Author name: fixtherisk2

Windows Snipping tool information disclosure vulnerability
Blog

Windows Snip & Sketch/Snipping Tool Vulnerability (CVE-2023-28303)

Windows Snip & Sketch/Snipping Tool Vulnerability Today I will Discuss how to Mitigate windows snipping tool information disclosure vulnerability (CVE-2023-28303) which is also known as Acropalypse Vulnerability. In the ever-evolving landscape of cybersecurity, it is crucial for organizations and individuals alike to stay vigilant against potential vulnerabilities in commonly used software. Recently, a significant information […]

msixbundle, appxbundle
Blog

Updating Microsoft Store Apps with Offline Bundles

Updating Microsoft Store Apps with MSIXbundle or APPXbundle Introduction I am going to explain how we can update Microsoft Store app using MSIXbundle or APPXbundle.  In the fast-paced world of technology, ensuring that your Microsoft Store apps are up-to-date is more crucial than ever. The latest features, security patches, and improvements are often bundled in

CVE-2020-6917. HP support assistance privilege escalation
Blog

HP Support Assistance Privilege Escalation CVE-2020-6917

HP Support Assistance Privilege Escalation CVE-2020-6917 Guide to Mitigate HP Support Assistance Privilege Escalation (CVE-2020-6917) Vulnerability by Uninstalling HP Support Assistance. In the ever-evolving landscape of technology, ensuring the security of our devices is paramount. Recently, a significant vulnerability was unearthed in older versions of HP Support Assistant, a utility designed to streamline device management

Raw Image Extension Remote Code Execution Vulnerability (CVE-2022-44687)
Blog

Raw Image Extension Remote Code Execution Vulnerability (CVE-2022-44687)

Raw Image Extension Remote Code Execution Vulnerability (CVE-2022-44687) The Raw Image Extension Remote Code Execution Vulnerability, known as CVE-2022-44687 (Qualys ID: 91967), has emerged as a concerning issue, demanding immediate attention. In this comprehensive blog post, we’ll explore the intricacies of this vulnerability, the associated risks, and guide you through using a PowerShell script to

WinVerifyTrust Signature Validation Vulnerability
Blog

Mitigate WinVerifyTrust Signature Validation Vulnerability CVE-2013-3900​

Mitigate WinVerifyTrust Signature Validation Vulnerability CVE-2013-3900 The WinVerifyTrust signature validation vulnerability in Microsoft’s Windows operating system, prompting the re-publication of CVE-2013-3900. In this blog post, we will delve into the details of this vulnerability, understand its implications, and provide a comprehensive guide on mitigating it using a batch script that can be seamlessly integrated into

Download Microsoft Store Apps for offline installation
Blog

How to Download offline setup of Microsoft Store App

How to Download Microsoft Store Apps for Offline Installation Guide to Download Microsoft Store Apps for offline installation and deploy the bundle using powershell to multiple computer in the network.   The Microsoft Store serves as a hub for a plethora of applications catering to diverse user needs. While accessing apps through the Microsoft Store

Dell supportAssist Privilege Escalation vulnerability
Blog

Mitigate Dell supportAssist Privilege Escalation vulnerability

Mitigate Dell supportAssist Privilege Escalation vulnerability In this article I will discuss about how to Mitigate Dell supportAssist Privilege Escalation vulnerability In the ever-evolving landscape of cybersecurity, organizations and individuals must remain vigilant against potential threats that can compromise the security of their systems. Recently, a Privilege Escalation Vulnerability (CVE-2023-48670) has been identified in Dell

Blog

Automating Python Uninstallation with PowerShell

Automating Python Uninstallation with PowerShell In this article Iwill discuss about how we can remotely uninstall all versions of python andfrom all user profile. Python, aversatile and widely-used programming language, has become an integral part ofmany development environments. However, ensuring the security of your systemsdemands not only the use of up-to-date software but also the

Scroll to Top