Screen Size 21.5 Inches
Display Resolution Maximum 1920 x 1080 Pixels
Special Feature Anti-Glare Coating, Tilt Adjustment
Refresh Rate 60 Hz
22″ Class Monitor (21.5″ Viewable) Full HD 1920 x 1080 resolution
16:9 Aspect Ratio w/ color support of 16.7 Million Colors
Brightness – 200 cd/m2, Dynamic Contrast Ratio – 20,000,000:1, Response Time – 5ms
Connectivity – VGA, HDMI. Compatibile with Windows 10
ASUS 24” VP247HAERead more
Eye Care Monitor – 23.6-inch, Full HD, Flicker Free, Blue Light Filter, Anti Glare 23.6-inch Full HD (1920×1080) LED backlight display with 178° wide viewing angle panel ASUS-exclusive SplendidPlus and 3000:1 contrast ratio ensure better image quality Robust connectivity including HDMI and D-Sub ASUS Eye Care monitors feature TÜV Rheinland-certified Flicker-free and Low Blue Light …
Philips 22” 222V8LA/00Read more
Screen size 21.5 Inches Display resolution maximum 1920 x 1080 Pixels Brand Philips Special feature Blue light filter, Blue Light Filter, Wall mountable, Wall Mountable, Built-in speaker, Flicker-free, Flicker-FreeBlue light filter, Blue Light Filter, Wall mountable, Wall Mountable, Built-in speaker, Flicker-free, Flicker-Free See more Refresh rate 75 Hz Connectivity technology HDMI Aspect ratio 16:9 Specific …
ZDI-23-1494: Apple Safari TypedArray copyWithin Integer Underflow Remote Code Execution VulnerabilitySeptember 30, 2023This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI-23-1493: G Data Total Security GDBackupSvc Service Link Following Local Privilege Escalation VulnerabilitySeptember 30, 2023This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
September 30, 2023This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.