- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally.
Out-of-bounds read in Windows NDIS allows an authorized attacker to elevate privileges locally.
Inconsistent interpretation of http requests (‚http request/response smuggling‘) in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.
Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um Daten zu manipulieren oder einen Denial of Service herbeizuführen.
Incomplete comparison with missing factors in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.