
CVE-2024-52983 – Animate | Integer Overflow or Wraparound (CWE-190)
https://notcve.org/view.php?id=CVE-2024-52983
10 Dec 2024 — Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/animate/apsb24-96.html • CWE-190: Integer Overflow or Wraparound •

CVE-2024-52988 – Animate | Out-of-bounds Write (CWE-787)
https://notcve.org/view.php?id=CVE-2024-52988
10 Dec 2024 — Animate versions 23.0.8, 24.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/animate/apsb24-96.html • CWE-787: Out-of-bounds Write •

CVE-2024-52984 – Animate | Integer Underflow (Wrap or Wraparound) (CWE-191)
https://notcve.org/view.php?id=CVE-2024-52984
10 Dec 2024 — Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/animate/apsb24-96.html • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-52986 – Animate | Integer Underflow (Wrap or Wraparound) (CWE-191)
https://notcve.org/view.php?id=CVE-2024-52986
10 Dec 2024 — Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/animate/apsb24-96.html • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-49527 – Animate | Out-of-bounds Read (CWE-125)
https://notcve.org/view.php?id=CVE-2024-49527
12 Nov 2024 — Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/animate/apsb24-76.html • CWE-125: Out-of-bounds Read •

CVE-2024-49528 – Animate | Out-of-bounds Write (CWE-787)
https://notcve.org/view.php?id=CVE-2024-49528
12 Nov 2024 — Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/animate/apsb24-76.html • CWE-787: Out-of-bounds Write •

CVE-2024-49526 – Animate | Use After Free (CWE-416)
https://notcve.org/view.php?id=CVE-2024-49526
12 Nov 2024 — Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/animate/apsb24-76.html • CWE-416: Use After Free •

CVE-2024-47410 – Animate | Stack-based Buffer Overflow (CWE-121)
https://notcve.org/view.php?id=CVE-2024-47410
09 Oct 2024 — Animate versions 23.0.7, 24.0.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/animate/apsb24-76.html • CWE-121: Stack-based Buffer Overflow •

CVE-2024-47415 – Animate | Use After Free (CWE-416)
https://notcve.org/view.php?id=CVE-2024-47415
09 Oct 2024 — Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/animate/apsb24-76.html • CWE-416: Use After Free •

CVE-2024-47417 – Animate | Heap-based Buffer Overflow (CWE-122)
https://notcve.org/view.php?id=CVE-2024-47417
09 Oct 2024 — Animate versions 23.0.7, 24.0.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. • https://helpx.adobe.com/security/products/animate/apsb24-76.html • CWE-122: Heap-based Buffer Overflow •