Tag
#Security Vulnerability
Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally.
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.
Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally.
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
Heap-based buffer overflow in Azure Local allows an authorized attacker to elevate privileges locally.
Time-of-check time-of-use (toctou) race condition in NtQueryInformation Token function (ntifs.h) allows an authorized attacker to elevate privileges locally.
Use after free in Windows Kernel allows an unauthorized attacker to elevate privileges locally.
Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally.