Skip to content

Instantly share code, notes, and snippets.

@sasqwatch
Forked from v-p-b/AV2019.txt
Created November 25, 2019 19:04
Show Gist options
  • Save sasqwatch/e14bc1739aead9fb8129d244be6a6ade to your computer and use it in GitHub Desktop.
Save sasqwatch/e14bc1739aead9fb8129d244be6a6ade to your computer and use it in GitHub Desktop.
https://seclists.org/fulldisclosure/2019/Aug/1
https://medium.com/tenable-techblog/comodo-from-sandbox-to-system-cve-2019-3969-b6a34cc85e67
https://blog.silentsignal.eu/2019/06/24/self-defenseless-exploring-kasperskys-local-attack-surface/
https://safebreach.com/Post/BitDefender-Antivirus-Free-2020-Privilege-Escalation-to-SYSTEM
https://safebreach.com/Post/Trend-Micro-Password-Manager-Privilege-Escalation-to-SYSTEM
https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM
http://rce4fun.blogspot.com/2019/08/comodo-antivirus-sandbox-race-condition.html
https://medium.com/bugbountywriteup/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968
https://posts.specterops.io/cve-2019-12757-local-privilege-escalation-in-symantec-endpoint-protection-1f7fd5c859c6
https://nafiez.github.io/security/poc/2019/11/22/POC-conference-present.html
https://seclists.org/fulldisclosure/2019/Nov/21
https://0x00sec.org/t/anti-virus-exploitation-local-privilege-escalation-in-k7-security-cve-2019-16897/17655
https://github.com/NtRaiseHardError/Antimalware-Research/tree/master/Total%20Defense
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment