Source
Microsoft Security Response Center
**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to have a deep understanding of the system. Successful exploitation is not guaranteed and depends on a combination of factors that might include the environment, system configuration, and the presence of additional security measures.
**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.
Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally.
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
**According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?** An attacker must send the user a malicious file and convince them to open it.
Use of uninitialized resource in Windows Kernel allows an unauthorized attacker to elevate privileges locally.
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally.
Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally.
Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally.