Windows Admin Center Spoofing Vulnerability. An authenticated attacker could exploit the vulnerability by carrying out any one of the following actions:* Importing a malicious script to the Windows Admin Center (WAC) HTML form.* Importing a .csv file using the Windows Admin Center (WAC) user interface.* Importing a .csv file using the Windows Admin Center (WAC) API. If the victim who triggers the ...