Mohammed Alshehri

19 exploits Active since Jun 2021
CVE-2021-43463 EXPLOITDB HIGH text WRITEUP
Ext2Fsd 0.68 - Buffer Overflow
An Unquoted Service Path vulnerability exists in Ext2Fsd v0.68 via a specially crafted file in the Ext2Srv Service executable service path.
CVSS 7.8
CVE-2021-43462 EXPLOITDB MEDIUM text WORKING POC
Rumble Mail Server 0.51.3135 - XSS
A Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the username parameter.
CVSS 5.4
CVE-2021-43461 EXPLOITDB MEDIUM text WORKING POC
Rumble Mail Server 0.51.3135 - XSS
Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the servername parameter.
CVSS 5.4
CVE-2021-43460 EXPLOITDB HIGH text WRITEUP
System Explorer 7.0.0 - Privilege Escalation
An Unquoted Service Path vulnerability exists in System Explorer 7.0.0 via via a specially crafted file in the SystemExplorerHelpService service executable path.
CVSS 7.8
CVE-2021-43459 EXPLOITDB MEDIUM text WORKING POC
Rumble Mail Server <0.51.3135 - XSS
A Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the (1) domain and (2) path parameters.
CVSS 5.4
CVE-2021-43458 EXPLOITDB HIGH text WRITEUP
Vembu BDR 4.2.0.1 - Unquoted Service Path
An Unquoted Service Path vulnerability exits in Vembu BDR 4.2.0.1 via a specially crafted file in the (1) hsflowd, (2) VembuBDR360Agent, or (3) VembuOffice365Agent service paths.
CVSS 7.8
CVE-2021-43457 EXPLOITDB HIGH text WRITEUP
bVPN 2.5.1 - Path Traversal
An Unquoted Service Path vulnerability exists in bVPN 2.5.1 via a specially crafted file in the waselvpnserv service path.
CVSS 7.8
CVE-2021-43456 EXPLOITDB HIGH text WRITEUP
Rumble Mail Server 0.51.3135 - Buffer Overflow
An Unquoted Service Path vulnerablility exists in Rumble Mail Server 0.51.3135 via via a specially crafted file in the RumbleService executable service path.
CVSS 7.8
CVE-2021-43455 EXPLOITDB HIGH text WRITEUP
FreeLAN 2.2 - Buffer Overflow
An Unquoted Service Path vulnerability exists in FreeLAN 2.2 via a specially crafted file in the FreeLAN Service path.
CVSS 7.8
CVE-2021-43454 EXPLOITDB HIGH text WRITEUP
AnyTXT Searcher <1.2.394 - Buffer Overflow
An Unquoted Service Path vulnerability exists in AnyTXT Searcher 1.2.394 via a specially crafted file in the ATService path. .
CVSS 7.8
CVE-2021-47883 EXPLOITDB HIGH text WRITEUP
Sandboxie Plus 0.7.2 - Privilege Escalation
Sandboxie Plus 0.7.2 contains an unquoted service path vulnerability in the SbieSvc service that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with LocalSystem permissions during service startup.
CVSS 7.8
CVE-2021-47882 EXPLOITDB HIGH text WRITEUP
FreeLAN 2.2 - RCE
FreeLAN 2.2 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with elevated LocalSystem privileges during service startup.
CVSS 7.8
CVE-2021-47874 EXPLOITDB HIGH text WRITEUP
VFS for Git 1.0.21014.1 - Privilege Escalation
VFS for Git 1.0.21014.1 contains an unquoted service path vulnerability in the GVFS.Service Windows service that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with LocalSystem privileges during service startup or system reboot.
CVSS 7.8
CVE-2020-36987 EXPLOITDB HIGH text WRITEUP
Program Access Controller 1.2.0.0 - Privilege Escalation
Program Access Controller 1.2.0.0 contains an unquoted service path vulnerability in PACService.exe that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted path during system startup or reboot to inject and run malicious executables with LocalSystem permissions.
CVSS 7.8
CVE-2020-36985 EXPLOITDB HIGH text WRITEUP
IP Watcher 3.0.0.30 - Code Injection
IP Watcher 3.0.0.30 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with elevated LocalSystem privileges during service startup.
CVSS 7.8
CVE-2020-36938 EXPLOITDB HIGH text WRITEUP
WinAVR <20100110 - Privilege Escalation
WinAVR version 20100110 contains an insecure permissions vulnerability that allows authenticated users to modify system files and executables. Attackers can leverage the overly permissive access controls to potentially modify critical DLLs and executable files in the WinAVR installation directory.
CVSS 8.8
CVE-2020-36879 EXPLOITDB HIGH text WRITEUP
Flexsense DiskBoss 11.7.28 - Privilege Escalation
Flexsense DiskBoss 11.7.28 allows unauthenticated attackers to elevate their privileges using any of its services, enabling remote code execution during startup or reboot with escalated privileges. Attackers can exploit the unquoted service path vulnerability by specifying a malicious service name in the 'sc qc' command, allowing them to execute arbitrary system commands.
EIP-2026-117795 EXPLOITDB text WRITEUP
Privacy Drive v3.17.0 - 'pdsvc.exe' Unquoted Service Path
CVE-2021-23017 EXPLOITDB HIGH python WORKING POC
nginx - Memory Corruption
A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVSS 7.7