3 results (0.001 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

02 Feb 2024 — A vulnerability classified as critical was found in iTop VPN up to 4.0.0.1. Affected by this vulnerability is an unknown functionality in the library ITopVpnCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The identifier VDB-252685 was assigned to this vulnerability. • https://vuldb.com/?ctiid.252685 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

06 Jul 2022 — The iTopVPNmini.exe component of iTop VPN 3.2 will try to connect to datastate_iTopVPN_Pipe_Server on a loop. An attacker that opened a named pipe with the same name can use it to gain the token of another user by listening for connections and abusing ImpersonateNamedPipeClient(). El componente iTopVPNmini.exe de iTop VPN versión 3.2, intentará conectarse a datastate_iTopVPN_Pipe_Server en un bucle. Un atacante que abriera una tubería con nombre con el mismo nombre puede usarla para obtener el token de otro... • http://iobit.com •

CVSS: 6.6EPSS: 0%CPEs: 6EXPL: 0

06 Jul 2022 — IOBit Advanced System Care 15, iTop Screen Recorder 2.1, iTop VPN 3.2, Driver Booster 9, and iTop Screenshot sends HTTP requests in their update procedure in order to download a config file. After downloading the config file, the products will parse the HTTP location of the update from the file and will try to install the update automatically with ADMIN privileges. An attacker Intercepting this communication can supply the product a fake config file with malicious locations for the updates thus gaining a re... • http://advanced.com • CWE-494: Download of Code Without Integrity Check •