( Hunger | 2018. 08. 30., cs – 13:41 )

Well, a hibák jórészét a ZDI-n keresztül jelentette:


IE11 EPM priv esc: http://www.zerodayinitiative.com/advisories/ZDI-15-249/
(CVE-2015-1739)

IE11 EPM priv esc: http://www.zerodayinitiative.com/advisories/ZDI-15-377/ 
(CVE-2015-1743)

IE11 EPM priv esc: http://www.zerodayinitiative.com/advisories/ZDI-16-275/ 
(CVE-2016-0194)

IE11 EPM priv esc: http://www.zerodayinitiative.com/advisories/ZDI-16-510/
(CVE-2016-3292) 

Windows installer LPE: https://technet.microsoft.com/library/security/ms16-149
(CVE-2016-7292)

IE11 EPM priv esc: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0226 
(CVE-2017-0226)


ZDI-CAN-4461 - CVSS: 3.7 - Microsoft - Microsoft edge sandbox escape: https://www.zerodayinitiative.com/advisories/ZDI-17-637/

ZDI-CAN-4770 - CVSS: 2.6 - Microsoft - Local privilege escalation: https://www.zerodayinitiative.com/advisories/ZDI-17-639/

ZDI-CAN-4640 - CVSS 4.7 - Adobe - IE11 EPM sandbox escape: https://www.zerodayinitiative.com/advisories/ZDI-17-323/

ZDI-CAN-3682 - CVSS: 6.8 - Microsoft - Vulnerability in one of Autodesk's file formats, MS dropped support for these in a default app

ZDI-CAN-3723 - CVSS: 6.8 - Microsoft - Vulnerability in one of Autodesk's file formats, MS dropped support for these in a default app

ZDI-CAN-3791 - CVSS: 6.8 - Autodesk  - Vulnerability in one of Autodesk's file formats, MS dropped support for these in a default app

ZDI-CAN-3758 - CVSS: 6.8 - Autodesk  - Vulnerability in one of Autodesk's file formats, MS dropped support for these in a default app

http://thomas-van.blogspot.com/2017/10/thomas-vanhoutte-vulnerability.h…