{
	"version": "https://jsonfeed.org/version/1",
	"title": "Adobe Digest",
	"icon": "https://avatars.micro.blog/avatars/2025/42/1836278.jpg",
	"home_page_url": "https://adobedigest.com/",
	"feed_url": "https://adobedigest.com/feed.json",
	"items": [
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/cve-high-cvss.html",
				"title": "CVE-2026-21361 (HIGH) CVSS 8.1",
				"content_html": "<p><strong>🟠 Severity: HIGH (CVSS 8.1)</strong></p>\n<p>Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vvulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-21361\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T04:15:56-04:00",
				"url": "https://adobedigest.com/2026/03/11/cve-high-cvss.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/031555.html",
				"title": "CVE-2026-21309 (HIGH) CVSS 7.5",
				"content_html": "<p><strong>🟠 Severity: HIGH (CVSS 7.5)</strong></p>\n<p>Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized view access of data. Exploitation of this issue does not require user interaction.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-21309\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T04:15:55-04:00",
				"url": "https://adobedigest.com/2026/03/11/031555.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/ea88c3.html",
				"title": "CVE-2026-21310 (MEDIUM) CVSS 5.3",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 5.3)</strong></p>\n<p>Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass, with limited impact to integrity. Exploitation of this issue does not require user interaction.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-21310\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T04:15:55-04:00",
				"url": "https://adobedigest.com/2026/03/11/ea88c3.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/0c1b98.html",
				"title": "CVE-2026-21311 (HIGH) CVSS 8.0",
				"content_html": "<p><strong>🟠 Severity: HIGH (CVSS 8.0)</strong></p>\n<p>Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-21311\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T04:15:55-04:00",
				"url": "https://adobedigest.com/2026/03/11/0c1b98.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/6a3941.html",
				"title": "CVE-2026-21359 (MEDIUM) CVSS 4.7",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 4.7)</strong></p>\n<p>Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and have limited impact to the integrity and availability of data. The exploit depends on conditions beyond the attacker&rsquo;s control. Exploitation of this issue does not require user interaction.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-21359\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T04:15:55-04:00",
				"url": "https://adobedigest.com/2026/03/11/6a3941.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/f65542.html",
				"title": "CVE-2026-21360 (MEDIUM) CVSS 6.8",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 6.8)</strong></p>\n<p>Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory (&lsquo;Path Traversal&rsquo;) vulnerability that could result in a security feature bypass. A high-privileged attacker could leverage this vulnerability to access unauthorized files or directories outside the intended restricted path. Exploitation of this issue does not require user interaction.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-21360\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T04:15:55-04:00",
				"url": "https://adobedigest.com/2026/03/11/f65542.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/ee7a4f.html",
				"title": "CVE-2026-21292 (MEDIUM) CVSS 5.4",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 5.4)</strong></p>\n<p>Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker attacker to inject malicious scripts into vulnerable form fields. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-21292\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T04:15:54-04:00",
				"url": "https://adobedigest.com/2026/03/11/ee7a4f.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/031554.html",
				"title": "CVE-2026-21293 (MEDIUM) CVSS 5.5",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 5.5)</strong></p>\n<p>Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could result in a Security feature bypass. A high-privileged attacker could exploit this vulnerability to manipulate server-side requests and access unauthorized resources. Exploitation of this issue does not require user interaction.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-21293\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T04:15:54-04:00",
				"url": "https://adobedigest.com/2026/03/11/031554.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/591792.html",
				"title": "CVE-2026-21296 (MEDIUM) CVSS 4.3",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 4.3)</strong></p>\n<p>Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized view access of data. Exploitation of this issue does not require user interaction.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-21296\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T04:15:54-04:00",
				"url": "https://adobedigest.com/2026/03/11/591792.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/c097c7.html",
				"title": "CVE-2026-21297 (MEDIUM) CVSS 4.3",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 4.3)</strong></p>\n<p>Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized access to a feature. Exploitation of this issue does not require user interaction.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-21297\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T04:15:54-04:00",
				"url": "https://adobedigest.com/2026/03/11/c097c7.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/f112e5.html",
				"title": "CVE-2026-27262 (MEDIUM) CVSS 5.4",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 5.4)</strong></p>\n<p>Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/experience-manager/apsb26-24.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-27262\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T02:16:57-04:00",
				"url": "https://adobedigest.com/2026/03/11/f112e5.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/2ee892.html",
				"title": "CVE-2026-27263 (MEDIUM) CVSS 5.4",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 5.4)</strong></p>\n<p>Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/experience-manager/apsb26-24.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-27263\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T02:16:57-04:00",
				"url": "https://adobedigest.com/2026/03/11/2ee892.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/011657.html",
				"title": "CVE-2026-27264 (MEDIUM) CVSS 5.4",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 5.4)</strong></p>\n<p>Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/experience-manager/apsb26-24.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-27264\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T02:16:57-04:00",
				"url": "https://adobedigest.com/2026/03/11/011657.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/cve-medium-cvss.html",
				"title": "CVE-2026-27265 (MEDIUM) CVSS 5.4",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 5.4)</strong></p>\n<p>Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/experience-manager/apsb26-24.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-27265\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T02:16:57-04:00",
				"url": "https://adobedigest.com/2026/03/11/cve-medium-cvss.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/11/48dd01.html",
				"title": "CVE-2026-27266 (MEDIUM) CVSS 5.4",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 5.4)</strong></p>\n<p>Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.</p>\n<p><strong>Published:</strong> 2026-03-11</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://helpx.adobe.com/security/products/experience-manager/apsb26-24.html\">helpx.adobe.com/security/&hellip;</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-27266\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-03-11T02:16:57-04:00",
				"url": "https://adobedigest.com/2026/03/11/48dd01.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/10/000000.html",
				"title": "APSB26-05 - APSB26-05: Security update available for Adobe Commerce Security Update",
				"content_html": "<h2 id=\"bulletin-information\">Bulletin Information</h2>\n<ul>\n<li><strong>Bulletin ID:</strong> APSB26-05</li>\n<li><strong>Product:</strong> APSB26-05: Security update available for Adobe Commerce</li>\n<li><strong>Published:</strong> March 10, 2026</li>\n<li><strong>Priority:</strong> 2</li>\n<li><strong>Severity:</strong> Critical</li>\n<li><strong>CVE Count:</strong> 19</li>\n</ul>\n<h2 id=\"affected-versions\">Affected Versions</h2>\n<ul>\n<li><strong>Adobe Commerce:</strong> 2.4.9-alpha3 and earlier2.4.8-p3 and earlier2.4.7-p8 and earlier2.4.6-p13 and earlier2.4.5-p15 and earlier2.4.4-p16 and earlier</li>\n<li><strong>Adobe Commerce B2B:</strong> 1.5.3-alpha3 and earlier1.5.2-p3 and earlier1.4.2-p8 and earlier1.3.5-p13 and earlier1.3.4-p15 and earlier1.3.3-p16 and earlier</li>\n<li><strong>Magento Open Source:</strong> 2.4.9-alpha32.4.8-p3 and earlier2.4.7-p8 and earlier2.4.6-p13 and earlier2.4.5-p15 and earlier</li>\n</ul>\n<h2 id=\"vulnerability-details\">Vulnerability Details</h2>\n<p><strong>Total Vulnerabilities:</strong> 19</p>\n<p><strong>Severity Breakdown:</strong></p>\n<ul>\n<li><strong>Moderate:</strong> 3</li>\n<li><strong>Important:</strong> 10</li>\n<li><strong>Critical:</strong> 6</li>\n</ul>\n<p><strong>Key Vulnerabilities:</strong></p>\n<h3 id=\"1-cve-2026-21361\">1. CVE-2026-21361</h3>\n<ul>\n<li><strong>Category:</strong> Cross-site Scripting (Stored XSS) (CWE-79)</li>\n<li><strong>Impact:</strong> Privilege escalation</li>\n<li><strong>Severity:</strong> Critical</li>\n<li><strong>CVSS Score:</strong> 8.1</li>\n<li><strong>Authentication Required:</strong> Yes</li>\n</ul>\n<h3 id=\"2-cve-2026-21284\">2. CVE-2026-21284</h3>\n<ul>\n<li><strong>Category:</strong> Cross-site Scripting (Stored XSS) (CWE-79)</li>\n<li><strong>Impact:</strong> Privilege escalation</li>\n<li><strong>Severity:</strong> Critical</li>\n<li><strong>CVSS Score:</strong> 8.1</li>\n<li><strong>Authentication Required:</strong> Yes</li>\n</ul>\n<h3 id=\"3-cve-2026-21289\">3. CVE-2026-21289</h3>\n<ul>\n<li><strong>Category:</strong> Incorrect Authorization (CWE-863)</li>\n<li><strong>Impact:</strong> Security feature bypass</li>\n<li><strong>Severity:</strong> Critical</li>\n<li><strong>CVSS Score:</strong> 7.5</li>\n<li><strong>Authentication Required:</strong> Yes</li>\n</ul>\n<p><em>&hellip;and 16 more vulnerabilities</em></p>\n<h2 id=\"cve-identifiers\">CVE Identifiers</h2>\n<p>CVE-2026-21285, CVE-2026-21310, CVE-2026-21311, CVE-2026-21286, CVE-2026-21294, CVE-2026-21292, CVE-2026-21293, CVE-2026-21289, CVE-2026-21360, CVE-2026-21282, CVE-2026-21291, CVE-2026-21309, CVE-2026-21290, CVE-2026-21296, CVE-2026-21361, CVE-2026-21297, CVE-2026-21359, CVE-2026-21284, CVE-2026-21295</p>\n<hr>\n<p><a href=\"https://helpx.adobe.com/security/products/magento/apsb26-05.html\"><strong>Read Full Bulletin on Adobe Security Portal →</strong></a></p>\n",
				
				"date_published": "2026-03-10T01:00:00-04:00",
				"url": "https://adobedigest.com/2026/03/10/000000.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/03/10/apsb-apsb-security-update-available.html",
				"title": "APSB26-24 - APSB26-24: Security update available for Adobe Experience Manager Security Update",
				"content_html": "<h2 id=\"bulletin-information\">Bulletin Information</h2>\n<ul>\n<li><strong>Bulletin ID:</strong> APSB26-24</li>\n<li><strong>Product:</strong> APSB26-24: Security update available for Adobe Experience Manager</li>\n<li><strong>Published:</strong> March 10, 2026</li>\n<li><strong>Priority:</strong> 3</li>\n</ul>\n<h2 id=\"affected-versions\">Affected Versions</h2>\n<ul>\n<li><strong>Adobe Experience Manager (AEM):</strong> AEM Cloud Service (CS)</li>\n<li><strong>6.5 LTS SP1 and earlier6.5.SP23 and earlier:</strong> All</li>\n</ul>\n<hr>\n<p><a href=\"https://helpx.adobe.com/security/products/experience-manager/apsb26-24.html\"><strong>Read Full Bulletin on Adobe Security Portal →</strong></a></p>\n",
				
				"date_published": "2026-03-10T01:00:00-04:00",
				"url": "https://adobedigest.com/2026/03/10/apsb-apsb-security-update-available.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/02/20/digital-skimmer-hits-global-supermarket.html",
				"title": "Digital skimmer hits global supermarket chain",
				"content_html": "<p>The affected company, with about €100 billion in annual revenue and over 10,000 stores across 25 countries, runs some of its ecommerce operations on the PrestaShop platform. As of publication, the &hellip;</p>\n<hr>\n<p><a href=\"https://sansec.io/research/global-retailer-prestashop-hacked\"><strong>Read Full Article on Sansec.io →</strong></a></p>\n",
				
				"date_published": "2026-02-20T01:00:00-04:00",
				"url": "https://adobedigest.com/2026/02/20/digital-skimmer-hits-global-supermarket.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/02/18/building-a-faster-yara-engine.html",
				"title": "Building a faster YARA engine in pure Go",
				"content_html": "<p>YARA is the industry standard for pattern matching in malware detection. Maintained by VirusTotal, it powers threat detection at nearly every security vendor. At Sansec, we rely on YARA for eComsca&hellip;</p>\n<hr>\n<p><a href=\"https://sansec.io/research/yargo\"><strong>Read Full Article on Sansec.io →</strong></a></p>\n",
				
				"date_published": "2026-02-18T01:00:00-04:00",
				"url": "https://adobedigest.com/2026/02/18/building-a-faster-yara-engine.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/02/04/cve-medium-cvss.html",
				"title": "CVE-2026-25523 (MEDIUM) CVSS 5.3",
				"content_html": "<p><strong>🟡 Severity: MEDIUM (CVSS 5.3)</strong></p>\n<p>Magento-lts is a long-term support alternative to Magento Community Edition (CE). Prior to version 20.16.1, the admin url can be discovered without prior knowledge of it&rsquo;s location by exploiting the X-Original-Url header on some configurations. This issue has been patched in version 20.16.1.</p>\n<p><strong>Published:</strong> 2026-02-04</p>\n<p><strong>References:</strong></p>\n<ul>\n<li><a href=\"https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jg68-vhv3-9r8f\">github.com/OpenMage/&hellip;</a></li>\n<li><a href=\"https://hackerone.com/bugs?subject=openmage&amp;report_id=3416312\">hackerone.com/bugs</a></li>\n</ul>\n<hr>\n<p><a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-25523\"><strong>View Full CVE Details on NIST NVD →</strong></a></p>\n",
				
				"date_published": "2026-02-04T23:15:59-04:00",
				"url": "https://adobedigest.com/2026/02/04/cve-medium-cvss.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/01/22/claude-finds-zerodays-on-packagist.html",
				"title": "Claude finds 353 zero-days on Packagist",
				"content_html": "<p>Open source ecosystems have a long tail security problem. Python, Ruby, Javascript, PHP: these ecosystems have millions of packages. The top 100 packages get scrutinized. The next 5,000, not so muc&hellip;</p>\n<hr>\n<p><a href=\"https://sansec.io/research/claude-finds-353-zero-days-packagist\"><strong>Read Full Article on Sansec.io →</strong></a></p>\n",
				
				"date_published": "2026-01-22T00:00:00-05:00",
				"url": "https://adobedigest.com/2026/01/22/claude-finds-zerodays-on-packagist.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/01/16/the-billiondollar-securitytxt-problem.html",
				"title": "The billion-dollar security.txt problem",
				"content_html": "<p>Yesterday, Sansec discovered an active keylogger at an external site of one of America&rsquo;s largest banks. The malware was harvesting private information from over 200,000 potential victims. We detect&hellip;</p>\n<hr>\n<p><a href=\"https://sansec.io/research/security-txt-trillion-dollar-problem\"><strong>Read Full Article on Sansec.io →</strong></a></p>\n",
				
				"date_published": "2026-01-16T00:00:00-05:00",
				"url": "https://adobedigest.com/2026/01/16/the-billiondollar-securitytxt-problem.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/01/15/keylogger-targets-employees-at-major.html",
				"title": "Keylogger targets 200,000+ employees at major US bank",
				"content_html": "<p>Update Jan 15th: the malware appears to have been removed. It was live for about 18 hoursSansec detected a keylogger on the employee store of one of America&rsquo;s largest banks. The site serves over 2&hellip;</p>\n<hr>\n<p><a href=\"https://sansec.io/research/keylogger-major-us-bank-employees\"><strong>Read Full Article on Sansec.io →</strong></a></p>\n",
				
				"date_published": "2026-01-15T00:00:00-05:00",
				"url": "https://adobedigest.com/2026/01/15/keylogger-targets-employees-at-major.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2026/01/12/connectpos-leaked-github-secrets-for.html",
				"title": "ConnectPOS leaked Github secrets for years",
				"content_html": "<p>Sansec researchers discovered that ConnectPOS, a popular Point of Sale solution, had been exposing a GitHub Personal Access Token (PAT) in their public installation instructions for over four years&hellip;</p>\n<hr>\n<p><a href=\"https://sansec.io/research/connectpos-github-token-exposure\"><strong>Read Full Article on Sansec.io →</strong></a></p>\n",
				
				"date_published": "2026-01-12T00:00:00-05:00",
				"url": "https://adobedigest.com/2026/01/12/connectpos-leaked-github-secrets-for.html"
			},
			{
				"id": "http://adobedigest.micro.blog/2025/12/15/critical-backdoor-found-in-mgt.html",
				"title": "Critical backdoor found in MGT Varnish extension",
				"content_html": "<p>NameMgt_VarnishVulnerable1.0.10 and earlierFixed in1.1.0Sansec researchers discovered a critical vulnerability in the popular Varnish module for Magento. This module, develope&hellip;</p>\n<hr>\n<p><a href=\"https://sansec.io/research/mgt-varnish-critical-vulnerability\"><strong>Read Full Article on Sansec.io →</strong></a></p>\n",
				
				"date_published": "2025-12-15T00:00:00-05:00",
				"url": "https://adobedigest.com/2025/12/15/critical-backdoor-found-in-mgt.html"
			}
	]
}
