![]() The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. ![]() Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī Privilege escalation vulnerability exists in Trellix Windows DLP endpoint for windows which can be abused to delete any file/folder for which the user does not have permission to. The identifier VDB-239749 was assigned to this vulnerability. The manipulation of the argument searched_word/searched_tution_class_type/searched_price_type/searched_duration leads to cross site scripting. ![]() Affected by this vulnerability is an unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. A vulnerability was found in Academy LMS 6.2 on Windows. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |