The host is installed with Azure File Sync Agent 16.x before 17.3.0, or 18.x before 18.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation allows attacker to perform arbitrary deletion of files that are not accessible to unprivileged users on the victim machine.
Dynamics 365 Information Disclosure Vulnerability. Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. This vulnerability allows exfiltration of all the data that the logged-in user can access.
Windows Perception Service Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could create or delete files in the security context of the "NT AUTHORITY\ LOCAL SERVICE" account. To exploit this vulnerability an attacker must have an account with the User role assigned.