header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BattlEye 0.9 – ‘BEService’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

McAfee® Safe Connect VPN – Unquoted Service Path Elevation Of Privilege

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Wondershare Dr.Fone 12.0.18 – ‘Wondershare InstallAssist’ Unquoted Service Path

The local user able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Printix Client 1.3.1106.0 – Privilege Escalation

A privilege escalation vulnerability exists in Printix Client version 1.3.1106.0 and earlier. An attacker can exploit this vulnerability to gain elevated privileges on the system. This vulnerability is due to improper validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. Successful exploitation of this vulnerability could result in the attacker gaining elevated privileges on the system.

Audio Conversion Wizard v2.01 – Buffer Overflow

Audio Conversion Wizard v2.01 is vulnerable to a buffer overflow vulnerability. An attacker can exploit this vulnerability by running a python code to generate a malicious file, copying the content of the malicious file to the clipboard, opening Audio Conversion Wizard and pasting the content of the malicious file into the 'Enter Code' field, and clicking 'OK'. This will lead to arbitrary code execution.

Cobian Backup 0.9 – Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Webmin 1.984 – Remote Code Execution (Authenticated)

This exploit allows an authenticated user to execute arbitrary code on the target system. The exploit is based on the vulnerability CVE-2022-0824, which is a remote code execution vulnerability in Webmin versions <= 1.984. The exploit works by uploading a malicious Perl script to the target system and then executing it. The malicious script will then open a reverse shell to the attacker's machine, allowing the attacker to execute arbitrary code on the target system.

Malwarebytes 4.5 – Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Cloudflare WARP 1.4 – Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Private Internet Access 3.3 – ‘pia-service’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Recent Exploits: