cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-52990,https://securityvulnerability.io/vulnerability/CVE-2024-52990,Animate | Buffer Underwrite ('Buffer Underflow') (CWE-124),"The vulnerability in Adobe Animate allows for a Buffer Underwrite (Buffer Underflow) that could lead to arbitrary code execution within the user context. By exploiting this vulnerability, an attacker can manipulate memory, enabling the execution of malicious code under the privileges granted to the current user. Successful exploitation necessitates user interaction, as the victim must engage with a specially crafted malicious file.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-52986,https://securityvulnerability.io/vulnerability/CVE-2024-52986,Animate | Integer Underflow (Wrap or Wraparound) (CWE-191),"Adobe Animate versions 23.0.8, 24.0.5, and earlier are vulnerable to an Integer Underflow issue that may allow for arbitrary code execution when exploited. The vulnerability arises when a user opens a specially crafted malicious file, leading to potential impacts on the integrity of the user's system. Proper safeguards and user awareness are essential to mitigate the risks associated with this vulnerability.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-45155,https://securityvulnerability.io/vulnerability/CVE-2024-45155,Animate | Access of Uninitialized Pointer (CWE-824),"Adobe Animate versions 23.0.8, 24.0.5 and earlier versions are impacted by an Access of Uninitialized Pointer vulnerability. This vulnerability could potentially lead to arbitrary code execution in the current user's context if exploited. User interaction is necessary for exploitation, as the victim must open a specially crafted malicious file. It is crucial for users to be aware of this vulnerability and take precautions to avoid potential security risks.",Adobe,Animate,7.8,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-52983,https://securityvulnerability.io/vulnerability/CVE-2024-52983,Animate | Integer Overflow or Wraparound (CWE-190),"Adobe Animate versions 23.0.8, 24.0.5, and prior are susceptible to an Integer Overflow or Wraparound vulnerability. This security flaw can permit arbitrary code execution within the context of the user currently logged in to the software. Exploitation of this vulnerability necessitates user interaction, specifically requiring the victim to open a specially crafted malicious file.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-52984,https://securityvulnerability.io/vulnerability/CVE-2024-52984,Animate | Integer Underflow (Wrap or Wraparound) (CWE-191),"Adobe Animate versions 23.0.8, 24.0.5, and prior iterations are susceptible to an Integer Underflow vulnerability. This flaw can be exploited to execute arbitrary code in the context of the current user. The attack necessitates that the target user opens a specially crafted malicious file, which triggers the vulnerability and potentially compromises system security.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-52987,https://securityvulnerability.io/vulnerability/CVE-2024-52987,Animate | Integer Underflow (Wrap or Wraparound) (CWE-191),"Adobe Animate is vulnerable to an Integer Underflow issue that could enable an attacker to execute arbitrary code in the context of the current user. This vulnerability affects versions 23.0.8, 24.0.5, and earlier iterations of the software. For successful exploitation, user interaction is essential; specifically, a victim must open a specially crafted malicious file. Users must ensure they are using the latest version of Adobe Animate to mitigate potential risks associated with this vulnerability.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-53954,https://securityvulnerability.io/vulnerability/CVE-2024-53954,Animate | Integer Underflow (Wrap or Wraparound) (CWE-191),"Adobe Animate versions 23.0.8, 24.0.5, and earlier are susceptible to an Integer Underflow vulnerability, which may allow attackers to execute arbitrary code within the context of a user. The exploitation of this vulnerability necessitates user interaction, as it requires the victim to open a specially crafted malicious file. This weakness stresses the importance of caution when handling unknown file sources to mitigate potential risks.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-52989,https://securityvulnerability.io/vulnerability/CVE-2024-52989,Animate | Integer Underflow (Wrap or Wraparound) (CWE-191),"Adobe Animate versions 23.0.8, 24.0.5 and earlier are susceptible to an Integer Underflow (Wrap or Wraparound) vulnerability. This flaw could potentially allow an attacker to execute arbitrary code with the privileges of the current user. The successful exploitation of this vulnerability requires that a user interacts with the system by opening a specially crafted malicious file. Therefore, caution should be exercised when handling unknown or suspicious files in Adobe Animate to mitigate the associated risks.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-52982,https://securityvulnerability.io/vulnerability/CVE-2024-52982,Animate | Improper Input Validation (CWE-20),"Adobe Animate versions 23.0.8, 24.0.5, and earlier are vulnerable to an Improper Input Validation issue, which can lead to arbitrary code execution within the context of the affected user. This vulnerability requires user interaction, as exploitation occurs when the user opens a specially crafted malicious file. Ensuring that users are aware of this risk is vital for maintaining the security of their systems.",Adobe,Animate,7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-52988,https://securityvulnerability.io/vulnerability/CVE-2024-52988,Animate | Out-of-bounds Write (CWE-787),"Adobe Animate versions 23.0.8, 24.0.5, and earlier are susceptible to an out-of-bounds write vulnerability that can allow attackers to execute arbitrary code with the privileges of the current user. Exploitation of this vulnerability necessitates user interaction, as the targeted individual must open a crafted malicious file. This significant security risk underscores the importance of vigilance around file openings and reinforces the need for users to keep their software updated to mitigate potential threats. For further details, refer to the official Adobe security advisory.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-53953,https://securityvulnerability.io/vulnerability/CVE-2024-53953,Animate | Use After Free (CWE-416),"Adobe Animate is impacted by a Use After Free vulnerability that could allow an attacker to execute arbitrary code within the context of the compromised user. To exploit this vulnerability, a user must be tricked into opening a specially crafted malicious file. Ensuring timely updates and applying security patches can significantly mitigate the risk associated with this vulnerability. Users are advised to remain cautious of unsolicited files and to maintain vigilance regarding security practices.",Adobe,Animate,7.8,HIGH,0.000699999975040555,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-45156,https://securityvulnerability.io/vulnerability/CVE-2024-45156,Animate | NULL Pointer Dereference (CWE-476),"Adobe Animate contains a NULL Pointer Dereference vulnerability that affects versions 23.0.8, 24.0.5, and earlier. This flaw allows an attacker to execute arbitrary code in the context of the currently logged-in user. Exploitation of this vulnerability requires user interaction, specifically the opening of a malicious file crafted to trigger the flaw. Users of affected versions are strongly advised to upgrade to the latest version or apply patches to mitigate potential risks.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-52985,https://securityvulnerability.io/vulnerability/CVE-2024-52985,Animate | Integer Underflow (Wrap or Wraparound) (CWE-191),"Adobe Animate versions 23.0.8, 24.0.5 and prior are susceptible to an Integer Underflow vulnerability, causing potential arbitrary code execution within the context of the current user. This vulnerability specifically requires user interaction, as it is initiated when a victim opens a specially crafted malicious file. It is crucial for users of affected versions to exercise caution and maintain updated security protocols to mitigate risks associated with this vulnerability.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-49526,https://securityvulnerability.io/vulnerability/CVE-2024-49526,Use After Free Vulnerability in Adobe Animate by Adobe,"A Use After Free vulnerability has been identified in Adobe Animate versions 23.0.7, 24.0.4, and earlier. This flaw can lead to arbitrary code execution, potentially allowing an attacker to execute malicious code in the context of the current user. Successful exploitation of this vulnerability requires user interaction, as it necessitates that the victim open a specially crafted file. Users of affected versions should take necessary precautions to mitigate risks associated with this security issue.",Adobe,Animate,7.8,HIGH,0.000699999975040555,false,,false,false,false,,,false,false,,2024-11-12T17:15:00.000Z,0 CVE-2024-49528,https://securityvulnerability.io/vulnerability/CVE-2024-49528,Out-of-Bounds Write Vulnerability in Adobe Animate Affects User Security,"Adobe Animate versions 23.0.7, 24.0.4 and earlier are susceptible to an out-of-bounds write vulnerability. This issue may allow attackers to execute arbitrary code within the context of the current user, posing significant security risks. The exploitation process necessitates user interaction, requiring the victim to open a specially crafted malicious file. Maintaining awareness of such vulnerabilities is crucial for users of Adobe Animate to ensure their systems remain uncompromised.",Adobe,Animate,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T17:15:00.000Z,0 CVE-2024-49527,https://securityvulnerability.io/vulnerability/CVE-2024-49527,Out-of-Bounds Read Vulnerability in Adobe Animate Affects Several Versions,"The affected versions of Adobe Animate are susceptible to an out-of-bounds read vulnerability that may allow attackers to disclose sensitive memory contents. This security flaw enables potential bypasses of security measures like Address Space Layout Randomization (ASLR). To exploit this vulnerability, an attacker must trick a victim into opening a specially crafted malicious file, which can lead to unauthorized access to certain memory areas.",Adobe,Animate,5.5,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2024-11-12T17:15:00.000Z,0 CVE-2024-47420,https://securityvulnerability.io/vulnerability/CVE-2024-47420,Adobe Animate Vulnerability Could Lead to Sensitive Memory Disclosure,"Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",Adobe,Animate,5.5,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2024-10-09T10:15:00.000Z,0 CVE-2024-30295,https://securityvulnerability.io/vulnerability/CVE-2024-30295,Arbitrary Code Execution Vulnerability in Animate,"A NULL Pointer Dereference vulnerability exists in Adobe Animate, specifically affecting versions 24.0.2, 23.0.5, and earlier. This vulnerability allows for potential arbitrary code execution in the context of the current user. Exploitation of this vulnerability necessitates user interaction, as the target must open a specially crafted malicious file. Users of Adobe Animate are advised to be cautious and apply security updates as they become available to mitigate risks associated with this vulnerability.",Adobe,Animate,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,,false,false,,2024-05-16T08:59:53.154Z,0 CVE-2024-30296,https://securityvulnerability.io/vulnerability/CVE-2024-30296,Adobe Animate Vulnerability Could Lead to Arbitrary Code Execution,"A vulnerability exists in Adobe Animate versions 24.0.2, 23.0.5, and earlier that allows for out-of-bounds write operations. This flaw can lead to arbitrary code execution when a user interacts with a malicious file. Attackers can exploit this vulnerability by persuading users to open compromised files, thereby gaining access to the system under the current user's permissions. It is crucial for users to ensure they are using the latest versions of Adobe Animate and exercise caution when opening files from untrusted sources.",Adobe,Animate,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,,false,false,,2024-05-16T08:59:52.401Z,0 CVE-2024-30294,https://securityvulnerability.io/vulnerability/CVE-2024-30294,Animate Buffer Overflow Vulnerability Could Lead to Arbitrary Code Execution,"Adobe Animate versions 24.0.2, 23.0.5, and earlier are susceptible to a Heap-based Buffer Overflow vulnerability. This security flaw may allow attackers to execute arbitrary code within the context of the current user. Successful exploitation necessitates user interaction, requiring the victim to open a specially crafted malicious file. Protecting systems against this vulnerability is essential to maintain security and prevent unauthorized access.",Adobe,Animate,7.8,HIGH,0.0005099999834783375,false,,false,false,false,,,false,false,,2024-05-16T08:59:51.631Z,0 CVE-2024-30298,https://securityvulnerability.io/vulnerability/CVE-2024-30298,Adobe Animate Vulnerable to Out-of-Bounds Read Vulnerability,"Animate versions 24.0.2, 23.0.5 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",Adobe,Animate,5.5,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2024-05-16T08:59:50.911Z,0 CVE-2024-30297,https://securityvulnerability.io/vulnerability/CVE-2024-30297,Adobe Animate Vulnerability Could Lead to Arbitrary Code Execution,"Adobe Animate versions 24.0.2, 23.0.5, and prior are vulnerable to an out-of-bounds write issue that may allow attackers to execute arbitrary code within the user’s context. This vulnerability necessitates user interaction, wherein a victim must open a specially crafted malicious file. Exploitation could lead to severe security implications, making it crucial for users to be aware and apply available security updates.",Adobe,Animate,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,,false,false,,2024-05-16T08:59:50.178Z,0 CVE-2024-30293,https://securityvulnerability.io/vulnerability/CVE-2024-30293,Animate Buffer Overflow Vulnerability Could Lead to Arbitrary Code Execution,"Adobe Animate is impacted by a stack-based buffer overflow vulnerability which could allow an attacker to execute arbitrary code in the context of the user. This vulnerability is triggered when a user interacts with a malicious file, highlighting the importance of cautious file handling and awareness of potential threats. Proper security measures are essential to mitigate risks associated with this issue.",Adobe,Animate,7.8,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2024-05-16T08:59:49.426Z,0 CVE-2024-30282,https://securityvulnerability.io/vulnerability/CVE-2024-30282,Adobe Animate Vulnerability Could Lead to Arbitrary Code Execution,"Adobe Animate versions 24.0.2, 23.0.5, and earlier are impacted by an out-of-bounds write vulnerability that permits the execution of arbitrary code in the context of the current user. For successful exploitation, an attacker must entice the victim to open a specially crafted malicious file. This vulnerability highlights the importance of user vigilance against potentially harmful files as it could lead to severe security compromises.",Adobe,Animate,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,,false,false,,2024-05-16T08:59:48.624Z,0 CVE-2024-20797,https://securityvulnerability.io/vulnerability/CVE-2024-20797,Adobe Animate Vulnerable to Out-of-Bounds Read Vulnerability,"Adobe Animate versions 23.0.4, 24.0.1, and earlier are susceptible to a vulnerability that allows an out-of-bounds read when processing specially crafted files. This flaw can lead to reading beyond the allocated memory, potentially enabling an attacker to execute arbitrary code within the context of the user. Successful exploitation of this vulnerability necessitates user interaction, as the victim must open a maliciously crafted file to trigger the attack. This emphasizes the importance of caution when handling files from untrusted sources.",Adobe,Animate,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,,false,false,,2024-04-11T10:53:15.210Z,0