TOUHAMI Kasbaoui

4 exploits Active since Jan 2026
CVE-2020-36990 EXPLOITDB HIGH text WRITEUP
Input Director 1.4.3 - Privilege Escalation
Input Director 1.4.3 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted path during system startup or reboot to inject and run malicious executables with LocalSystem permissions.
CVSS 7.8
EIP-2026-117963 EXPLOITDB text WORKING POC
Stonesoft VPN Client 6.2.0 / 6.8.0 - Local Privilege Escalation
EIP-2026-116629 EXPLOITDB text WRITEUP
XWorm Trojan 2.1 - Null Pointer Derefernce DoS
EIP-2026-103456 EXPLOITDB text WORKING POC
Elasticsearch - StackOverflow DoS