{"uuid": "9d9cd87c-f65e-46af-8943-faee2616c5a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-1685", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2600", "content": "#Red_Team_Tactics\n1. From N-day exploit to Kerberos EoP in Linux environments\nhttps://www.blackarrow.net/from-n-day-exploit-to-kerberos-eop-in-linux-environments\n// This article describes the analysis and exploiting of a vulnerability (CVE-2018-1685) that could allow an attacker to read arbitrary files, but of which no public details are known\n2. Unauthorized Access to OData Entities\nhttps://medium.com/bugbountywriteup/unauthorized-access-to-odata-entities-2k-bounty-from-microsoft-e070b2ef88c2", "creation_timestamp": "2021-01-30T13:01:01.000000Z"}