Gog

Galaxy

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.01%
  • Veröffentlicht 05.11.2025 00:00:00
  • Zuletzt bearbeitet 09.01.2026 17:54:51

GOG Galaxy 2.0.0.2 suffers from Missing SSL Certificate Validation. An attacker who controls the local network, DNS, or a proxy can perform a man-in-the-middle (MitM) attack to intercept update requests and replace installer or update packages with m...

  • EPSS 0.16%
  • Veröffentlicht 30.04.2024 14:15:10
  • Zuletzt bearbeitet 28.03.2025 20:15:19

An issue exists in GalaxyClientService.exe in GOG Galaxy (Beta) 2.0.67.2 through 2.0.71.2 that could allow authenticated users to overwrite and corrupt critical system files via a combination of an NTFS Junction and an RPC Object Manager symbolic lin...

  • EPSS 0.08%
  • Veröffentlicht 30.04.2024 14:15:10
  • Zuletzt bearbeitet 21.11.2024 08:37:30

A Privilege Escalation issue in the inter-process communication procedure from GOG Galaxy (Beta) 2.0.67.2 through v2.0.71.2 allows authentictaed users to change the DACL of arbitrary system directories to include Everyone full control permissions by ...

Exploit
  • EPSS 0.98%
  • Veröffentlicht 17.08.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 07:04:15

An exploitable local privilege escalation vulnerability exists in GOG Galaxy 2.0.46. Due to insufficient folder permissions, an attacker can hijack the %ProgramData%\GOG.com folder structure and change the GalaxyCommunication service executable to a ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 30.04.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 05:56:50

GalaxyClient version 2.0.28.9 loads unsigned DLLs such as zlib1.dll, libgcc_s_dw2-1.dll and libwinpthread-1.dll from PATH, which allows an attacker to potentially run code locally through unsigned DLL loading.

Exploit
  • EPSS 0.16%
  • Veröffentlicht 21.08.2020 04:15:10
  • Zuletzt bearbeitet 21.11.2024 05:15:01

The client (aka GalaxyClientService.exe) in GOG GALAXY through 2.0.41 (as of 12:58 AM Eastern, 9/26/21) allows local privilege escalation from any authenticated user to SYSTEM by instructing the Windows service to execute arbitrary commands. This occ...

Exploit
  • EPSS 10.73%
  • Veröffentlicht 06.08.2020 16:15:13
  • Zuletzt bearbeitet 21.11.2024 05:37:06

The GalaxyClientService component of GOG Galaxy runs with elevated SYSTEM privileges in a Windows environment. Due to the software shipping with embedded, static RSA private key, an attacker with this key material and local user permissions can effec...

  • EPSS 0.03%
  • Veröffentlicht 14.07.2020 18:15:14
  • Zuletzt bearbeitet 21.11.2024 04:58:42

In GOG Galaxy 1.2.67, there is a service that is vulnerable to weak file/service permissions: GalaxyClientService.exe. An attacker can put malicious code in a Trojan horse GalaxyClientService.exe. After that, the attacker can re-start this service as...

  • EPSS 0.08%
  • Veröffentlicht 05.07.2020 01:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:42

An issue was discovered in GOG Galaxy Client 2.0.17. Local escalation of privileges is possible when a user installs a game or performs a verify/repair operation. The issue exists because of weak file permissions and can be exploited by using opportu...

  • EPSS 0.1%
  • Veröffentlicht 05.07.2020 01:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:41

An issue was discovered in GOG Galaxy Client 2.0.17. Local escalation of privileges is possible when a user starts or uninstalls a game because of weak file permissions and missing file integrity checks.