Windows Hyper-V Remote Code Execution Vulnerability
Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally.
Exploitability
AV:L
AC:L
PR:L
UI:R
Scope
S:U
Impact
C:H
I:H
A:H
7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Input Validation
CWE-20
Other
CWE-122
CWE-191