Cyril Vallicari

12 exploits Active since Jul 2022
CVE-2016-15003 EXPLOITDB MEDIUM text WRITEUP
FileZilla Client 3.17.0.0 - Unquoted Search Path
A vulnerability has been found in FileZilla Client 3.17.0.0 and classified as problematic. This vulnerability affects unknown code of the file C:\Program Files\FileZilla FTP Client\uninstall.exe of the component Installer. The manipulation leads to unquoted search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS 6.3
EIP-2026-117857 EXPLOITDB text WRITEUP
Riot Games League of Legends - Insecure File Permissions Privilege Escalation
EIP-2026-117653 EXPLOITDB text WRITEUP
Multiples Nexon Games - Unquoted Path Privilege Escalation
EIP-2026-116830 EXPLOITDB text WRITEUP
ATKGFNEXSrv ATKGFNEX 1.0.11.1 - Unquoted Service Path Privilege Escalation
EIP-2026-116815 EXPLOITDB text WRITEUP
ASLDRService ATK Hotkey 1.0.69.0 - Unquoted Service Path Privilege Escalation
EIP-2026-117269 EXPLOITDB text WRITEUP
Hex : Shard of Fate 1.0.1.026 - Unquoted Path Privilege Escalation
EIP-2026-117322 EXPLOITDB text WRITEUP
InsOnSrv Asus InstantOn 2.3.1.1 - Unquoted Service Path Privilege Escalation
EIP-2026-116729 EXPLOITDB text WRITEUP
AdobeUpdateService 3.6.0.248 - Unquoted Service Path Privilege Escalation
EIP-2026-111762 EXPLOITDB text WORKING POC
Revive Ad Server 4.0.1 - Cross-Site Scripting / Cross-Site Request Forgery
EIP-2026-111785 EXPLOITDB text WORKING POC
Robert 0.5 - Multiple Vulnerabilities
EIP-2026-107441 EXPLOITDB html WORKING POC
Gnew 2018.1 - Cross-Site Request Forgery
EIP-2026-107166 EXPLOITDB text WORKING POC
FlySpray 1.0-rc4 - Cross-Site Scripting / Cross-Site Request Forgery