Beschreibung
Multiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in Azure Apache Oozie can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Azure Apache Ambari can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Azure DevOps Server can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Azure Apache Hive can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Azure Arc-Enabled Servers can be exploited remotely to gain privileges.
- A spoofing vulnerability in Azure HDInsight Jupyter Notebook can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Azure Apache Hadoop can be exploited remotely to spoof user interface.
- An information disclosure vulnerability can be exploited remotely to obtain sensitive information.
Ursprüngliche Informationshinweise
- CVE-2023-36881
- CVE-2023-36869
- CVE-2023-35393
- CVE-2023-38176
- CVE-2023-35394
- CVE-2023-38188
- CVE-2023-20569
Ausnutzung
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Betroffene Produkte
CVE Liste
- CVE-2023-20569 warning
- CVE-2023-36877 warning
- CVE-2023-36881 warning
- CVE-2023-36869 high
- CVE-2023-35393 warning
- CVE-2023-38176 high
- CVE-2023-35394 warning
- CVE-2023-38188 warning
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!