Improper control of generation of code ('code injection') in Microsoft Data Formulator allows an unauthorized attacker to execute code over a network.
According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution? The vulnerability can be exploited remotely over the network without administrative privileges, but exploitation requires user interaction to trigger processing of user‑supplied input by the affected service.
<a href="https://x.com/security_index">Yoshizawa</a>