- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Windows Device Association Service allows an authorized attacker to elevate privileges locally.
Dependency on vulnerable third-party component in GitHub Repo: zero-shot-scfoundation allows an unauthorized attacker to execute code over a network.
Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Exposure of sensitive information to an unauthorized actor in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to disclose information locally.
Access of resource using incompatible type (‚type confusion‘) in Microsoft Office allows an unauthorized attacker to execute code locally.
Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate privileges locally.
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.