A Windows Defender vulnerability has been discovered that could allow attackers to gain root access to affected computers.

In a post published to its GitHub repository Wednesday, Microsoft says that attackers have been able to take full control of affected machines by exploiting the “windows_repair_snoop” function.

The flaw, which affects versions of Windows that include the Windows Defender Advanced Threat Protection software, could be used to gain a remote access to vulnerable computers.

The vulnerability is located in the Windows version that’s running on computers that include Microsoft’s Windows Defender anti-malware software, which has been used in a number of high-profile attacks, including the ones against Sony Pictures Entertainment and The Washington Post.

Windows Defender is Microsoft’s antivirus software that helps protect computers from malware and other attacks.

In order to exploit the vulnerability, the attackers are required to install the malicious “windowsrepair_snop” program, which they could use to bypass the antivirus’s security protections.

Windows is one of the most widely used and widely used operating systems in the world.

It’s used by millions of users worldwide, with Windows Defender also used in several high-impact attacks against organizations, including The Washington Times and The New York Times.

The company says that while Windows Defender has been the target of malicious code, it has not been breached.

The vulnerability in Windows 10 is not the first time that the company has addressed the security flaws found in Windows versions.

In April, Microsoft published a blog post detailing how the company was actively working on addressing a series of security issues that it said had been discovered since the fall of 2017.