header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Magic Mouse 2 utilities 2.20 – ‘magicmouse2service’ Unquoted Service Path

A vulnerability exists in Magic Mouse 2 utilities 2.20, where the 'magicmouse2service' service is installed with an unquoted service path. This could allow an authenticated local attacker to gain elevated privileges on the system.

Realtek Audio Service 1.0.0.55 – ‘RtkAudioService64.exe’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Realtek Andrea RT Filters 1.0.64.10 – ‘AERTSr64.EXE’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

DigitalPersona 4.5.0.2213 – ‘DpHostW’ Unquoted Service Path

DigitalPersona Pro 4.5.0.2213 is vulnerable to an Unquoted Service Path vulnerability. This vulnerability allows an attacker to gain elevated privileges on the system by exploiting the unquoted service path of the DpHostW.exe service.

Genexus Protection Server 9.6.4.2 – ‘protsrvservice’ Unquoted Service Path

Genexus Protection Server 9.6.4.2 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to gain elevated privileges on the system by exploiting the service path of the 'protsrvservice' service. The service path is not properly quoted, allowing an attacker to inject malicious code into the service path.

IPTInstaller 4.0.9 – ‘PassThru Service’ Unquoted Service Path

An unquoted service path vulnerability exists in IPTInstaller 4.0.9, which could allow an authenticated local attacker to gain elevated privileges on the system. The vulnerability is due to the application not properly quoting the path to the executable of the 'PassThru Service'. An attacker can exploit this vulnerability by placing a malicious executable in the same folder as the vulnerable service and then start the service. This will result in the malicious executable being executed with SYSTEM privileges.

SuiteCRM 7.11.15 – ‘last_name’ Remote Code Execution (Authenticated)

A vulnerability in SuiteCRM 7.11.15 and below allows an authenticated user to execute arbitrary code. This is due to the lack of input validation on the 'last_name' parameter when creating a new user. An attacker can craft a malicious payload and inject it into the 'last_name' parameter, which will be written to a log file in the web root. The attacker can then trigger the log file to execute the malicious payload.

BlogEngine 3.3.8 – ‘Content’ Stored XSS

BlogEngine 3.3.8 is vulnerable to Stored Cross-Site Scripting (XSS) in the 'Content' parameter of the 'api/posts' POST request. An attacker can inject malicious JavaScript code into the 'Content' parameter value, which will be executed when the post is viewed. This can be used to steal user session cookies, hijack user accounts, redirect users to malicious websites, etc.

Recent Exploits: