Thomas Vanhoutte , Vulnerability Researcher

Most of my research and vulnerabilities reported


Disclosures:

IE11 EPM priv esc: http://www.zerodayinitiative.com/advisories/ZDI-15-249/  

(CVE-2015-1739)

IE11 EPM priv esc: http://www.zerodayinitiative.com/advisories/ZDI-15-377/ 

(CVE-2015-1743)

IE11 EPM priv esc: http://www.zerodayinitiative.com/advisories/ZDI-16-275/ 

(CVE-2016-0194)

IE11 EPM priv esc: http://www.zerodayinitiative.com/advisories/ZDI-16-510/

 (CVE-2016-3292) 

Windows installer LPE: https://technet.microsoft.com/library/security/ms16-149

 (CVE-2016-7292)

IE11 EPM priv esc: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0226 

(CVE-2017-0226)

Upcoming:

ZDI-CAN-4461 - CVSS: 3.7 - Microsoft - Microsoft edge sandbox escape

ZDI-CAN-4770 - CVSS: 2.6 - Microsoft - Local privilege escalation

ZDI-CAN-4640 - CVSS 4.7 - Adobe - IE11 EPM sandbox escape

ZDI-CAN-3682 - CVSS: 6.8 - Microsoft - Vulnerability in one of Autodesk's file formats, MS dropped support for these in a default app

ZDI-CAN-3723 - CVSS: 6.8 - Microsoft - Vulnerability in one of Autodesk's file formats, MS dropped support for these in a default app

ZDI-CAN-3791 - CVSS: 6.8 - Autodesk  - Vulnerability in one of Autodesk's file formats, MS dropped support for these in a default app

ZDI-CAN-3758 - CVSS: 6.8 - Autodesk  - Vulnerability in one of Autodesk's file formats, MS dropped support for these in a default app


Commentaires