![]() ![]() ![]() Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī Privilege escalation vulnerability exists in Trellix Windows DLP endpoint for windows which can be abused to delete any file/folder for which the user does not have permission to. The identifier VDB-239749 was assigned to this vulnerability. The manipulation of the argument searched_word/searched_tution_class_type/searched_price_type/searched_duration leads to cross site scripting. Affected by this vulnerability is an unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713.Ī vulnerability was found in Academy LMS 6.2 on Windows. ![]() Sensitive information disclosure due to insecure folder permissions. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |