High Definition with Accurate Color
Full HD IPS Display
Dynamic Action Sync
Philips 22” 222V8LA/00Read more
Screen size 21.5 Inches Display resolution maximum 1920 x 1080 Pixels Brand Philips Special feature Blue light filter, Blue Light Filter, Wall mountable, Wall Mountable, Built-in speaker, Flicker-free, Flicker-FreeBlue light filter, Blue Light Filter, Wall mountable, Wall Mountable, Built-in speaker, Flicker-free, Flicker-Free See more Refresh rate 75 Hz Connectivity technology HDMI Aspect ratio 16:9 Specific …
AOC 22” E2270SWHNRead more
Screen Size 21.5 Inches Display Resolution Maximum 1920 x 1080 Pixels Brand AOC Special Feature Anti-Glare Coating, Tilt Adjustment Refresh Rate 60 Hz 22″ Class Monitor (21.5″ Viewable) Full HD 1920 x 1080 resolution 16:9 Aspect Ratio w/ color support of 16.7 Million Colors Brightness – 200 cd/m2, Dynamic Contrast Ratio – 20,000,000:1, Response Time …
Philips 24″ 243V7QDSBRead more
Panel Size: 23.8 inch/60.5 cm Panel type: IPS Optimum resolution: 1920 x 1080 @ 60 Hz Response time (GTG): 8 ms Brightness: 250 cd/m² SmartContrast: 10.000.000:1 Contrast ratio (typical): 1000:1 Signal Input: VGA (Analogue) DVI-D (digital HDCP) HDMI
ZDI-23-1494: Apple Safari TypedArray copyWithin Integer Underflow Remote Code Execution VulnerabilitySeptember 30, 2023This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI-23-1493: G Data Total Security GDBackupSvc Service Link Following Local Privilege Escalation VulnerabilitySeptember 30, 2023This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
September 30, 2023This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.