cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-36052,https://securityvulnerability.io/vulnerability/CVE-2023-36052,Azure CLI REST Command Information Disclosure Vulnerability,Azure CLI REST Command Information Disclosure Vulnerability,Microsoft,"Azure App Service,Azure Function App,Azure Logic App",8.6,HIGH,0.0017600000137463212,false,false,false,false,,false,false,2023-11-14T18:15:00.000Z,0 CVE-2023-21777,https://securityvulnerability.io/vulnerability/CVE-2023-21777,Azure App Service on Azure Stack Hub Elevation of Privilege Vulnerability,"The vulnerability in Azure App Service on Azure Stack Hub allows an attacker to gain elevated privileges, potentially compromising the integrity and confidentiality of the application. This can lead to unauthorized access and exposure of sensitive data. Organizations using Azure App Service need to ensure they are protected against this type of exploitation to maintain compliance and secure their applications.",Microsoft,Azure App Service On Azure Stack Hub,8.7,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2023-02-14T20:15:00.000Z,0 CVE-2019-1372,https://securityvulnerability.io/vulnerability/CVE-2019-1372,,"An remote code execution vulnerability exists when Azure App Service/ Antares on Azure Stack fails to check the length of a buffer prior to copying memory to it.An attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code in the context of NT AUTHORITY\system thereby escaping the Sandbox.The security update addresses the vulnerability by ensuring that Azure App Service sanitizes user inputs., aka 'Azure App Service Remote Code Execution Vulnerability'.",Microsoft,Azure App Service On Azure Stack,10,CRITICAL,0.09325999766588211,false,false,false,false,,false,false,2019-10-10T13:28:42.000Z,0