Lucene search

K

6 matches found

CVE
CVE
added 2025/02/11 6:15 p.m.57 views

CVE-2025-21156

InCopy versions 20.0, 19.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.8AI score0.00029EPSS
CVE
CVE
added 2025/06/10 7:15 p.m.39 views

CVE-2025-47107

InCopy versions 20.2, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.6AI score0.00029EPSS
CVE
CVE
added 2025/06/10 7:15 p.m.37 views

CVE-2025-30327

InCopy versions 20.2, 19.5.3 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.6AI score0.00029EPSS
CVE
CVE
added 2025/07/08 11:15 p.m.6 views

CVE-2025-47098

InCopy versions 20.3, 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7AI score0.00027EPSS
CVE
CVE
added 2025/07/08 11:15 p.m.5 views

CVE-2025-47097

InCopy versions 20.3, 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7AI score0.00027EPSS
CVE
CVE
added 2025/07/08 11:15 p.m.5 views

CVE-2025-47099

InCopy versions 20.3, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7AI score0.00027EPSS