Latest News
Uncontrolled resource consumption in Windows Deployment Services allows an unauthorized attacker to deny service locally.
Buffer over-read in Windows Kernel allows an authorized attacker to disclose information over a network.
Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally.
**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data.
**According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?** An unauthorized attacker must wait for a user to initiate a connection.
**What type of information could be disclosed by this vulnerability?** An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Out-of-bounds read in Windows File Server allows an unauthorized attacker to disclose information locally.
Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.
Improper input validation in Windows Hyper-V allows an unauthorized attacker to deny service locally.