The host is installed with Adobe InCopy 17.4.1, or 18.x before 18.1 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.