Microsoft Vulnerabilities

Comprehensive security vulnerability database for Microsoft products

Last updated: Oct 10, 2023
Total CVEs

10

Critical

0

With Exploits

6

Last 30 Days

0

Severity Distribution

Critical0
0%
High4
40%
Medium6
60%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2023-364198.8

This vulnerability allows an attacker to gain elevated privileges on Azure HDInsight by exploiting the Apache Oozie Workflow Scheduler, potentially letting them access sensitive data or execute unauthorized actions. To take advantage of this flaw, the attacker must have the ability to submit malicious XML data to the system.

microsoftazure hdinsight
Theoretical
over 2 years agoOct 10, 2023
CVE-2023-381567.2

This vulnerability allows an attacker to gain elevated privileges within Azure HDInsight by exploiting a flaw in the Apache Ambari JDBC interface. To take advantage of this, the attacker must have access to the Ambari server, which typically requires some level of authentication or network access.

microsoftazure hdinsight
Exploit Available
over 2 years agoSep 12, 2023
CVE-2023-381884.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight, potentially gaining unauthorized access to sensitive data or resources. To exploit this flaw, the attacker must be able to send specially crafted requests to the system, which requires some level of access to the network where HDInsight is deployed.

microsoftazure hdinsight
Theoretical
over 2 years agoAug 8, 2023
CVE-2023-368814.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight, potentially gaining unauthorized access to sensitive data and resources. To exploit this, the attacker must already have access to the network where the Azure service is running.

microsoftazure hdinsight
Theoretical
over 2 years agoAug 8, 2023
CVE-2023-368774.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight's Apache Oozie service, potentially leading to unauthorized access to sensitive data or operations. To exploit this, the attacker must have network access to the affected service and be able to send specially crafted requests.

microsoftazure hdinsight
Exploit Available
over 2 years agoAug 8, 2023
CVE-2023-353944.6

This vulnerability allows an attacker to spoof a Jupyter Notebook in Azure HDInsight, potentially misleading users into executing malicious code. To exploit this, the attacker must have access to the same network or environment where the vulnerable service is running.

microsoftazure hdinsight
Exploit Available
over 2 years agoAug 8, 2023
CVE-2023-353934.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight, potentially gaining unauthorized access to sensitive data or resources. To exploit this flaw, the attacker must have network access to the affected system and be able to send specially crafted requests.

microsoftazure hdinsight
Theoretical
over 2 years agoAug 8, 2023
CVE-2023-234084.5

This vulnerability allows an attacker to impersonate a legitimate user within Azure HDInsight, potentially gaining unauthorized access to sensitive information or control over the system. To exploit this, the attacker must be able to send specially crafted requests to the Apache Ambari service, which manages the cluster.

microsoftazure hdinsight
Exploit Available
almost 3 years agoMar 14, 2023
CVE-2020-09197.8

This vulnerability allows an attacker to gain higher privileges on a system by loading unauthorized software through the Remote Desktop App for Mac. To exploit this, the attacker needs access to the app, which could happen if the user is tricked into running malicious code.

microsoftwindows app
Exploit Available
almost 6 years agoApr 15, 2020
CVE-2008-00158.8

This vulnerability allows an attacker to run any code they want on a victim's computer simply by getting them to visit a specially crafted web page. It affects certain versions of Windows, including Server 2003, and relies on the presence of the vulnerable ActiveX control in the system.

microsoftwindows 2003 server
Exploit Available
over 16 years agoJul 7, 2009

About Microsoft Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Microsoft products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.