header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ProtonVPN 1.26.0 – Unquoted Service Path

The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. If a malicious individual has access to the file system, it is possible to elevate privileges by inserting such a file as "C:Program.exe" to be run by a privileged program making use of WinExec.

ICT Protege GX/WX 2.08 – Client-Side SHA1 Password Hash Disclosure

The application is vulnerable to improper access control that allows an authenticated operator to disclose SHA1 password hashes (client-side) of other users/operators.

Sandboxie-Plus 5.50.2 – ‘Service SbieSvc’ Unquoted Service Path

The 'Service SbieSvc' in Sandboxie-Plus version 5.50.2 has an unquoted service path vulnerability. This allows an attacker with local access to escalate privileges by placing a malicious executable with the same name in a higher-priority directory.

Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)

This is a proof-of-concept exploit for the Dirty Pipe vulnerability (CVE-2022-0847) in the Linux Kernel. The vulnerability is caused by an uninitialized 'pipe_buffer.flags' variable, allowing an attacker to overwrite file contents in the page cache even if the file is not permitted to be written, immutable, or on a read-only mount. The exploit requires Linux 5.8 or later and has certain limitations, such as the offset not being on a page boundary and the write not crossing a page boundary.

Foxit PDF Reader 11.0 – Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Recent Exploits: