Main Features

Checkout our features

Pages

  • List
  • View
  • Add/Copy
  • Edit
  • Delete
  • Update
  • Search
  • Master/Detail-Add/Edit/View
  • Detail Preview

Reports

  • Summary
  • Crosstab
  • Dashboard
  • Drilldown

Charts

  • Bar
  • Column
  • Line
  • Area
  • Doughnut and Pie
  • Mixed
  • Stacked
  • Drilldown

Calendars

  • Month/Week/Day/List Views
  • Multi-Month Year View
  • View/Add/Edit pages
  • Custom Templates
  • Event Popovers
  • Searching

NSSM is a service manager for Windows that allows you to easily install, configure, and manage services. In 2019, a security researcher discovered a vulnerability in NSSM version 224 that could allow an attacker to escalate privileges on a system.

An attacker could exploit this vulnerability by creating a specially crafted configuration file and placing it in a directory that NSSM reads from. When NSSM reads the configuration file, it could execute the attacker's malicious code with elevated privileges.

The vulnerability, tracked as CVE-2019-1253, is related to the way NSSM handles service configuration files. Specifically, the vulnerability occurs when NSSM reads configuration files from a directory that is not properly secured, allowing an attacker to inject malicious configuration data.

You're referring to a paper about a privilege escalation vulnerability in NSSM (Non-Sucking Service Manager) version 224.

Nssm224 Privilege Escalation Updated -

NSSM is a service manager for Windows that allows you to easily install, configure, and manage services. In 2019, a security researcher discovered a vulnerability in NSSM version 224 that could allow an attacker to escalate privileges on a system.

An attacker could exploit this vulnerability by creating a specially crafted configuration file and placing it in a directory that NSSM reads from. When NSSM reads the configuration file, it could execute the attacker's malicious code with elevated privileges.

The vulnerability, tracked as CVE-2019-1253, is related to the way NSSM handles service configuration files. Specifically, the vulnerability occurs when NSSM reads configuration files from a directory that is not properly secured, allowing an attacker to inject malicious configuration data.

You're referring to a paper about a privilege escalation vulnerability in NSSM (Non-Sucking Service Manager) version 224.