Sweetening

Zero Day Spec Sheet

Nov 29th, 2023
82
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.94 KB | None | 0 0
  1. Bug Sale Specification Sheet
  2. Item Name:
  3. Vendor Homepage:
  4. Vulnerable Software:
  5. Asking Price and Availability for Exclusive Acquisition:
  6. Affected Operating Systems:
  7. Vulnerable Target Application Versions and Reliability:
  8. 32-bit: Vulnerable?
  9. 64-bit: Vulnerable?
  10. Complete point release range:
  11. Tested, Functional Against Target Application Versions:
  12. Explanation:
  13. Does This Exploit Affect the Current Target Version?
  14. Yes
  15. No
  16. Targets Found via Google Dork/Shodan/Censys?
  17. Yes
  18. No
  19. Privilege Level Gained:
  20. Options: As Logged-In User, Web Browser's Default, Low, Medium, High, Root/Admin/System, Ring 0/Kernel, Other
  21. Minimum Privilege Level Required for Successful PE:
  22. Options: As Logged-In User, Low, Medium, High, N/A, Other
  23. Exploit Type:
  24. Select All That Apply: Remote Code Execution, Privilege Escalation, Font-Based, Sandbox Escape, Information Disclosure, Code Signing Bypass, Persistency, Other
  25. Delivery Method:
  26. Via Web Page, Via File, Via Network Protocol, Local Privilege Escalation, Other
  27. Bug Class:
  28. Select One: Memory Corruption, Design/Logic Flaw, Input Validation Flaw, Misconfiguration, Information Disclosure, Cryptographic Bug, Denial of Service
  29. Number of Bugs Exploited:
  30. Exploitation Parameters:
  31. Bypasses ASLR, DEP/W^X, Application Sandbox, SMEP/PXN, EMET, CFG, N/A
  32. ROP Usage:
  33. Number of Chains Included:
  34. Is the ROP set complete?
  35. Module ROP occurs from:
  36. Does This Item Alert the Target User?
  37. Explanation:
  38. Exploration Time in Seconds:
  39. Exploitation Time in Seconds:
  40. Specific User Interactions Required?
  41. Associated Caveats or Environmental Factors:
  42. Compatibility with Arbitrary Payloads?
  43. Yes
  44. No
  45. Readiness for Immediate Delivery?
  46. Yes
  47. No
  48. Delivery Timeline:
  49. Is This Exploit Weaponized?
  50. Yes
  51. No
  52. Impact on Framework (Crashes, etc.):
  53. Success Rate or Number of Attempts:
  54. Support Continuation of Execution?
  55. Description and Deliverables Documentation:
  56. Testing Instructions:
  57. Comments, Artifacts, Limitations, or Other Information:
Add Comment
Please, Sign In to add comment