{"vulnerability": "CVE-2024-7654", "sightings": [{"uuid": "aaad6ea7-d3d5-470e-a369-10dd3aef74a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7654", "type": "seen", "source": "https://t.me/cvedetector/4696", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7654 - \"OpenEdge Management ActiveMQ Discovery Service UDP Port Authentication Bypass\"\", \n  \"Content\": \"CVE ID : CVE-2024-7654 \nPublished : Sept. 3, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : An ActiveMQ Discovery service was reachable by default from an OpenEdge Management installation when an OEE/OEM auto-discovery feature was activated.\u00a0 Unauthorized access to the discovery service's UDP port allowed content injection into parts of the OEM web interface making it possible for other types of attack that could spoof or deceive web interface users.\u00a0\u00a0 Unauthorized use of the OEE/OEM discovery service was remediated by deactivating the discovery service by default. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T18:18:40.000000Z"}]}