A vulnerability was found in Microsoft Azure Open Management Infrastructure and classified as critical. The impacted element is an unknown function. Executing manipulation can lead to improper authentication.
This vulnerability is tracked as CVE-2021-38648. The attack is restricted to local execution. Moreover, an exploit is present.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in Microsoft Azure Open Management Infrastructure. It has been classified as critical. This affects an unknown function. The manipulation leads to Local Privilege Escalation.
This vulnerability is listed as CVE-2021-38649. The attack must be carried out locally. In addition, an exploit is available.
It is recommended to apply a patch to fix this issue.
A vulnerability labeled as very critical has been found in Microsoft Windows. This vulnerability affects unknown code of the component Win32k. Executing manipulation can lead to use after free.
The identification of this vulnerability is CVE-2021-40449. The attack may be launched remotely. Furthermore, there is an exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability, which was classified as very critical, was found in Microsoft Windows. Affected by this vulnerability is an unknown functionality of the component Common Log File System Driver. The manipulation results in privilege escalation.
This vulnerability is reported as CVE-2021-43226. The attack can be launched remotely. Moreover, an exploit is present.
Applying a patch is advised to resolve this issue.
A vulnerability marked as very critical has been reported in Microsoft Windows. This issue affects some unknown processing of the component Win32k. The manipulation leads to privilege escalation.
This vulnerability is referenced as CVE-2021-40450. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
It is suggested to install a patch to address this issue.
A vulnerability described as very critical has been identified in Microsoft Windows up to Server 2022. The affected element is an unknown function of the component Win32k. Such manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2021-41357. The attack can be launched remotely. Moreover, an exploit is present.
A patch should be applied to remediate this issue.
A vulnerability, which was classified as critical, was found in Microsoft Windows. This vulnerability affects unknown code of the component Active Directory Domain Services. Such manipulation leads to privilege escalation.
This vulnerability is listed as CVE-2021-42278. The attack may be performed from remote. In addition, an exploit is available.
It is best practice to apply a patch to resolve this issue.
A vulnerability labeled as critical has been found in Microsoft Windows. Affected by this vulnerability is an unknown functionality of the component Active Directory Domain Services. Executing manipulation can lead to privilege escalation.
This vulnerability is handled as CVE-2021-42287. The attack can be executed remotely. Additionally, an exploit exists.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in Microsoft Windows up to Server 2019. It has been declared as very critical. Affected by this vulnerability is an unknown functionality of the component Event Tracing. Executing manipulation can lead to use after free.
This vulnerability is handled as CVE-2021-34486. The attack can be executed remotely. Additionally, an exploit exists.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft App Installer. It has been classified as critical. This impacts an unknown function. This manipulation causes privilege escalation.
This vulnerability appears as CVE-2021-43890. The attack may be initiated remotely. In addition, an exploit is available.
It is recommended to apply a patch to fix this issue.
A vulnerability marked as very critical has been reported in Microsoft Windows. Impacted is an unknown function of the component Common Log File System Driver. The manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2021-36955. The attack is possible to be carried out remotely. Moreover, an exploit is present.
To fix this issue, it is recommended to deploy a patch.
A vulnerability, which was classified as critical, has been found in Microsoft Azure Open Management Infrastructure. This issue affects some unknown processing. This manipulation causes Local Privilege Escalation.
The identification of this vulnerability is CVE-2021-38645. The attack can only be executed locally. Furthermore, there is an exploit available.
To fix this issue, it is recommended to deploy a patch.
CVE-2025-54603 gave attackers an opening to disrupt critical operational technology (OT) environments and critical infrastructure, plus steal data from them.