- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.
Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.
Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to elevate privileges locally.
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a network.
Null pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.
Improper link resolution before file access (‚link following‘) in Winlogon allows an authorized attacker to elevate privileges locally.
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network.