Show filters
95 Total Results
Displaying 71-80 of 95
Sort by:
Attacker Value
Unknown
CVE-2020-7352
Disclosure Date: April 28, 2020 (last updated February 21, 2025)
The GalaxyClientService component of GOG Galaxy runs with elevated SYSTEM privileges in a Windows environment. Due to the software shipping with embedded, static RSA private key, an attacker with this key material and local user permissions can effectively send any operating system command to the service for execution in this elevated context. The service listens for such commands on a locally-bound network port, localhost:9978. A Metasploit module has been published which exploits this vulnerability. This issue affects the 2.0.x branch of the software (2.0.12 and earlier) as well as the 1.2.x branch (1.2.64 and earlier). A fix was issued for the 2.0.x branch of the affected software.
0
Attacker Value
Unknown
CVE-2020-9329
Disclosure Date: February 21, 2020 (last updated February 21, 2025)
Gogs through 0.11.91 allows attackers to violate the admin-specified repo-creation policy due to an internal/db/repo.go race condition.
0
Attacker Value
Unknown
CVE-2019-15511
Disclosure Date: December 06, 2019 (last updated November 27, 2024)
An exploitable local privilege escalation vulnerability exists in the GalaxyClientService installed by GOG Galaxy. Due to Improper Access Control, an attacker can send unauthenticated local TCP packets to the service to gain SYSTEM privileges in Windows system where GOG Galaxy software is installed. All GOG Galaxy versions before 1.2.60 and all corresponding versions of GOG Galaxy 2.0 Beta are affected.
0
Attacker Value
Unknown
CVE-2019-14544
Disclosure Date: August 02, 2019 (last updated November 27, 2024)
routes/api/v1/api.go in Gogs 0.11.86 lacks permission checks for routes: deploy keys, collaborators, and hooks.
0
Attacker Value
Unknown
CVE-2018-4048
Disclosure Date: May 30, 2019 (last updated November 27, 2024)
An exploitable local privilege elevation vulnerability exists in the file system permissions of the `Temp` directory in GOG Galaxy 1.2.48.36 (Windows 64-bit Installer). An attacker can overwrite executables of the Desktop Galaxy Updater to exploit this vulnerability and execute arbitrary code with SYSTEM privileges.
0
Attacker Value
Unknown
CVE-2018-4051
Disclosure Date: April 02, 2019 (last updated November 27, 2024)
An exploitable local privilege escalation vulnerability exists in the privileged helper tool of GOG Galaxy's Games, version 1.2.47 for macOS. An attacker can globally create directories and subdirectories on the root file system, as well as change the permissions of existing directories.
0
Attacker Value
Unknown
CVE-2018-4053
Disclosure Date: April 02, 2019 (last updated November 27, 2024)
An exploitable local denial-of-service vulnerability exists in the privileged helper tool of GOG Galaxy's Games, version 1.2.47 for macOS. An attacker can send malicious data to the root-listening service, causing the application to terminate and become unavailable.
0
Attacker Value
Unknown
CVE-2018-3974
Disclosure Date: April 02, 2019 (last updated November 27, 2024)
An exploitable local privilege elevation vulnerability exists in the file system permissions of GOG Galaxy's install directory. An attacker can overwrite an executable that is launched as a system service on boot by default to exploit this vulnerability and execute arbitrary code with system privileges.
0
Attacker Value
Unknown
CVE-2018-4049
Disclosure Date: April 02, 2019 (last updated November 27, 2024)
An exploitable local privilege elevation vulnerability exists in the file system permissions of GOG Galaxy's “Games” directory, version 1.2.48.36 (Windows 64-bit Installer). An attacker can overwrite executables of installed games to exploit this vulnerability and execute arbitrary code with elevated privileges.
0
Attacker Value
Unknown
CVE-2018-4052
Disclosure Date: April 02, 2019 (last updated November 27, 2024)
An exploitable local information leak vulnerability exists in the privileged helper tool of GOG Galaxy's Games, version 1.2.47 for macOS. An attacker can pass a PID and receive information running on it that would usually only be accessible to the root user.
0