{"vulnerability": "CVE-2024-4183", "sightings": [{"uuid": "b0b95d03-e4e4-4ef3-8a4f-aab9fe8387af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41833", "type": "seen", "source": "https://t.me/cvedetector/3167", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41833 - Adobe Acrobat Reader Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41833 \nPublished : Aug. 14, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T18:13:44.000000Z"}, {"uuid": "b0e9cec1-f657-434f-8130-7ef25e9c1680", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41835", "type": "seen", "source": "https://t.me/cvedetector/3164", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41835 - Adobe Acrobat Reader Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41835 \nPublished : Aug. 14, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T18:13:41.000000Z"}, {"uuid": "edd4431d-05aa-4b87-a213-55562463ae18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41836", "type": "seen", "source": "https://t.me/cvedetector/1502", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41836 - Adobe InDesign NULL Pointer Dereference Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41836 \nPublished : July 23, 2024, 12:15 p.m. | 19\u00a0minutes ago \nDescription : InDesign Desktop versions ID18.5.2, ID19.3 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T14:43:54.000000Z"}, {"uuid": "91f2880b-fae4-42f8-867f-67518c101016", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41839", "type": "seen", "source": "https://t.me/cvedetector/1501", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41839 - Adobe Experience Manager Security Feature Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41839 \nPublished : July 23, 2024, 12:15 p.m. | 19\u00a0minutes ago \nDescription : Adobe Experience Manager versions 6.5.20 and earlier are affected by an Improper Input Validation vulnerability that could lead to a security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and affect the integrity of the page. Exploitation of this issue requires user interaction. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T18:54:40.000000Z"}, {"uuid": "f1523017-085d-4fd4-aadf-94295ae5f76d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41832", "type": "seen", "source": "https://t.me/cvedetector/3165", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41832 - Adobe Acrobat Reader Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41832 \nPublished : Aug. 14, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T18:13:42.000000Z"}, {"uuid": "0829da19-2d77-4324-b942-7dbc12e2a981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41830", "type": "seen", "source": "https://t.me/cvedetector/3166", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41830 - Adobe Acrobat Reader Use After Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41830 \nPublished : Aug. 14, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T18:13:43.000000Z"}, {"uuid": "d3013ffc-913f-4cbb-872a-85dc393075dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41834", "type": "seen", "source": "https://t.me/cvedetector/3169", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41834 - Adobe Acrobat Reader Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41834 \nPublished : Aug. 14, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T18:13:49.000000Z"}, {"uuid": "d21f6655-bbb1-4236-9e6a-1f54084e0a06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41831", "type": "seen", "source": "https://t.me/cvedetector/3168", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41831 - Adobe Acrobat Reader Use After Free Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41831 \nPublished : Aug. 14, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T18:13:48.000000Z"}]}