Tag
#windows
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
**Is there more information that is available on Windows SDK?** Yes. Please see: Windows SDK - Windows app development which explains the Windows SDK and advises how to install and maintain the product.
Exposure of sensitive information to an unauthorized actor in Windows Hello allows an authorized attacker to disclose information locally.
Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.
**How could an attacker exploit this vulnerability?** An unauthenticated attacker could use a specially crafted application to leverage a cryptographic protocol vulnerability in Kerberos Key Distribution Center Proxy Service to perform remote code execution against the target.
External control of file name or path in Microsoft Defender for Endpoint allows an authorized attacker to perform spoofing locally.
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.
Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.