Tag
#microsoft
Improper input validation in Microsoft Management Console allows an authorized attacker to elevate privileges locally.
**How could an attacker exploit this vulnerability?** To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
**How could an attacker exploit this vulnerability?** To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network.
**Is the Preview Pane an attack vector for this vulnerability?** No, the Preview Pane is not an attack vector.
**What kind of security feature could be bypassed by successfully exploiting this vulnerability?** An attacker who successfully exploited this vulnerability could bypass the Windows Hello security feature. **Where can I find more information about Windows Hello?** Please see Windows Hello | Microsoft Learn for more details.
Heap-based buffer overflow in Microsoft Windows Codecs Library allows an authorized attacker to execute code locally.
Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally.
Improper authorization in Microsoft Office SharePoint allows an unauthorized attacker to execute code over a network.
**How could an attacker exploit this vulnerability?** To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.