header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Windows AppXsvc Deployment Extension – Privilege Escalation

This exploit abuses a vulnerability in the AppX Deployment Service (AppXSvc) in Microsoft Windows. By exploiting this vulnerability, an attacker can overwrite or create files as SYSTEM, leading to privilege escalation. The exploit can be carried out in two ways: arbitrary file creation and file overwrite.

Easy-Hide-IP 5.0.0.3 – ‘EasyRedirect’ Unquoted Service Path

The Easy-Hide-IP 5.0.0.3 software on Windows 7 Professional Service Pack 1 is vulnerable to an unquoted service path vulnerability. This vulnerability could allow an attacker to escalate privileges by placing a malicious executable in the search path of the service.

InTouch Machine Edition 8.1 SP1 – ‘Atributos’ Denial of Service (PoC)

The exploit allows an attacker to cause a denial of service (DoS) on the InTouch Machine Edition 8.1 SP1 software. By sending a specially crafted input, the attacker can trigger a buffer overflow, causing the software to crash and become unresponsive.

Use-after-free issue in JScript via Internet Explorer

There is a use-after-free issue in JScript (triggerable via Internet Explorer) where the members of the 'arguments' object aren't tracked by the garbage collector during the 'toJSON' callback. Thus, during the 'toJSON' callback, it is possible to assign a variable to the 'arguments' object, have it garbage-collected (as long as it is not referenced anywhere else) and still access it later. Note that, like in some previously reported JScript issues, this is a use-after-free on a JScript variable (VAR structure), so in order to trigger a crash, the entire block of variables must be freed.

LiteManager 4.5.0 – Insecure File Permissions

The LiteManager 4.5.0 software has insecure file permissions that allow an attacker to escalate privileges on the system. By replacing the legitimate ROMFUSClient.exe file with a malicious one, an attacker can execute arbitrary code with elevated privileges. This exploit code adds a new user, adds the user to the Administrators group, and grants full access to the C drive. When a more privileged user connects and uses the ROMFUSClient IDE, the privilege escalation is successful.

ProShow Producer 9.0.3797 – (‘ScsiAccess’) Unquoted Service Path

The ProShow Producer 9.0.3797 software has an unquoted service path vulnerability in the 'ScsiAccess' service. This vulnerability allows an attacker with local access to the system to escalate privileges and execute arbitrary code.

Recent Exploits: