![]() The Exploit Database is maintained by Offensive Security, an information security training company Protection Service\SonicWallClientProtectionService.exe Auto Sonicwall_client_protection_svc C:\Program Files\SonicWall\Client "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """ Protection Service\SonicWallClientProtectionService.exe Ĭ:\>wmic service get name,displayname,pathname,startmode |findstr /i NOME_PERCORSO_BINARIO : C:\Program Files\SonicWall\Client NOME_SERVIZIO: sonicwall_client_protection_svc This vulnerability impact SonicWall NetExtender Windows client versionĬ:\>sc qc sonicwall_client_protection_svc Vulnerability, this allows a local attacker to gain elevated privileges SonicWall NetExtender Windows client vulnerable to unquoted service path Title: SonicWall NetExtender windows client unquoted service path ![]() # Exploit Title: SonicWall NetExtender 10.2.0.300 - Unquoted Service Path
0 Comments
Leave a Reply. |