- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an adjacent network.
Out-of-bounds read in Windows Extensible File Allocation allows an authorized attacker to elevate privileges locally.
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Out-of-bounds read in Push Message Routing Service allows an authorized attacker to disclose information locally.
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.
Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally.
Improper link resolution before file access (‚link following‘) in Winlogon allows an authorized attacker to elevate privileges locally.
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.
Improper neutralization of input during web page generation (‚cross-site scripting‘) in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.