- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally.
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally.
Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally.
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
Null pointer dereference in Windows DirectX allows an authorized attacker to deny service over a network.
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.