Descripción
Multiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in Azure Apache Oozie can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Azure Apache Ambari can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Azure DevOps Server can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Azure Apache Hive can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Azure Arc-Enabled Servers can be exploited remotely to gain privileges.
- A spoofing vulnerability in Azure HDInsight Jupyter Notebook can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Azure Apache Hadoop can be exploited remotely to spoof user interface.
- An information disclosure vulnerability can be exploited remotely to obtain sensitive information.
Notas informativas originales
- CVE-2023-36881
- CVE-2023-36869
- CVE-2023-35393
- CVE-2023-38176
- CVE-2023-35394
- CVE-2023-38188
- CVE-2023-20569
Explotación
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
Lista CVE
- CVE-2023-20569 warning
- CVE-2023-36877 warning
- CVE-2023-36881 warning
- CVE-2023-36869 high
- CVE-2023-35393 warning
- CVE-2023-38176 high
- CVE-2023-35394 warning
- CVE-2023-38188 warning
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!