
CVE-2018-4927
https://notcve.org/view.php?id=CVE-2018-4927
19 May 2018 — Adobe InDesign versions 13.0 and below have an exploitable Untrusted Search Path vulnerability. Successful exploitation could lead to local privilege escalation. Adobe InDesign, en versiones 13.0 y anteriores, tiene una vulnerabilidad explotable de ruta de búsqueda no fiable. Su explotación con éxito podría conducir al escalado de privilegios locales. • http://www.securityfocus.com/bid/103716 • CWE-426: Untrusted Search Path •

CVE-2018-4928
https://notcve.org/view.php?id=CVE-2018-4928
19 May 2018 — Adobe InDesign versions 13.0 and below have an exploitable Memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. Adobe InDesign, en versiones 13.0 y anteriores, tiene una vulnerabilidad explotable de corrupción de memoria. Su explotación con éxito podría permitir la ejecución arbitraria de código en el contexto del usuario actual. • http://www.securityfocus.com/bid/103714 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2017-11302
https://notcve.org/view.php?id=CVE-2017-11302
09 Dec 2017 — An issue was discovered in Adobe InDesign 12.1.0 and earlier versions. An exploitable memory corruption vulnerability exists. Successful exploitation could lead to arbitrary code execution. Se ha descubierto un problema en Adobe InDesign 12.1.0 y anteriores. Existe una vulnerabilidad de corrupción de memoria explotable. • http://www.securityfocus.com/bid/101840 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-7886
https://notcve.org/view.php?id=CVE-2016-7886
15 Dec 2016 — Adobe InDesign version 11.4.1 and earlier, Adobe InDesign Server 11.0.0 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. Adobe InDesign versión 11.4.1 y versiones anteriores, Adobe InDesign Server 11.0.0 y versiones anteriores tienen una vulnerabilidad explotable de corrupción de memoria. Una explotación exitosa puede resultar en una ejecución de código arbitrario. • http://www.securityfocus.com/bid/94868 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •