- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally.
Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Graphics Kernel allows an authorized attacker to elevate privileges locally.
Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to disclose information locally.
Use of uninitialized resource in Dynamic Root of Trust for Measurement (DRTM) allows an authorized attacker to disclose information locally.
Absolute path traversal in Windows Shell allows an unauthorized attacker to perform spoofing with a physical attack.
Improper link resolution before file access (‚link following‘) in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.
Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
Improper neutralization of special elements used in an sql command (’sql injection‘) in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Out-of-bounds read in Capability Access Management Service (camsvc) allows an authorized attacker to disclose information locally.