Tag
#auth
Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
**How could an attacker exploit this vulnerability?** A remote, unauthenticated attacker could send a crafted event that triggers unsafe object deserialization in a legacy serialization mechanism, resulting in remote code execution.
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally.
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
Use after free in Imebroker allows an authorized attacker to execute code locally.