Headline
CVE-2023-36584: Windows Mark of the Web Security Feature Bypass Vulnerability
How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker could host a file on an attacker-controlled server, then convince a targeted user to download and open the file. This could allow the attacker to interfere with the Mark of the Web functionality.
Please see Additional information about Mark of the Web for further clarification