{"vulnerability": "CVE-2024-4187", "sightings": [{"uuid": "df242c51-b48a-4daf-beea-2a0d994524e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41877", "type": "seen", "source": "https://t.me/cvedetector/4022", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41877 - Adobe Experience Manager Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41877 \nPublished : Aug. 23, 2024, 5:15 p.m. | 19\u00a0minutes ago \nDescription : Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-23T19:38:44.000000Z"}, {"uuid": "2b646cbb-c8f0-4522-98b7-802a811a5641", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41876", "type": "seen", "source": "https://t.me/cvedetector/4021", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41876 - Adobe Experience Manager Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41876 \nPublished : Aug. 23, 2024, 5:15 p.m. | 19\u00a0minutes ago \nDescription : Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-23T19:38:43.000000Z"}, {"uuid": "e8c8040f-e1fd-4e8c-895f-7026693b0748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41878", "type": "seen", "source": "https://t.me/cvedetector/4019", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41878 - Adobe Experience Manager DOM-based Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41878 \nPublished : Aug. 23, 2024, 5:15 p.m. | 19\u00a0minutes ago \nDescription : Adobe Experience Manager versions 6.5.19 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to inject and execute arbitrary JavaScript code within the context of the user's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a malicious link. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-23T19:38:42.000000Z"}, {"uuid": "4fd21a43-402c-4e74-8cac-b83961785357", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41879", "type": "seen", "source": "https://t.me/cvedetector/4138", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41879 - Adobe Acrobat Reader Out-of-Bounds Write Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41879 \nPublished : Aug. 26, 2024, 12:15 p.m. | 42\u00a0minutes ago \nDescription : Acrobat Reader versions 127.0.2651.105 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T15:23:58.000000Z"}, {"uuid": "4226b630-c876-4f29-8e75-8167d700fc8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4187", "type": "seen", "source": "https://t.me/cvedetector/2173", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4187 - OpenText Filr Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-4187 \nPublished : July 31, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Stored XSS vulnerability has been discovered in OpenText\u2122 Filr product, affecting versions 24.1.1 and 24.2. The vulnerability could cause users to not be warned when clicking links to external sites. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-01T00:21:51.000000Z"}, {"uuid": "4f4ca922-20ca-42e6-a722-1f0b8ee381f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41874", "type": "seen", "source": "https://t.me/cvedetector/5594", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41874 - ColdFusion Remote Code Execution via Deserialization\", \n  \"Content\": \"CVE ID : CVE-2024-41874 \nPublished : Sept. 13, 2024, 10:15 a.m. | 39\u00a0minutes ago \nDescription : ColdFusion versions 2023.9, 2021.15 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could exploit this vulnerability by providing crafted input to the application, which when deserialized, leads to execution of malicious code. Exploitation of this issue does not require user interaction. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T12:56:58.000000Z"}, {"uuid": "ca09db57-a560-45c3-b909-c1ecc882b71b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41872", "type": "seen", "source": "https://t.me/cvedetector/5573", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41872 - Adobe Media Encoder Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41872 \nPublished : Sept. 13, 2024, 7:15 a.m. | 19\u00a0minutes ago \nDescription : Media Encoder versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T09:36:16.000000Z"}, {"uuid": "c48c14c1-bba4-493a-9fcf-394a84a3cb1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41871", "type": "seen", "source": "https://t.me/cvedetector/5572", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41871 - Adobe Media Encoder Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41871 \nPublished : Sept. 13, 2024, 7:15 a.m. | 19\u00a0minutes ago \nDescription : Media Encoder versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T09:36:15.000000Z"}, {"uuid": "9754d4d9-a5d2-44c2-a883-13876525e59c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41875", "type": "seen", "source": "https://t.me/cvedetector/4025", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41875 - Adobe Experience Manager Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41875 \nPublished : Aug. 23, 2024, 5:15 p.m. | 19\u00a0minutes ago \nDescription : Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-23T19:38:50.000000Z"}]}