by Fortify Security Team | May 10, 2022 | Security Advisories
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs;...
by Fortify Security Team | Feb 8, 2022 | Security Advisories
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs;...
by Fortify Security Team | Jun 8, 2021 | Security Advisories
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs;...
by Fortify Security Team | Feb 11, 2021 | Industry News
Title: Supply-Chain Hack Breaches 35 Companies, Including PayPal, Microsoft, Apple Date Published: February 10, 2021 https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 Also See: Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of...