Home Tags Microsoft Windows

Tag: Microsoft Windows

CPU hardware implementations are vulnerable to cache side-channel attacks.

These vulnerabilities are referred to as Meltdown and Spectre.
Resource-draining code hides in pop-under windows that can remain open indefinitely.
The short indie game on itch.io makes you a hacker in a low-fi cyberspace.
Microsoft Windows 8 introduced a change in how system-wide mandatory ASLR is implemented.

This change requires system-wide bottom-up ASLR to be enabled for mandatory ASLR to receive entropy.

Tools that enable system-wide ASLR without also setting bottom-up ASLR will fail to properly randomize executables that do not opt in to ASLR.
An untrusted search path vulnerability in the Cisco Immunet antimalware installer could allow an authenticated, local attacker to execute arbitrary code via DLL hijacking if a local user with administrative privileges executes the installer in the ...
An untrusted search path vulnerability in the Cisco Network Academy Packet Tracer software could allow an authenticated, local attacker to execute arbitrary code via DLL hijacking if a local user with administrative privileges executes the installe...