{"vulnerability": "CVE-2024-41947", "sightings": [{"uuid": "06d1c5d9-998d-4803-a76e-d89bd84d4ad3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41947", "type": "seen", "source": "https://t.me/cvedetector/2147", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41947 - XWiki Platform JavaScript Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41947 \nPublished : July 31, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. By creating a conflict when another user with more rights is currently editing a page, it is possible to execute JavaScript snippets on the side of the other user, which compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.10.8 and 16.3.0RC1. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T19:20:42.000000Z"}, {"uuid": "b0fac6ca-0962-4062-9b8a-24cc60e74b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41947", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmxigystby27", "content": "", "creation_timestamp": "2025-04-16T21:02:25.163881Z"}]}