Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
indesign Vendor: adobe

About This Product

indesign is a software product developed by adobe, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 181 known vulnerabilities affecting adobe indesign. This includes 3 critical-severity issues and 107 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2006 to 2026, indicating a sustained research interest and ongoing security attention. 70 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2006-0525 2006-02-02 2025-04-03 - 4.6 Unknown
CVE-2016-7886 2016-12-15 2025-04-12 9.8 10.0 Likely
CVE-2017-11302 2017-12-09 2025-04-20 9.8 10.0 Likely
CVE-2018-4927 2018-05-19 2024-11-21 7.8 6.8 Likely
CVE-2018-4928 2018-05-19 2024-11-21 7.8 9.3 Likely
CVE-2019-7107 2019-05-23 2024-11-21 9.8 10.0 Likely
CVE-2020-9727 2020-09-10 2024-11-21 7.8 6.8 Likely
CVE-2020-9728 2020-09-10 2024-11-21 7.8 6.8 Likely
CVE-2020-9729 2020-09-10 2024-11-21 7.8 6.8 Likely
CVE-2020-9730 2020-09-10 2024-11-21 7.8 6.8 Likely
CVE-2020-9731 2020-09-10 2024-11-21 7.8 6.8 Likely
CVE-2020-24421 2020-10-21 2024-11-21 5.5 4.3 Likely
CVE-2021-21098 2021-06-28 2024-11-21 8.8 9.3 Likely
CVE-2021-21099 2021-06-28 2024-11-21 8.8 9.3 Likely
CVE-2021-36004 2021-07-30 2024-11-21 8.8 6.8 Likely
CVE-2021-39821 2021-09-29 2024-11-21 7.8 6.8 Likely
CVE-2021-42731 2021-11-16 2024-11-21 7.8 9.3 Likely
CVE-2021-45057 2022-01-13 2024-11-21 7.8 6.8 Likely
CVE-2021-45058 2022-01-13 2024-11-21 7.8 6.8 Likely
CVE-2021-45059 2022-01-13 2024-11-21 3.3 4.3 Likely
CVE-2021-39820 2022-06-15 2024-11-21 7.8 6.8 Likely
CVE-2021-40727 2022-06-15 2024-11-21 7.8 9.3 Likely
CVE-2021-42732 2022-06-15 2024-11-21 7.8 6.8 Likely
CVE-2022-30658 2022-06-16 2024-11-21 7.8 9.3 Likely
CVE-2022-30659 2022-06-16 2024-11-21 7.8 9.3 Likely
CVE-2022-30660 2022-06-16 2024-11-21 7.8 9.3 Likely
CVE-2022-30661 2022-06-16 2024-11-21 7.8 9.3 Likely
CVE-2022-30662 2022-06-16 2024-11-21 7.8 9.3 Likely
CVE-2022-30663 2022-06-16 2024-11-21 7.8 9.3 Likely
CVE-2022-30665 2022-06-16 2024-11-21 7.8 9.3 Likely
CVE-2022-34245 2022-07-15 2024-11-21 7.8 - -
CVE-2022-34246 2022-07-15 2024-11-21 7.8 - -
CVE-2022-34247 2022-07-15 2024-11-21 7.8 - -
CVE-2022-34248 2022-07-15 2024-11-21 5.5 - -
CVE-2022-28852 2022-09-16 2024-11-21 7.8 - -
CVE-2022-28853 2022-09-16 2024-11-21 7.8 - -
CVE-2022-28854 2022-09-16 2024-11-21 5.5 - -
CVE-2022-28855 2022-09-16 2024-11-21 5.5 - -
CVE-2022-28856 2022-09-16 2024-11-21 5.5 - -
CVE-2022-28857 2022-09-16 2024-11-21 5.5 - -
CVE-2022-30671 2022-09-16 2024-11-21 5.5 - -
CVE-2022-30672 2022-09-16 2024-11-21 5.5 - -
CVE-2022-30673 2022-09-16 2024-11-21 5.5 - -
CVE-2022-30674 2022-09-16 2024-11-21 5.5 - -
CVE-2022-30675 2022-09-16 2024-11-21 5.5 - -
CVE-2022-30676 2022-09-16 2024-11-21 5.5 - -
CVE-2022-38413 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38414 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38415 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38416 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38417 2022-09-16 2024-11-21 7.8 - -
CVE-2023-21587 2023-01-13 2024-11-21 7.8 - -
CVE-2023-21588 2023-01-13 2024-11-21 7.8 - -
CVE-2023-21589 2023-01-13 2024-11-21 7.8 - -
CVE-2023-21590 2023-01-13 2024-11-21 7.8 - -
CVE-2023-21591 2023-01-13 2024-11-21 5.5 - -
CVE-2023-21592 2023-01-13 2024-11-21 5.5 - -
CVE-2023-21593 2023-02-17 2024-11-21 5.5 - -
CVE-2023-29308 2023-07-12 2024-11-21 7.8 - -
CVE-2023-29309 2023-07-12 2024-11-21 5.5 - -
CVE-2023-29310 2023-07-12 2024-11-21 5.5 - -
CVE-2023-29311 2023-07-12 2024-11-21 5.5 - -
CVE-2023-29312 2023-07-12 2024-11-21 5.5 - -
CVE-2023-29313 2023-07-12 2024-11-21 5.5 - -
CVE-2023-29314 2023-07-12 2024-11-21 5.5 - -
CVE-2023-29315 2023-07-12 2024-11-21 5.5 - -
CVE-2023-29316 2023-07-12 2024-11-21 5.5 - -
CVE-2023-29317 2023-07-12 2024-11-21 5.5 - -
CVE-2023-29318 2023-07-12 2024-11-21 5.5 - -
CVE-2023-29319 2023-07-12 2024-11-21 5.5 - -
CVE-2021-39822 2023-07-20 2024-11-21 7.8 - -
CVE-2022-28831 2023-09-11 2024-11-21 7.8 - -
CVE-2022-28832 2023-09-11 2024-11-21 7.8 - -
CVE-2022-28833 2023-09-11 2024-11-21 7.8 - -
CVE-2023-47076 2023-12-13 2024-11-21 5.5 - -
CVE-2023-47077 2023-12-13 2024-11-21 5.5 - -
CVE-2023-44341 2024-02-29 2024-12-02 5.5 - -
CVE-2023-44342 2024-02-29 2024-12-02 5.5 - -
CVE-2023-44343 2024-02-29 2024-12-02 5.5 - -
CVE-2023-44344 2024-02-29 2024-12-02 5.5 - -
CVE-2023-44345 2024-02-29 2024-12-02 5.5 - -
CVE-2023-44346 2024-02-29 2024-12-02 5.5 - -
CVE-2023-44347 2024-02-29 2024-12-02 5.5 - -
CVE-2024-20766 2024-04-10 2024-12-05 5.5 - -
CVE-2024-20781 2024-07-09 2024-11-21 7.8 - -
CVE-2024-20782 2024-07-09 2024-11-21 7.8 - -
CVE-2024-20783 2024-07-09 2024-11-21 7.8 - -
CVE-2024-20785 2024-07-09 2024-11-21 7.8 - -
CVE-2024-41836 2024-07-23 2024-12-12 5.5 - -
CVE-2024-39392 2024-08-02 2024-12-02 7.8 - -
CVE-2024-39396 2024-08-02 2024-12-02 5.5 - -
CVE-2024-34127 2024-08-14 2024-09-16 5.5 - -
CVE-2024-39389 2024-08-14 2024-08-19 7.8 - -
CVE-2024-39390 2024-08-14 2024-08-19 7.8 - -
CVE-2024-39391 2024-08-14 2024-08-19 7.8 - -
CVE-2024-39393 2024-08-14 2024-08-19 7.8 - -
CVE-2024-39394 2024-08-14 2024-08-19 7.8 - -
CVE-2024-39395 2024-08-14 2024-08-19 5.5 - -
CVE-2024-41850 2024-08-14 2024-08-19 7.8 - -
CVE-2024-41851 2024-08-14 2024-08-19 7.8 - -
CVE-2024-41852 2024-08-14 2024-08-19 7.8 - -
CVE-2024-41853 2024-08-14 2024-08-19 7.8 - -
CVE-2024-41854 2024-08-14 2024-08-19 5.5 - -
CVE-2024-41866 2024-08-14 2024-08-19 5.5 - -
CVE-2024-45137 2024-10-09 2024-10-18 7.8 - -
CVE-2024-49507 2024-11-12 2024-11-16 7.8 - -
CVE-2024-49508 2024-11-12 2024-11-16 7.8 - -
CVE-2024-49509 2024-11-12 2024-11-16 7.8 - -
CVE-2024-49510 2024-11-12 2024-11-16 5.5 - -
CVE-2024-49511 2024-11-12 2024-11-16 5.5 - -
CVE-2024-49512 2024-11-12 2024-11-16 5.5 - -
CVE-2024-49529 2024-11-21 2024-12-03 5.5 - -
CVE-2024-49543 2024-12-10 2024-12-18 7.8 - -
CVE-2024-49544 2024-12-10 2024-12-18 7.8 - -
CVE-2024-49545 2024-12-10 2024-12-18 7.8 - -
CVE-2024-49546 2024-12-10 2024-12-18 5.5 - -
CVE-2024-49547 2024-12-10 2024-12-18 5.5 - -
CVE-2024-49548 2024-12-10 2024-12-18 5.5 - -
CVE-2024-49549 2024-12-10 2024-12-18 5.5 - -
CVE-2024-53951 2024-12-10 2024-12-18 5.5 - -
CVE-2024-53952 2024-12-10 2024-12-18 5.5 - -
CVE-2025-21121 2025-02-11 2025-03-03 7.8 - -
CVE-2025-21123 2025-02-11 2025-03-03 7.8 - -
CVE-2025-21124 2025-02-11 2025-03-03 5.5 - -
CVE-2025-21125 2025-02-11 2025-03-03 5.5 - -
CVE-2025-21126 2025-02-11 2025-03-03 5.5 - -
CVE-2025-21157 2025-02-11 2025-03-03 7.8 - -
CVE-2025-21158 2025-02-11 2025-03-03 7.8 - -
CVE-2025-24452 2025-03-11 2025-04-28 7.8 - -
CVE-2025-24453 2025-03-11 2025-04-28 7.8 - -
CVE-2025-27166 2025-03-11 2025-04-28 7.8 - -
CVE-2025-27171 2025-03-11 2025-04-28 7.8 - -
CVE-2025-27175 2025-03-11 2025-04-28 7.8 - -
CVE-2025-27176 2025-03-11 2025-04-14 5.5 - -
CVE-2025-27177 2025-03-11 2025-04-14 7.8 - -
CVE-2025-27178 2025-03-11 2025-04-14 7.8 - -
CVE-2025-27179 2025-03-11 2025-04-14 5.5 - -
CVE-2025-30318 2025-05-13 2025-05-14 7.8 - -
CVE-2025-30319 2025-05-13 2025-05-14 5.5 - -
CVE-2025-30320 2025-05-13 2025-05-14 5.5 - -
CVE-2025-30317 2025-06-10 2025-06-16 7.8 - -
CVE-2025-30321 2025-06-10 2025-06-16 5.5 - -
CVE-2025-43558 2025-06-10 2025-06-16 7.8 - -
CVE-2025-43589 2025-06-10 2025-06-16 7.8 - -
CVE-2025-43590 2025-06-10 2025-06-16 7.8 - -
CVE-2025-43593 2025-06-10 2025-06-16 7.8 - -
CVE-2025-47104 2025-06-10 2025-06-16 5.5 - -
CVE-2025-47105 2025-06-10 2025-06-16 5.5 - -
CVE-2025-47106 2025-06-10 2025-06-16 5.5 - -
CVE-2025-43591 2025-07-08 2025-07-10 7.8 - -
CVE-2025-43592 2025-07-08 2025-07-10 7.8 - -
CVE-2025-43594 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47103 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47134 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47136 2025-07-08 2025-07-10 7.8 - -
CVE-2025-54206 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54207 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54208 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54209 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54210 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54211 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54212 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54213 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54214 2025-08-12 2025-08-13 5.5 - -
CVE-2025-54224 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54225 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54226 2025-08-12 2025-08-13 7.8 - -
CVE-2025-54227 2025-08-12 2025-08-13 5.5 - -
CVE-2025-54228 2025-08-12 2025-08-13 5.5 - -
CVE-2025-61814 2025-11-11 2025-11-12 7.8 - -
CVE-2025-61815 2025-11-11 2025-11-12 7.8 - -
CVE-2025-61824 2025-11-11 2025-11-12 7.8 - -
CVE-2025-61832 2025-11-11 2025-11-12 7.8 - -
CVE-2026-21275 2026-01-13 2026-01-14 7.8 - -
CVE-2026-21276 2026-01-13 2026-01-14 7.8 - -
CVE-2026-21277 2026-01-13 2026-01-14 7.8 - -
CVE-2026-21278 2026-01-13 2026-01-14 5.5 - -
CVE-2026-21304 2026-01-13 2026-01-14 7.8 - -
CVE-2026-21332 2026-02-10 2026-02-11 5.5 - -
CVE-2026-21357 2026-02-10 2026-02-11 7.8 - -
CVE-2026-21358 2026-02-10 2026-02-11 5.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for adobe indesign by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.