- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.
Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Windows Kerberos allows an unauthorized attacker to bypass a security feature over a network.
Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.
Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally.
Improper link resolution before file access (‚link following‘) in Winlogon allows an authorized attacker to elevate privileges locally.
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.
Improper neutralization of input during web page generation (‚cross-site scripting‘) in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.
Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to elevate privileges locally.
Improper validation of specified type of input in SQL Server allows an authorized attacker to elevate privileges over a network.