{"vulnerability": "CVE-2024-3938", "sightings": [{"uuid": "5cbf1ed0-c7d5-4633-9cae-fb376ae9d03d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39385", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114870205065116436", "content": "", "creation_timestamp": "2025-07-17T19:23:49.866885Z"}, {"uuid": "e8c368b7-6be9-4dad-80e2-6092c0bfac1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39380", "type": "seen", "source": "https://t.me/cvedetector/5587", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39380 - Adobe After Effects Heap-based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39380 \nPublished : Sept. 13, 2024, 9:15 a.m. | 20\u00a0minutes ago \nDescription : After Effects versions 23.6.6, 24.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T11:41:40.000000Z"}, {"uuid": "653120f4-689f-4582-bfd9-e06668f94f52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39381", "type": "seen", "source": "https://t.me/cvedetector/5586", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39381 - Adobe After Effects Out-of-Bounds Write Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39381 \nPublished : Sept. 13, 2024, 9:15 a.m. | 20\u00a0minutes ago \nDescription : After Effects versions 23.6.6, 24.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T11:41:40.000000Z"}, {"uuid": "2ed4b2f4-c697-4a44-9eb0-d7b6059de2c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39382", "type": "seen", "source": "https://t.me/cvedetector/5585", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39382 - Adobe After Effects Out-of-Bounds Read Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-39382 \nPublished : Sept. 13, 2024, 9:15 a.m. | 20\u00a0minutes ago \nDescription : After Effects versions 23.6.6, 24.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T11:41:39.000000Z"}, {"uuid": "553f4b58-9a0e-44d5-a533-d83dbf09eb5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39384", "type": "seen", "source": "https://t.me/cvedetector/5584", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39384 - Adobe Premiere Pro Out-of-Bounds Write Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39384 \nPublished : Sept. 13, 2024, 9:15 a.m. | 20\u00a0minutes ago \nDescription : Premiere Pro versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T11:41:38.000000Z"}, {"uuid": "ff4549fe-0a93-46f7-acf9-79bfca902c07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39385", "type": "seen", "source": "https://t.me/cvedetector/5583", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39385 - Adobe Premiere Pro Use After Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39385 \nPublished : Sept. 13, 2024, 9:15 a.m. | 20\u00a0minutes ago \nDescription : Premiere Pro versions 24.5, 23.6.8 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T11:41:34.000000Z"}, {"uuid": "0abb2132-e20b-4c44-a0e5-2140e81a2da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3938", "type": "published-proof-of-concept", "source": "https://t.me/cvedetector/1657", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3938 - Apache DotAdmin HTML Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-3938 \nPublished : July 25, 2024, 10:15 p.m. | 41\u00a0minutes ago \nDescription : The \"reset password\" login page accepted an HTML injection via URL parameters.  \n  \nThis has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a  http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&amp;resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E   \n  \nThis will result in a view along these lines:  \n  \n  \n  \n  \n  \n  *  OWASP Top 10 - A03: Injection  \n  *  CVSS Score: 5.4  \n  *   AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N    \n  *   ...  \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T01:16:50.000000Z"}]}