#Windows,local,
-
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
-
_GCafé 3.0 - 'gbClienService' Unquoted Service Path
-
Alps HID Monitor Service 8.1.0.10 - 'ApHidMonitorService' Unquote Service Path
-
Acronis True Image OEM 19.0.5128 - 'afcdpsrv' Unquoted Service Path
-
Wondershare Application Framework Service 2.4.3.231 - 'WsAppService' Unquote Service Path
-
Alps Pointing-device Controller 8.1202.1711.04 - 'ApHidMonitorService' Unquoted Service Path
-
Control Center PRO 6.2.9 - Local Stack Based Buffer Overflow (SEH)
-
RTK IIS Codec Service 6.4.10041.133 - 'RtkI2SCodec' Unquote Service Path
-
Wondershare Application Framework Service - "WsAppService" Unquote Service Path
-
ScanGuard Antivirus 2020 - Insecure Folder Permissions
-
oXygen XML Editor 21.1.1 - XML External Entity Injection
-
Shrew Soft VPN Client 2.2.2 - 'iked' Unquoted Service Path
-
Emerson PAC Machine Edition 9.70 Build 8595 - 'FxControlRuntime' Unquoted Service Path
-
ASUS HM Com Service 1.00.31 - 'asHMComSvc' Unquoted Service Path
-
MobileGo 8.5.0 - Insecure File Permissions
-
NCP_Secure_Entry_Client 9.2 - Unquoted Service Paths
-
BartVPN 1.2.2 - 'BartVPNService' Unquoted Service Path
-
Studio 5000 Logix Designer 30.01.00 - 'FactoryTalk Activation Service' Unquoted Service Path
-
Microsoft Windows - Escalate UAC Protection Bypass (Via dot net profiler) (Metasploit)
-
Microsoft Windows - Escalate UAC Protection Bypass (Via Shell Open Registry Key) (Metasploit)