
15 changes to exploits/shellcodes sudo 1.8.28 - Security Bypass sudo 1.2.27 - Security Bypass Lavasoft 2.3.4.7 - 'LavasoftTcpService' Unquoted Service Path Zilab Remote Console Server 3.2.9 - 'zrcs' Unquoted Service Path X.Org X Server 1.20.4 - Local Stack Overflow LiteManager 4.5.0 - 'romservice' Unquoted Serive Path Solaris xscreensaver 11.4 - Privilege Escalation Mikogo 5.2.2.150317 - 'Mikogo-Service' Unquoted Serive Path Whatsapp 2.19.216 - Remote Code Execution Accounts Accounting 7.02 - Persistent Cross-Site Scripting CyberArk Password Vault 10.6 - Authentication Bypass Linux/x86 - Add User to /etc/passwd Shellcode (59 bytes) Linux/x86 - adduser (User) to /etc/passwd Shellcode (74 bytes) Linux/x86 - execve /bin/sh Shellcode (25 bytes) Linux/x86 - Reverse Shell NULL free 127.0.0.1:4444 Shellcode (91 bytes)
24 lines
No EOL
949 B
Text
24 lines
No EOL
949 B
Text
# Lavasoft 2.3.4.7 - 'LavasoftTcpService' Unquoted Service Path
|
|
# Author: Luis MedinaL
|
|
# Date: 2019-10-15
|
|
# Vendor Homepage: https://www.adaware.com/
|
|
# Software Link : https://www.adaware.com/antivirus
|
|
# Version : 2.3.4.7
|
|
# Tested on: Microsoft Windows 10 Pro x64 ESP
|
|
|
|
# Description:
|
|
# Lavasoft 2.3.4.7 installs LavasoftTcpService as a service with an unquoted service path
|
|
|
|
C:\Users\Luis ML>sc qc LavasoftTcpService
|
|
[SC] QueryServiceConfig CORRECTO
|
|
|
|
NOMBRE_SERVICIO: LavasoftTcpService
|
|
TIPO : 10 WIN32_OWN_PROCESS
|
|
TIPO_INICIO : 2 AUTO_START
|
|
CONTROL_ERROR : 1 NORMAL
|
|
NOMBRE_RUTA_BINARIO: C:\Program Files (x86)\Lavasoft\Web Companion\TcpService\2.3.4.7\LavasoftTcpService.exe
|
|
GRUPO_ORDEN_CARGA :
|
|
ETIQUETA : 0
|
|
NOMBRE_MOSTRAR : LavasoftTcpService
|
|
DEPENDENCIAS : RPCSS
|
|
NOMBRE_INICIO_SERVICIO: LocalSystem |