Tag
#windows
**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.
**According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?** This vulnerability could be triggered when a malicious actor spoofs a machine with the same name that a user is searching for.
**What privileges an attacker could gain with a successful exploitation?** An attacker who successfully exploited this vulnerability could gain privilege escalation in the processing of .vhdx files in the Windows Kernel.
Femitter FTP Server version 1.03 remote denial of service exploit.
Gom Player version 2.3.92.5362 suffers from a buffer overflow vulnerability.
Gom Player version 2.3.92.5362 suffers from a dll hijacking vulnerability.
Windows Event logs are the main source of information for defensive security teams to identify threats and for administrators to troubleshoot errors. The logs are… Continue reading → Persistence – Event Log
Windows Event logs are the main source of information for defensive security teams to identify threats and for administrators to troubleshoot errors. The logs are… Continue reading → Persistence – Event Log
File Sharing Wizard version 1.5.0 remote denial of service exploit.
httpdx version 1.5.4 remote denial of service exploit.