- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally.
Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally.
Null pointer dereference in Windows DirectX allows an authorized attacker to deny service over a network.
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network.
Improper link resolution before file access (‚link following‘) in Windows Health and Optimized Experiences Service allows an authorized attacker to elevate privileges locally.
Heap-based buffer overflow in Azure Local allows an authorized attacker to elevate privileges locally.
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally.