header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Realtek High Definition Audio Driver – Unquoted Service Path Privilege Escalation

The Realtek High Definition Audio Driver installs a service with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.

PDF Complete Corporate Edition – Unquoted Service Path Privilege Escalation

PDF Complete Corporate Edition installs a service with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.

Lenovo ThinkVantage Communications Utility – Unquoted Service Path Privilege Escalation

The Lenovo ThinkVantage Communications Utility installs 2 services with unquoted service paths. This enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of either service. Rebooting the system or restarting either service will run the malicious executable with elevated privileges.

Intel(R) PROSet/Wireless WiFi Software – Unquoted Service Path Privilege Escalation

The Intel(R) PROSet/Wireless WiFi Software installs 2 services with unquoted service paths, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of either service. Rebooting the system or restarting either service will run the malicious executable with elevated privileges.

Intel(R) PROSet/Wireless for Bluetooth(R) + High Speed – Unquoted Service Path Privilege Escalation

The Intel(R) PROSet/Wireless for Bluetooth(R) + High Speed service is installed with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.

Vembu StoreGrid – Unquoted Service Path Privilege Escalation

StoreGrid is a re-brandable backup solution, which can install 2 services with unquoted service paths. This enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of either service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges. This was tested on version 4.0, but other versions may be affected as well.

Lenovo Slim USB Keyboard – Unquoted Service Path Privilege Escalation

The Lenovo Slim USB Keyboard service is installed with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.

Lenovo RapidBoot HDD Accelerator – Unquoted Service Path Privilege Escalation

The Lenovo RapidBoot HDD Accelerator service is installed with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.

Intel(R) Management Engine Components – Unquoted Service Path Privilege Escalation

The Intel(R) Management and Security Application Local Management Service (LMS) is installed with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.

HikVision Security Systems activex Remote Overflow

The exploit is a part of EAST Framework and is designed to exploit a remote overflow vulnerability in HikVision Security Systems ActiveX. The vulnerability is a 0-day and affects Windows XP and 7. The exploit is written in Python and uses a connectback port of 8089.

Recent Exploits: