Adobe Incopy vulnerabilities

60 known vulnerabilities affecting adobe/incopy.

Total CVEs
60
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH53MEDIUM7

Vulnerabilities

Page 1 of 3
CVE-2026-21281HIGHCVSS 7.8fixed in 20.5.1v21.0+1 more2026-01-13
CVE-2026-21281 [HIGH] CWE-122 CVE-2026-21281: InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-61817HIGHCVSS 7.8≤ 19.5.5≥ 20.0, < 20.5.12025-11-11
CVE-2025-61817 [HIGH] CWE-416 CVE-2025-61817: InCopy versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could r InCopy versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-61816HIGHCVSS 7.8≤ 19.5.5≥ 20.0, < 20.5.12025-11-11
CVE-2025-61816 [HIGH] CWE-122 CVE-2025-61816: InCopy versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability InCopy versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-61818HIGHCVSS 7.8≤ 19.5.5≥ 20.0, < 20.5.12025-11-11
CVE-2025-61818 [HIGH] CWE-416 CVE-2025-61818: InCopy versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could r InCopy versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-54221HIGHCVSS 7.8fixed in 19.5.5≥ 20.0, < 20.5+1 more2025-08-12
CVE-2025-54221 [HIGH] CWE-787 CVE-2025-54221: InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that c InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-54217HIGHCVSS 7.8fixed in 19.5.5≥ 20.0, < 20.5+1 more2025-08-12
CVE-2025-54217 [HIGH] CWE-122 CVE-2025-54217: InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-54216HIGHCVSS 7.8fixed in 19.5.5≥ 20.0, < 20.5+1 more2025-08-12
CVE-2025-54216 [HIGH] CWE-787 CVE-2025-54216: InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that c InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-54215HIGHCVSS 7.8fixed in 19.5.5≥ 20.0, < 20.5+1 more2025-08-12
CVE-2025-54215 [HIGH] CWE-787 CVE-2025-54215: InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that c InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-54220HIGHCVSS 7.8fixed in 19.5.5≥ 20.0, < 20.5+1 more2025-08-12
CVE-2025-54220 [HIGH] CWE-122 CVE-2025-54220: InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-54219HIGHCVSS 7.8fixed in 19.5.5≥ 20.0, < 20.5+1 more2025-08-12
CVE-2025-54219 [HIGH] CWE-122 CVE-2025-54219: InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-54223HIGHCVSS 7.8fixed in 19.5.5≥ 20.0, < 20.5+1 more2025-08-12
CVE-2025-54223 [HIGH] CWE-416 CVE-2025-54223: InCopy versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could r InCopy versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-54218HIGHCVSS 7.8fixed in 19.5.5≥ 20.0, < 20.5+1 more2025-08-12
CVE-2025-54218 [HIGH] CWE-787 CVE-2025-54218: InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that c InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-47097HIGHCVSS 7.8fixed in 19.5.4≥ 20.0, < 20.4+1 more2025-07-08
CVE-2025-47097 [HIGH] CWE-191 CVE-2025-47097: InCopy versions 20.3, 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) v InCopy versions 20.3, 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-47099HIGHCVSS 7.8fixed in 19.5.4≥ 20.0, < 20.4+1 more2025-07-08
CVE-2025-47099 [HIGH] CWE-122 CVE-2025-47099: InCopy versions 20.3, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability InCopy versions 20.3, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-47098HIGHCVSS 7.8fixed in 19.5.4≥ 20.0, < 20.4+1 more2025-07-08
CVE-2025-47098 [HIGH] CWE-824 CVE-2025-47098: InCopy versions 20.3, 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerab InCopy versions 20.3, 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-30327HIGHCVSS 7.8fixed in 19.5.4≥ 20.0, < 20.3+1 more2025-06-10
CVE-2025-30327 [HIGH] CWE-190 CVE-2025-30327: InCopy versions 20.2, 19.5.3 and earlier are affected by an Integer Overflow or Wraparound vulnerabi InCopy versions 20.2, 19.5.3 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-47107HIGHCVSS 7.8fixed in 19.5.4≥ 20.0, < 20.3+1 more2025-06-10
CVE-2025-47107 [HIGH] CWE-122 CVE-2025-47107: InCopy versions 20.2, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability InCopy versions 20.2, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2025-21156HIGHCVSS 7.8fixed in 19.5.2v20.0+1 more2025-02-11
CVE-2025-21156 [HIGH] CWE-191 CVE-2025-21156: InCopy versions 20.0, 19.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) v InCopy versions 20.0, 19.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd
CVE-2024-45136HIGHCVSS 7.8fixed in 18.5.4≥ 19.0, < 19.5+1 more2024-10-09
CVE-2024-45136 [HIGH] CWE-434 CVE-2024-45136: InCopy versions 19.4, 18.5.3 and earlier are affected by an Unrestricted Upload of File with Dangero InCopy versions 19.4, 18.5.3 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution by an attacker. An attacker could exploit this vulnerability by uploading a malicious file which can then be executed on the server. Exploitation of this issue requires user interaction
cvelistv5nvd
CVE-2024-41858HIGHCVSS 7.8≤ 18.5.2≥ 19.0, < 19.42024-08-14
CVE-2024-41858 [HIGH] CWE-190 CVE-2024-41858: InCopy versions 18.5.2, 19.4 and earlier are affected by an Integer Overflow or Wraparound vulnerabi InCopy versions 18.5.2, 19.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
cvelistv5nvd