Hossein Lotfi is a Senior Vulnerability Researcher at Trend Micro Zeroday Initiative where he develops exploits, performs source code auditing, reverse engineering & analyzes zero-day submissions for root cause, impact & criticality.
Hossein Lotfi is a Senior Vulnerability Researcher at Trend Micro Zeroday Initiative where he develops exploits, performs source code auditing, reverse engineering & analyzes zero-day submissions for root cause, impact & criticality.
10/16 |
CVE-2020-16915
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media... |
8.8 HIGH |
10/16 |
CVE-2020-16968
A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory,... |
7.8 HIGH |
10/16 |
CVE-2020-16967
A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory,... |
7.8 HIGH |
09/11 |
CVE-2020-1319
A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory,... |
7.8 HIGH |
09/11 |
CVE-2020-0997
A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory,... |
7.8 HIGH |
09/11 |
CVE-2020-1129
A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory,... |
8.8 HIGH |
09/11 |
CVE-2020-1039
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory,... |
7.8 HIGH |
09/11 |
CVE-2020-1074
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory,... |
7.8 HIGH |
07/14 |
CVE-2020-1400
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory,... |
7.8 HIGH |
06/09 |
CVE-2020-1239
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media... |
8.8 HIGH |
This page is open source. Noticed a typo? Or something missing?