header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Advanced System Care Service 13 – ‘AdvancedSystemCareService13’ Unquoted Service Path

Unquoted service paths in Advanced System Care Service 13 v13.0.0.157 have an unquoted service path. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Citrix ADC NetScaler – Local File Inclusion (Metasploit)

The remote device is affected by multiple vulnerabilities. An authorization bypass vulnerability exists in Citrix ADC and NetScaler Gateway devices. An unauthenticated remote attacker with access to the NSIP/management interface can exploit this to bypass authorization (CVE-2020-8193). And Information disclosure (CVE-2020-8195 and CVE-2020-8196) - but at this time unclear which.

Nidesoft 3GP Video Converter 2.6.18 – Local Stack Buffer Overflow

The exploit allows an attacker to execute arbitrary code by exploiting a stack buffer overflow vulnerability in Nidesoft 3GP Video Converter version 2.6.18. By providing a specially crafted license code, an attacker can overwrite the stack and execute malicious code.

iDeskService 3.0.2.1 – ‘iDeskService’ Unquoted Service Path

The iDeskService version 3.0.2.1 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to escalate privileges by placing a malicious executable in a directory higher in the system's PATH environment variable.

HP WMI Service 1.4.8.0 – ‘HPWMISVC.exe’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Recent Exploits: