{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T18:28:17.776","vulnerabilities":[{"cve":{"id":"CVE-2026-21358","sourceIdentifier":"psirt@adobe.com","published":"2026-02-10T18:16:32.857","lastModified":"2026-02-11T18:28:40.647","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"InDesign Desktop versions 21.1, 20.5.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file."},{"lang":"es","value":"Las versiones de escritorio de InDesign 21.1, 20.5.1 y anteriores se ven afectadas por una vulnerabilidad de desbordamiento de búfer basado en montículo que podría resultar en una denegación de servicio de la aplicación. Un atacante podría explotar esta vulnerabilidad para bloquear la aplicación, causando interrupción en los servicios. La explotación de este problema requiere interacción del usuario en el sentido de que la víctima debe abrir un archivo malicioso."}],"metrics":{"cvssMetricV31":[{"source":"psirt@adobe.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@adobe.com","type":"Primary","description":[{"lang":"en","value":"CWE-122"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*","versionEndExcluding":"20.5.2","matchCriteriaId":"75FF6705-31FC-4B07-BDBE-C82A6A52FD14"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*","versionStartIncluding":"21.0","versionEndExcluding":"21.2","matchCriteriaId":"8A1253BD-81D4-4241-832A-5A9614CCF525"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","matchCriteriaId":"387021A0-AF36-463C-A605-32EA7DAC172E"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://helpx.adobe.com/security/products/indesign/apsb26-17.html","source":"psirt@adobe.com","tags":["Vendor Advisory"]}]}}]}