Exceed is prone to a vulnerability that can allow a local attacker to bypass certain access restrictions and edit various configuration settings. The issue occurs as an attacker can bypass restrictions on 'xconfig.exe' program. A successful attack may allow an attacker to modify configuration settings that can lead to further attacks against the application or the computer. This issue presents itself in the 'xconfig' application supplied with Exceed 9.0.0.
Exceed is prone to a vulnerability that can allow a local attacker to bypass certain access restrictions and edit various configuration settings. The issue occurs as an attacker can bypass restrictions on 'xconfig.exe' program. A successful attack may allow an attacker to modify configuration settings that can lead to further attacks against the application or the computer. This issue presents itself in the 'xconfig' application supplied with Exceed 9.0.0.