CVE-2021-42287 – Microsoft Active Directory Domain Services Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2021-42287
Active Directory Domain Services Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Active Directory Domain Services. Este ID de CVE es diferente de CVE-2021-42278, CVE-2021-42282, CVE-2021-42291 Microsoft Active Directory Domain Services contains an unspecified vulnerability that allows for privilege escalation. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42287 •
CVE-2021-42285 – Windows Kernel Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-42285
Windows Kernel Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en el Kernel de Windows • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42285 • CWE-269: Improper Privilege Management •
CVE-2021-42284 – Windows Hyper-V Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2021-42284
Windows Hyper-V Denial of Service Vulnerability Una vulnerabilidad de denegación de servicio en Windows Hyper-V • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42284 •
CVE-2021-42283 – NTFS Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-42283
NTFS Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios de NTFS. Este ID de CVE es diferente de CVE-2021-41367, CVE-2021-41370 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42283 • CWE-269: Improper Privilege Management •
CVE-2021-42280 – Windows Feedback Hub Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-42280
Windows Feedback Hub Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows Feedback Hub This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DiagTrack service. By creating a symbolic link, an attacker can abuse the service to delete a directory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42280 https://www.zerodayinitiative.com/advisories/ZDI-21-1307 • CWE-269: Improper Privilege Management •