- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally.
Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally.
Null pointer dereference in Windows DirectX allows an authorized attacker to deny service over a network.
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network.
Improper link resolution before file access (‚link following‘) in Windows Health and Optimized Experiences Service allows an authorized attacker to elevate privileges locally.
Heap-based buffer overflow in Azure Local allows an authorized attacker to elevate privileges locally.