搜索结果
关于「experience_manager」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2024-43715 | Adobe Experience Manager | 跨站点脚本(基于 DOM 的 XSS)(CWE-79)(CVE-2024-43715) | 2024-12-11 | ||
AVD-2024-52991 | Adobe Experience Manager | 跨站点脚本(存储型 XSS)(CWE-79)(CVE-2024-52991) | 2024-12-11 | ||
AVD-2024-52992 | Adobe Experience Manager | 跨站点脚本(存储型 XSS)(CWE-79)(CVE-2024-52992) | 2024-12-11 | ||
AVD-2024-52853 | Adobe Experience Manager | 跨站点脚本(存储型 XSS)(CWE-79)(CVE-2024-52853) | 2024-12-11 | ||
AVD-2024-52854 | Adobe Experience Manager | 跨站点脚本(存储型 XSS)(CWE-79)(CVE-2024-52854) | 2024-12-11 | ||
AVD-2024-52847 | Adobe Experience Manager | 跨站点脚本(存储型 XSS)(CWE-79)(CVE-2024-52847) | 2024-12-11 | ||
AVD-2024-52862 | Adobe Experience Manager | 跨站点脚本(存储型 XSS)(CWE-79)(CVE-2024-52862) | 2024-12-11 | ||
AVD-2024-52843 | Adobe Experience Manager | 跨站点脚本(存储型 XSS)(CWE-79)(CVE-2024-52843) | 2024-12-11 | ||
AVD-2024-43713 | Adobe Experience Manager | 跨站点脚本(基于 DOM 的 XSS)(CWE-79)(CVE-2024-43713) | 2024-12-11 | ||
AVD-2024-49524 | Adobe Experience Manager | 跨站点脚本(基于 DOM 的 XSS)(CWE-79)(CVE-2024-49524) | 2024-11-08 | ||
AVD-2024-49523 | Adobe Experience Manager | 跨站点脚本(存储型 XSS)(CWE-79)(CVE-2024-49523) | 2024-11-08 | ||
AVD-2024-45153 | Adobe Experience Manager | 跨站点脚本(存储型 XSS)(CWE-79)(CVE-2024-45153) | 2024-10-07 | ||
AVD-2024-46938 | SiteCore 文件读取漏洞(CVE-2024-46938) | 2024-09-16 | ||
AVD-2024-41848 | AMS XSS——/libs/dam/gui/coral/components/admin/reports/viewreport/clientlibs/viewreport/js/viewreport.js (JS) (CVE-2024-41848) | 2024-08-24 | ||
AVD-2024-41841 | AMS XSS——/libs/cq/personalization/components/profileloader/content/load.js (CVE-2024-41841) | 2024-08-24 | ||
AVD-2024-41843 | `libs/granite/ui/components/coral/foundation/clientlibs/foundation/js/layout/actionfield.js` 中的存储型 XSS (CVE-2024-41843) | 2024-08-24 | ||
AVD-2024-41849 | `https://author-bugbounty-65-prod.adobecqms.net/` 上的 HTML 注入 (CVE-2024-41849) | 2024-08-24 | ||
AVD-2024-41875 | AMS XSS——/libs/dam/gui/components/admin/collections/clientlibs/admin/js/collectionoperationsactivator.js (CVE-2024-41875) | 2024-08-24 | ||
AVD-2024-41847 | 云服务 - /libs/cq/contexthub/components/traits/generic-comparison/generic-comparison.jsp(重新测试 2132455 - 未修复)(CVE-2024-41847) | 2024-08-24 | ||
AVD-2024-41842 | 跨站点脚本漏洞 | AEM(CVE-2024-41842) | 2024-08-24 | ||
AVD-2024-41844 | `libs/dam/gui/coral/components/admin/clientlibs/actions/js/download.js` 中的存储型 XSS(CVE-2024-41844) | 2024-08-24 | ||
AVD-2024-41846 | AMS XSS——/libs/dam/gui/coral/components/admin/drm/licensefield/licensefield.jsp (CVE-2024-41846) | 2024-08-24 | ||
AVD-2024-41877 | AMS XSS——/libs/dam/gui/coral/components/admin/clientlibs/actions/js/download.js (CVE-2024-41877) | 2024-08-24 | ||
AVD-2024-41876 | AMS XSS - /libs/clientlibs/granite/richtext/externals/tests/resources/test/index.html(1969052 重新测试 - 未修复)(CVE-2024-41876) | 2024-08-24 | ||
AVD-2024-41878 | AMS XSS——/libs/granite/ui/components/foundation/clientlibs/foundation/js/admin/propertiesactivator.js (CVE-2024-41878) | 2024-08-24 | ||
AVD-2024-41845 | `libs/dam/gui/components/admin/collections/clientlibs/admin/js/collectionoperationsactivator.js` 中的存储型 XSS (CVE-2024-41845) | 2024-08-24 | ||
AVD-2024-34128 | 通过 loadingMask 在“libs/granite/ui/components/coral/foundation/clientlibs/foundation/js/form/form.js”中存储 XSS(CVE-2024-34128) | 2024-07-23 | ||
AVD-2024-41839 | AEM 启动页面的编辑器状态栏中存在 HTML 注入 (CVE-2024-41839) | 2024-07-23 | ||
AVD-2024-34141 | AMS XSS漏洞 - /libs/granite/backup/clientlibs/js/backup.js标题(CVE-2024-34141) | 2024-06-25 | ||
AVD-2024-34142 | AMS XSS——/libs/dam/cfm/components/download/clientlib/js/download.js (CVE-2024-34142) | 2024-06-25 |