Page 151 of 15189 results (0.017 seconds)

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 0

10 Aug 2023 — Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Reader DC. User inter... • https://helpx.adobe.com/security/products/acrobat/apsb23-30.html • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 37%CPEs: 10EXPL: 0

10 Aug 2023 — Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the tar... • https://helpx.adobe.com/security/products/acrobat/apsb23-30.html • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

10 Aug 2023 — Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerabili... • https://helpx.adobe.com/security/products/acrobat/apsb23-30.html • CWE-824: Access of Uninitialized Pointer •

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 0

10 Aug 2023 — Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Reader DC. User interactio... • https://helpx.adobe.com/security/products/acrobat/apsb23-30.html • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

09 Aug 2023 — Adobe Dimension version 3.4.9 is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Adobe Dimension 3.4.9 es afectada por una vulnerabilidad de desbordamiento del búfer basado en el montículo que podría dar lugar a la ejecución de código arbitrario en el contexto del usuario actual. La explotación de este problema requiere la ... • https://helpx.adobe.com/security/products/dimension/apsb23-44.html • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

09 Aug 2023 — Adobe Dimension version 3.4.9 is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Adobe Dimension version 3.4.9 es afectada por una vulnerabilidad de user-after-free, la cual podría dar lugar a la ejecución de código arbitrario en el contexto del usuario actual. La explotación de este problema requiere la interacción del usuario, ya que... • https://helpx.adobe.com/security/products/dimension/apsb23-44.html • CWE-416: Use After Free •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

09 Aug 2023 — Adobe Dimension version 3.4.9 is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Adobe Dimension versión 3.4.9 es afectada por una lectura fuera de los límites que podría conducir a la divulgación de memoria sensible. Un atacante podría aprovechar esta vulnerabilidad para eludir m... • https://helpx.adobe.com/security/products/dimension/apsb23-44.html • CWE-125: Out-of-bounds Read •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

09 Aug 2023 — The WireGuard client 0.5.3 on Windows insecurely configures the operating system and firewall such that traffic to a local network that uses non-RFC1918 IP addresses is blocked. This allows an adversary to trick the victim into blocking IP traffic to selected IP addresses and services even while the VPN is enabled. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in the blocking of traffic" rather than to only WireGuard. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0015 • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVSS: 9.0EPSS: 0%CPEs: 42EXPL: 2

08 Aug 2023 — ASP.NET Elevation of Privilege Vulnerability • https://github.com/d0rb/CVE-2023-36899 • CWE-20: Improper Input Validation •

CVSS: 7.4EPSS: 0%CPEs: 50EXPL: 0

08 Aug 2023 — .NET Framework Spoofing Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36873 • CWE-20: Improper Input Validation •