Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15511

EPSS 0.53% · P68
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-15511

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An exploitable local privilege escalation vulnerability exists in the GalaxyClientService installed by GOG Galaxy. Due to Improper Access Control, an attacker can send unauthenticated local TCP packets to the service to gain SYSTEM privileges in Windows system where GOG Galaxy software is installed. All GOG Galaxy versions before 1.2.60 and all corresponding versions of GOG Galaxy 2.0 Beta are affected.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
GOG Galaxy 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GOG Galaxy是波兰GOG公司的一款游戏客户端程序。该程序用于安装、启动和更新游戏。 GOG Galaxy 1.2.60之前版本和2.0.0版本至2.0.8版本中所安装的GalaxyClientService存在提权漏洞,该漏洞源于不正确的访问控制。攻击者可通过发送未经身份验证的本地TCP数据包利用该漏洞在Windows系统中获取SYSTEM权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-15511

#POC DescriptionSource LinkShenlong Link
1GOG Galaxy Exploit for CVE-2019-15511https://github.com/adenkiewicz/CVE-2019-15511POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-15511

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-11-21 · 49 CVEs total

CVE-2018-8879ASUS RT-AC66U 缓冲区错误漏洞
CVE-2014-1938python-rply 后置链接漏洞
CVE-2014-1936Bell Labs rc 输入验证错误漏洞
CVE-2013-7171Slackware和Slackware LLVM 输入验证错误漏洞
CVE-2019-19037Linux kernel 代码问题漏洞
CVE-2019-19036Linux kernel 代码问题漏洞
CVE-2019-19039Linux kernel 日志日志信息泄露漏洞
CVE-2019-19221libarchive 缓冲区错误漏洞
CVE-2013-7172Slackware 输入验证错误漏洞
CVE-2019-16340Belkin Linksys Velop 安全漏洞
CVE-2019-17421ZOHO ManageEngine OpManager和ZOHO ManageEngine Firewall Analyzer 安全漏洞
CVE-2019-5086xcftools 输入验证错误漏洞
CVE-2019-5087xcftools 输入验证错误漏洞
CVE-2019-10767ioBroker.js-controller 路径遍历漏洞
CVE-2019-5071Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route 操作系统命令注入漏洞
CVE-2019-5072Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route 操作系统命令注入漏洞
CVE-2019-19191Shibboleth Service Provider 后置链接漏洞
CVE-2019-16405Centreon Web 输入验证错误漏洞
CVE-2019-16406Centreon Web 安全漏洞
CVE-2019-18886Sensio Labs Symfony 信息泄露漏洞

Showing top 20 of 49 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-15511

No comments yet


Leave a comment