit includes a shellcode payload that spawns the Windows calculator (calc.exe).
The Openurgence vaccin 1.03 software is vulnerable to multiple file inclusion vulnerabilities, which can be exploited by remote or local attackers to include arbitrary files. This can lead to remote code execution, information disclosure, or denial of service attacks.
VMrc vulnerable to format string attacks. Exploitation of this issue may lead to arbitrary code execution on the system where VMrc is installed.
The Vieassociative Openmairie 1.01 beta version is vulnerable to multiple file include vulnerability through remote or local file inclusion. An attacker can exploit this vulnerability to include arbitrary files and execute remote code or read sensitive information.