{"uuid": "b61ad3e4-0a5f-4ea4-9546-5e91c6838b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-15048", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1749", "content": "#Offensive_security\n1. Collection of various techniques to bypass Linux Kernel Address Space Layout Randomization (KASLR) and retrieve the kernel base virtual address on x86/x86_64 architectures as an unprivileged local user\nhttps://github.com/bcoles/kasld\n2. Espressif ESP32: Bypassing Flash Encryption (CVE-2020-15048)\nhttps://raelize.com/blog/espressif-systems-esp32-bypassing-flash-encryption", "creation_timestamp": "2023-02-25T05:56:12.000000Z"}