CVE-2021-43016
- EPSS 0.41%
- Veröffentlicht 22.11.2021 16:15:08
- Zuletzt bearbeitet 21.11.2024 06:28:28
Adobe InCopy version 16.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the co...
CVE-2021-43015
- EPSS 0.99%
- Veröffentlicht 22.11.2021 16:15:08
- Zuletzt bearbeitet 21.11.2024 06:28:28
Adobe InCopy version 16.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious GIF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is requi...
CVE-2021-39819
- EPSS 8.65%
- Veröffentlicht 27.09.2021 16:15:09
- Zuletzt bearbeitet 21.11.2024 06:20:18
Adobe InCopy version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious XML file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is requi...
CVE-2021-39818
- EPSS 8.65%
- Veröffentlicht 27.09.2021 16:15:09
- Zuletzt bearbeitet 21.11.2024 06:20:18
Adobe InCopy version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is requ...
CVE-2021-21090
- EPSS 0.62%
- Veröffentlicht 28.06.2021 14:15:09
- Zuletzt bearbeitet 21.11.2024 05:47:32
Adobe InCopy version 16.0 (and earlier) is affected by an path traversal vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve remote code execution in the context of the current user. Exp...
CVE-2021-21010
- EPSS 1.64%
- Veröffentlicht 13.01.2021 23:15:14
- Zuletzt bearbeitet 21.11.2024 05:47:23
InCopy version 15.1.1 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a ...