NA - CVE-2024-40591 - An incorrect privilege assignment vulnerability...
An incorrect privilege assignment vulnerability [CWE-266] in Fortinet FortiOS version 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.9 and before 7.0.15 allows an authenticated admin whose access...
NA - CVE-2024-50567 - An improper neutralization of special elements...
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb 7.4.0 through 7.6.0 allows attacker to execute unauthorized code or...
NA - CVE-2024-50569 - A improper neutralization of special elements...
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb 7.0.0 through 7.6.0 allows attacker to execute unauthorized code or...
NA - CVE-2024-52966 - An exposure of sensitive information to an...
An exposure of sensitive information to an unauthorized actor in Fortinet FortiAnalyzer 6.4.0 through 7.6.0 allows attacker to cause information disclosure via filter manipulation.
High - CVE-2025-21121 - InDesign Desktop versions ID20.0, ID19.5.1 and...
InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user....
High - CVE-2025-21123 - InDesign Desktop versions ID20.0, ID19.5.1 and...
InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user....
Medium - CVE-2025-21124 - InDesign Desktop versions ID20.0, ID19.5.1 and...
InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this...
Medium - CVE-2025-21125 - InDesign Desktop versions ID20.0, ID19.5.1 and...
InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this...