{"uuid": "fac68820-77e4-494c-b43c-c76d8af7340f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8125", "type": "seen", "source": "https://t.me/cvedetector/17242", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8125 - OpenText Content Management (Extended ECM) WebReports Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8125 \nPublished : Feb. 4, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Improper Validation of Specified Type of Input vulnerability in OpenText\u2122 Content Management (Extended ECM) allows Parameter Injection.\u00a0  \n  \nA bad actor with the required OpenText Content Management privileges (not root) could expose  \nthe vulnerability to carry out a remote code execution attack on the target system.  \n  \nThis issue affects Content Management (Extended ECM): from 10.0 through 24.4\u00a0  \n  \n with WebReports module  \ninstalled and enabled. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T00:45:43.000000Z"}