Unquoted service paths in Logitech Solar Keyboard Service v1.10.3.0 have an unquoted service path.
Unquoted service paths in Advanced System Care Service 13 v13.0.0.157 have an unquoted service path. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.
The IDT PC Audio version 1.0.6425.0 is vulnerable to an unquoted service path vulnerability. The 'STacSV' service has an unquoted service path, which could allow an attacker to escalate privileges and execute arbitrary code.
The remote device is affected by multiple vulnerabilities. An authorization bypass vulnerability exists in Citrix ADC and NetScaler Gateway devices. An unauthenticated remote attacker with access to the NSIP/management interface can exploit this to bypass authorization (CVE-2020-8193). And Information disclosure (CVE-2020-8195 and CVE-2020-8196) - but at this time unclear which.
The exploit allows an attacker to execute arbitrary code by exploiting a stack buffer overflow vulnerability in Nidesoft 3GP Video Converter version 2.6.18. By providing a specially crafted license code, an attacker can overwrite the stack and execute malicious code.
The username and password parameters can be forged to force the password change of admin user account.
The iDeskService version 3.0.2.1 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to escalate privileges by placing a malicious executable in a directory higher in the system's PATH environment variable.
A successful attempt would cause the local user to be able to insert their code in the system root path undetected by the OS or other security applications and elevate his privileges after reboot.
A successful attempt would cause the local user to be able to insert their code in the system root path undetected by the OS or other security applications and elevate his privileges after reboot.
A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.