Tag
#vulnerability
**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
Improper input validation in Microsoft Office allows an unauthorized attacker to execute code locally.
**How could an attacker exploit this vulnerability?** An unauthenticated attacker could use a specially crafted application to leverage a cryptographic protocol vulnerability in Kerberos Key Distribution Center Proxy Service to perform remote code execution against the target.
External control of file name or path in Microsoft Defender for Endpoint allows an authorized attacker to perform spoofing locally.
Protection mechanism failure in Windows DHCP Server allows an authorized attacker to deny service locally.
**What type of information could be disclosed by this vulnerability?** The type of information that could be disclosed if an attacker successfully exploited this vulnerability is an out of bounds read in the caller's address space memory.
Exposure of sensitive information to an unauthorized actor in Windows Hello allows an authorized attacker to disclose information locally.
**Is there more information that is available on Windows SDK?** Yes. Please see: Windows SDK - Windows app development which explains the Windows SDK and advises how to install and maintain the product.
**What type of information could be disclosed by this vulnerability?** The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized stack memory.
Protection mechanism failure in Windows DHCP Server allows an authorized attacker to deny service over a network.