{"vulnerability": "CVE-2025-3032", "sightings": [{"uuid": "ceb00af4-d8c2-4f36-b76c-a68695aa243d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30320", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2yrdku4vk2", "content": "", "creation_timestamp": "2025-05-13T17:44:11.431819Z"}, {"uuid": "686fda1e-f2a4-4304-97fb-c06551aeeccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3032", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114262832435614839", "content": "", "creation_timestamp": "2025-04-01T13:00:58.663681Z"}, {"uuid": "676ea3e1-8e6d-45d8-8373-b4af67c58a60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30329", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp32x2fl6vr2", "content": "", "creation_timestamp": "2025-05-13T18:11:22.812034Z"}, {"uuid": "1ab76597-43f8-473e-a973-8325859c74ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30328", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp32x4gwj3r2", "content": "", "creation_timestamp": "2025-05-13T18:11:23.394905Z"}, {"uuid": "b0ad6d3f-eecc-4973-8a28-cdd483cf389c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30326", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp32xbyhhj32", "content": "", "creation_timestamp": "2025-05-13T18:11:25.479787Z"}, {"uuid": "49acc248-ea7d-4ba8-b7b9-f32d39744bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30325", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp32xcil5tj2", "content": "", "creation_timestamp": "2025-05-13T18:11:26.261198Z"}, {"uuid": "6d091d2f-162c-4ee5-affd-11c1c96b645d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30324", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp32xjyrtcj2", "content": "", "creation_timestamp": "2025-05-13T18:12:06.662924Z"}, {"uuid": "5de51925-d8b7-4b82-94d4-b72be993527e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30322", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114501971768097313", "content": "", "creation_timestamp": "2025-05-13T18:37:14.995993Z"}, {"uuid": "0329d5af-0398-4b17-815c-f1a9f8e6da49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30324", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114501971768097313", "content": "", "creation_timestamp": "2025-05-13T18:37:15.093584Z"}, {"uuid": "9aaf41d5-3927-4365-8b1e-2b54ea35f966", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30326", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114501971768097313", "content": "", "creation_timestamp": "2025-05-13T18:37:15.188626Z"}, {"uuid": "26ad4fdb-0fda-4cbc-9495-7732c8999e16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30325", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114501971768097313", "content": "", "creation_timestamp": "2025-05-13T18:37:15.287640Z"}, {"uuid": "f17022a7-7bd7-4bae-9512-17c7a9faedb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30324", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3e6lzv4f2h", "content": "", "creation_timestamp": "2025-05-13T20:47:08.541546Z"}, {"uuid": "50f30924-d2b6-4ab2-ad5f-66196fdefe2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30322", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3eae6sgl2o", "content": "", "creation_timestamp": "2025-05-13T20:48:07.978922Z"}, {"uuid": "01020bd9-1156-4c11-8b04-0a02742e278c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30329", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3eaefcyy2t", "content": "", "creation_timestamp": "2025-05-13T20:48:09.274768Z"}, {"uuid": "43650a38-4328-46c4-b2f0-4fd41fc5d9f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30325", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3eaeipst2o", "content": "", "creation_timestamp": "2025-05-13T20:48:09.854026Z"}, {"uuid": "0ef92f3f-e9ce-4834-ab94-2262afffef85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30328", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3eaepkgc2h", "content": "", "creation_timestamp": "2025-05-13T20:48:11.228128Z"}, {"uuid": "3f4751e2-87e2-4d56-ac61-f8a66f45abfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30326", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3eafrcve24", "content": "", "creation_timestamp": "2025-05-13T20:48:16.961488Z"}, {"uuid": "e1f7450c-6bd6-4f0a-9e2e-211f00ef2f1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3032", "type": "seen", "source": "Telegram/zhEuVcxahydHqS41CycExp24MVFwtDnEqI06aNRbe3auxBs", "content": "", "creation_timestamp": "2026-04-13T17:54:56.000000Z"}, {"uuid": "05279a0d-9481-48e8-845b-60efa164944f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30324", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpahexfedk23", "content": "", "creation_timestamp": "2025-05-15T21:27:52.857562Z"}, {"uuid": "db4c6aa0-b8bf-404a-bf4f-ab8b26243a58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30325", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpahexfedk23", "content": "", "creation_timestamp": "2025-05-15T21:27:52.961137Z"}, {"uuid": "0718e792-3462-4225-9648-d88c7a1a3523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30326", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpahexfedk23", "content": "", "creation_timestamp": "2025-05-15T21:27:53.053598Z"}, {"uuid": "1a2628e7-efa6-49a5-86b2-f2b40c7293d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30328", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16188", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30328\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Animate versions 24.0.8, 23.0.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\ud83d\udccf Published: 2025-05-13T17:39:47.676Z\n\ud83d\udccf Modified: 2025-05-13T18:09:45.369Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/animate/apsb25-42.html", "creation_timestamp": "2025-05-13T18:30:57.000000Z"}, {"uuid": "5bd70ed1-7577-4828-b18d-effaec8aaf05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30325", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16196", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30325\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\ud83d\udccf Published: 2025-05-13T17:29:32.679Z\n\ud83d\udccf Modified: 2025-05-13T17:55:14.971Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/photoshop/apsb25-40.html", "creation_timestamp": "2025-05-13T18:31:05.000000Z"}, {"uuid": "2e91690f-7400-486a-861a-d51dc441a356", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30329", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16194", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30329\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Animate versions 24.0.8, 23.0.11 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\ud83d\udccf Published: 2025-05-13T17:39:51.990Z\n\ud83d\udccf Modified: 2025-05-13T18:00:27.854Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/animate/apsb25-42.html", "creation_timestamp": "2025-05-13T18:31:03.000000Z"}, {"uuid": "b6958e5c-750a-43c8-a6a6-13515feddd07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30324", "type": "seen", "source": "https://t.me/cvedetector/25232", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30324 - Adobe Photoshop Integer Underflow Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30324 \nPublished : May 13, 2025, 6:15 p.m. | 59\u00a0minutes ago \nDescription : Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:40.000000Z"}, {"uuid": "c9b3eaa8-5ba1-4da8-b1e0-2e9855e1a87c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30322", "type": "seen", "source": "https://t.me/cvedetector/25231", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30322 - Substance3D Painter Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30322 \nPublished : May 13, 2025, 6:15 p.m. | 59\u00a0minutes ago \nDescription : Substance3D - Painter versions 11.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:39.000000Z"}, {"uuid": "4e64207f-f0cc-473b-a570-2d8a44abd91e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30328", "type": "seen", "source": "https://t.me/cvedetector/25230", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30328 - Animate Out-of-Bounds Write Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30328 \nPublished : May 13, 2025, 6:15 p.m. | 59\u00a0minutes ago \nDescription : Animate versions 24.0.8, 23.0.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:39.000000Z"}, {"uuid": "552c388e-cd4f-494d-8734-794e27dc589c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30326", "type": "seen", "source": "https://t.me/cvedetector/25229", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30326 - Adobe Photoshop Uninitialized Pointer Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30326 \nPublished : May 13, 2025, 6:15 p.m. | 59\u00a0minutes ago \nDescription : Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:38.000000Z"}, {"uuid": "37711064-5023-4254-a4cc-bd03e92ac7cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30325", "type": "seen", "source": "https://t.me/cvedetector/25228", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30325 - Adobe Photoshop Integer Overflow Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-30325 \nPublished : May 13, 2025, 6:15 p.m. | 59\u00a0minutes ago \nDescription : Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:34.000000Z"}, {"uuid": "ae2950d9-67b4-489b-a076-73c962531bc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30329", "type": "seen", "source": "https://t.me/cvedetector/25226", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30329 - Adobe Animate NULL Pointer Dereference Denial-of-Service\", \n  \"Content\": \"CVE ID : CVE-2025-30329 \nPublished : May 13, 2025, 6:15 p.m. | 59\u00a0minutes ago \nDescription : Animate versions 24.0.8, 23.0.11 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:33.000000Z"}, {"uuid": "ef28d4d1-84bf-4215-9850-bb74d3058e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30321", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17916", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30321\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\ud83d\udccf Published: 2025-06-10T16:23:05.000Z\n\ud83d\udccf Modified: 2025-06-10T16:23:05.000Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/indesign/apsb25-53.html", "creation_timestamp": "2025-06-10T16:31:37.000000Z"}, {"uuid": "00bba4c0-bde7-4786-b2db-a8f55f1163bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30327", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17982", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30327\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: InCopy versions 20.2, 19.5.3 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\ud83d\udccf Published: 2025-06-10T18:50:41.016Z\n\ud83d\udccf Modified: 2025-06-10T19:10:24.863Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/incopy/apsb25-41.html", "creation_timestamp": "2025-06-10T19:31:26.000000Z"}]}