Conversation

Following our talk about exploiting security software for privilege escalation, we're excited to kick off a new blog series! 🎊
Check out our first blog post on our journey to 💥 exploit five reputable security products to gain privileges via COM hijacking: https://neodyme.io/blog/com_hijacking_1/

1
6
0
@neodyme Thanks for the mention! Do you have a list of affected vendors (and CVE's) that I could match with my records?
1
0
0

@buherator @neodyme Sure, the following 5 vulnerabilities were the result of the research:
- CVE-2024-24912 - CheckPoint Harmony
- CVE-2023-6154 - Bitdefender Total Security
- CVE-2023-7241 - Webroot Endpoint Protect
- CVE-2024-36302/ZDI-CAN-22039 - Trend Micro Apex One
- CVE-2024-6510 - AVG Internet Security

1
1
1