Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-35394

Опубликовано: 08 авг. 2023
Источник: msrc
CVSS3: 4.6
EPSS Низкий

Описание

Azure HDInsight Jupyter Notebook Spoofing Vulnerability

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker would have to send the victim a malicious file that the victim would have to execute.

According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with guest privileges must send a victim a malicious site and convince them to open it.

According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L), and availability (A:N). What does that mean for this vulnerability?

Successful exploitation of this vulnerability has limited impacts to Confidentiality and Integrity and no impact on Availability. An attacker would need to combine this vulnerability with other vulnerabilities to perform an attack.

Обновления

ПродуктСтатьяОбновление
Azure HDInsight

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 42%
0.00202
Низкий

4.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.6
ubuntu
больше 2 лет назад

Azure HDInsight Jupyter Notebook Spoofing Vulnerability

CVSS3: 4.6
nvd
больше 2 лет назад

Azure HDInsight Jupyter Notebook Spoofing Vulnerability

CVSS3: 4.6
github
больше 2 лет назад

Azure HDInsight Jupyter Notebook Spoofing Vulnerability

EPSS

Процентиль: 42%
0.00202
Низкий

4.6 Medium

CVSS3