Common Vulnerabilities and Exposures (CVE)

CVE-2025-61817

Nov 12, 2025 04:57:55 UTC

InCopy versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim ...

CVE-2025-61815

Nov 12, 2025 04:57:54 UTC

InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that...

CVE-2025-61814

Nov 12, 2025 04:57:54 UTC

InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that...

CVE-2025-61824

Nov 12, 2025 04:57:53 UTC

InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interac...

CVE-2025-61832

Nov 12, 2025 04:57:52 UTC

InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interac...

CVE-2025-61819

Nov 12, 2025 04:57:52 UTC

Photoshop Desktop versions 26.8.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction ...

CVE-2025-64531

Nov 12, 2025 04:57:51 UTC

Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a ...

CVE-2025-61834

Nov 12, 2025 04:57:50 UTC

Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a ...

CVE-2025-61833

Nov 12, 2025 04:57:50 UTC

Substance3D - Stager versions 3.1.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vul...

CVE-2025-61835

Nov 12, 2025 04:57:49 UTC

Substance3D - Stager versions 3.1.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires us...

CVE-2025-9055

Nov 12, 2025 04:57:48 UTC

The VAPIX Edge storage API that allowed a privilege escalation, enabling a VAPIX administrator-privileged user to gain Linux Root privileges. This flaw can only be exploited after authenticating with an administrator-privileged service acco...

CVE-2025-8108

Nov 12, 2025 04:57:47 UTC

An ACAP configuration file has improper permissions and lacks input validation, which could potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of uns...

CVE-2025-6779

Nov 12, 2025 04:57:47 UTC

An ACAP configuration file has improper permissions, which could allow command injection and potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of un...

CVE-2025-6571

Nov 12, 2025 04:57:46 UTC

A 3rd-party component exposed its password in process arguments, allowing for low-privileged users to access it.

CVE-2025-5452

Nov 12, 2025 04:57:45 UTC

A malicious ACAP application can gain access to admin-level service account credentials used by legitimate ACAP applications, leading to potential privilege escalation of the malicious ACAP application. This vulnerability can only be exploi...