CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Animate versions 23.0.13, 24.0.10 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Animate versions 23.0.13, 24.0.10 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Animate versions 23.0.13, 24.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Animate versions 23.0.13, 24.0.10 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive memory information. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network. |
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. |
Copilot Spoofing Vulnerability |
Improper neutralization of input during web page generation ('cross-site scripting') in Azure Monitor allows an authorized attacker to perform spoofing over a network. |
Copilot Spoofing Vulnerability |
Redis Enterprise Elevation of Privilege Vulnerability |
M365 Copilot Spoofing Vulnerability |
Azure PlayFab Elevation of Privilege Vulnerability |
Azure Entra ID Elevation of Privilege Vulnerability |
Azure Entra ID Elevation of Privilege Vulnerability |
Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally. |
Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. |
Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network. |
Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. |