
CVE-2023-51751
https://notcve.org/view.php?id=CVE-2023-51751
11 Jan 2024 — ScaleFusion 10.5.2 does not properly limit users to the Edge application because Alt-F4 can be used. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode. ScaleFusion 10.5.2 no limita adecuadamente a los usuarios a la aplicación Edge porque se puede usar Alt-F4. • https://help.scalefusion.com/docs/security-advisory-for-windows-mdm-agent •

CVE-2024-20711 – Adobe Substance 3D Stager v2.1.1 Vulnerability VII
https://notcve.org/view.php?id=CVE-2024-20711
10 Jan 2024 — Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Las versiones 2.1.3 y anteriores de Adobe Substance 3D Stager se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar la divulgación de memo... • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-06.html • CWE-125: Out-of-bounds Read •

CVE-2024-20712 – Adobe Substance 3D Stager v2.1.1 Vulnerability III
https://notcve.org/view.php?id=CVE-2024-20712
10 Jan 2024 — Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Las versiones 2.1.3 y anteriores de Adobe Substance 3D Stager se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar la divulgación de memo... • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-06.html • CWE-125: Out-of-bounds Read •

CVE-2024-20713 – Adobe Substance 3D Stager v2.1.1 Vulnerability IV
https://notcve.org/view.php?id=CVE-2024-20713
10 Jan 2024 — Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Las versiones 2.1.3 y anteriores de Adobe Substance 3D Stager se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar la divulgación de memo... • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-06.html • CWE-125: Out-of-bounds Read •

CVE-2024-20714 – Adobe Substance 3D Stager v2.1.1 Vulnerability V
https://notcve.org/view.php?id=CVE-2024-20714
10 Jan 2024 — Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Las versiones 2.1.3 y anteriores de Adobe Substance 3D Stager se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar la divulgación de memo... • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-06.html • CWE-125: Out-of-bounds Read •

CVE-2024-20715 – Adobe Substance 3D Stager v2.1.1 Vulnerability VIII
https://notcve.org/view.php?id=CVE-2024-20715
10 Jan 2024 — Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Las versiones 2.1.3 y anteriores de Adobe Substance 3D Stager se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar la divulgación de memo... • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-06.html • CWE-125: Out-of-bounds Read •

CVE-2024-20710 – Adobe Substance 3D Stager v2.1.1 Vulnerability I
https://notcve.org/view.php?id=CVE-2024-20710
10 Jan 2024 — Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Las versiones 2.1.3 y anteriores de Adobe Substance 3D Stager se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar la divulgación de memo... • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-06.html • CWE-125: Out-of-bounds Read •

CVE-2024-0310
https://notcve.org/view.php?id=CVE-2024-0310
10 Jan 2024 — A content-security-policy vulnerability in ENS Control browser extension prior to 10.7.0 Update 15 allows a remote attacker to alter the response header parameter setting to switch the content security policy into report-only mode, allowing an attacker to bypass the content-security-policy configuration. Una vulnerabilidad de política de seguridad de contenido en la extensión del navegador ENS Control anterior a 10.7.0 Actualización 15 permite a un atacante remoto alterar la configuración del parámetro del ... • https://kcm.trellix.com/corporate/index?page=content&id=SB10417 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-21320 – Windows Themes Spoofing Vulnerability
https://notcve.org/view.php?id=CVE-2024-21320
09 Jan 2024 — Windows Themes Spoofing Vulnerability Vulnerabilidad de suplantación de temas de Windows • https://github.com/sxyrxyy/CVE-2024-21320-POC • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-21314 – Microsoft Message Queuing Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-21314
09 Jan 2024 — Microsoft Message Queuing Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de Microsoft Message Queue Server • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21314 • CWE-125: Out-of-bounds Read •