Jump to content
Microsoft Windows Bulletin Board

Windows Security

Active Members
  • Posts

    1210
  • Joined

  • Last visited

    Never

Windows Security's Achievements

Newbie

Newbie (1/14)

0

Reputation

  1. In the Security Updates table added Windows Server 2022, 23H2 Edition (Server Core installation) as it is affected by this vulnerability. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.View the full article
  2. Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally.View the full article
  3. Use after free in DNS Server allows an unauthorized attacker to execute code over a network.View the full article
  4. Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.View the full article
  5. Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network.View the full article
  6. Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.View the full article
  7. Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.View the full article
  8. Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.View the full article
  9. External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.View the full article
  10. Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack.View the full article
  11. Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally.View the full article
  12. Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.View the full article
  13. Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally.View the full article
  14. Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.View the full article
  15. Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.View the full article
×
×
  • Create New...