
CVE-2023-3937 – Cross site scripting vulnerabilities in Snow License Manager
https://notcve.org/view.php?id=CVE-2023-3937
11 Aug 2023 — Cross site scripting vulnerability in web portal in Snow Software License Manager from version 9.0.0 up to and including 9.30.1 on Windows allows an authenticated user with high privileges to trigger cross site scripting attack via the web browser • https://community.snowsoftware.com/s/feed/0D56M00009gUexuSAC • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-3864 – SQL injection vulnerability in Snow License Manager
https://notcve.org/view.php?id=CVE-2023-3864
11 Aug 2023 — Blind SQL injection in a service running in Snow Software license manager from version 8.0.0 up to and including 9.30.1 on Windows allows a logged in user with high privileges to inject SQL commands via the web portal. • https://community.snowsoftware.com/s/feed/0D56M00009gUexuSAC • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-28714
https://notcve.org/view.php?id=CVE-2023-28714
11 Aug 2023 — Improper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html • CWE-284: Improper Access Control CWE-863: Incorrect Authorization •

CVE-2023-28385
https://notcve.org/view.php?id=CVE-2023-28385
11 Aug 2023 — Improper authorization in the Intel(R) NUC Pro Software Suite for Windows before version 2.0.0.9 may allow a privileged user to potentially enable escalation of privilage via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00868.html • CWE-285: Improper Authorization •

CVE-2023-38246 – Adobe Acrobat Reader DC ActiveX Control (AxAcroPDFLib.AxAcroPDF) stack-based stale pointer vulnerability
https://notcve.org/view.php?id=CVE-2023-38246
10 Aug 2023 — Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/acrobat/apsb23-30.html • CWE-824: Access of Uninitialized Pointer •

CVE-2023-29320 – ZDI-CAN-20712: Adobe Acrobat Blacklist Bypass Design flaw
https://notcve.org/view.php?id=CVE-2023-29320
10 Aug 2023 — Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Violation of Secure Design Principles vulnerability that could result in arbitrary code execution in the context of the current user by bypassing the API blacklisting feature. Exploitation of this issue requires user interaction in that a victim must open a malicious file. This vulnerability allows remote attackers to bypass JavaScript API restrictions on affected installations of Adobe Acrobat Reader ... • https://helpx.adobe.com/security/products/acrobat/apsb23-30.html • CWE-657: Violation of Secure Design Principles •

CVE-2023-29299 – Adobe Acrobat Reader Untrusted Search Path Application denial-of-service
https://notcve.org/view.php?id=CVE-2023-29299
10 Aug 2023 — Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Untrusted Search Path vulnerability that could lead to Application denial-of-service. An attacker could leverage this vulnerability if the default PowerShell Set-ExecutionPolicy is set to Unrestricted, making the attack complexity high. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/acrobat/apsb23-30.html • CWE-426: Untrusted Search Path •

CVE-2023-38226 – ZDI-CAN-21240: Adobe Acrobat Reader DC Font Parsing Uninitialized Variable Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-38226
10 Aug 2023 — Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerabili... • https://helpx.adobe.com/security/products/acrobat/apsb23-30.html • CWE-824: Access of Uninitialized Pointer •

CVE-2023-38228 – ZDI-CAN-21317: Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-38228
10 Aug 2023 — Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the tar... • https://helpx.adobe.com/security/products/acrobat/apsb23-30.html • CWE-416: Use After Free •

CVE-2023-38231 – ZDI-CAN-21334: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-38231
10 Aug 2023 — Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Adobe Acrobat Reader versiones 23.003.20244 (y anteriores) y 20.005.30467 (y anteriores), están afectadas por una vulnerabilidad de escritura fuera de límites que podría resultar en una ejecu... • https://helpx.adobe.com/security/products/acrobat/apsb23-30.html • CWE-787: Out-of-bounds Write •