[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-27246":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-18T08:14:08.048Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":44,"aliases":45,"duplicate_of":9,"upstream":46,"downstream":47,"duplicates":48,"related":49,"reserved_at":9,"published_at":50,"modified_at":51,"state":52,"summary":53,"references_raw":62,"kevs":69,"epss":70,"epss_history":73,"metrics":81,"affected":89},"CVE-2026-27246","Adobe Connect versions 2025.3, 12.10 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execute malicious JavaScript within the context of the victim's browser. Exploitation of this issue requires user interaction in that a victim must visit a crafted webpage. Scope is changed.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-79","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.","weakness","Stable","Base","High",[20,24,28,32,36,40],{"id":21,"name":22,"techniques":23},"CAPEC-209","XSS Using MIME Type Mismatch",[],{"id":25,"name":26,"techniques":27},"CAPEC-588","DOM-Based XSS",[],{"id":29,"name":30,"techniques":31},"CAPEC-591","Reflected XSS",[],{"id":33,"name":34,"techniques":35},"CAPEC-592","Stored XSS",[],{"id":37,"name":38,"techniques":39},"CAPEC-63","Cross-Site Scripting (XSS)",[],{"id":41,"name":42,"techniques":43},"CAPEC-85","AJAX Footprinting",[],[],[],[],[],[],[],"2026-04-14T17:33:47.834Z","2026-04-14T17:55:44.469Z","Undergoing Analysis",{"cisa_kev":54,"cisa_ransomware":54,"cisa_vendor":9,"epss_severity":55,"epss_score":56,"severity":57,"severity_score":58,"severity_version":59,"severity_source":60,"severity_vector":61,"severity_status":52},false,"low",0.00097,"critical",9.3,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",[63],{"url":64,"sources":65,"tags":67},"https://helpx.adobe.com/security/products/connect/apsb26-37.html",[60,66],"nvd",[68],"Vendor Advisory",[],{"date":71,"score":56,"percentile":72},"2026-04-17",0.26736,[74,77,80],{"date":75,"score":56,"percentile":76},"2026-04-15",0.26768,{"date":78,"score":56,"percentile":79},"2026-04-16",0.26747,{"date":71,"score":56,"percentile":72},[82,87],{"source":60,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":83,"cvss_v4_0":9},{"baseScore":58,"baseSeverity":84,"vectorString":61,"impactScore":85,"exploitabilityScore":86},"CRITICAL",9.7,7.2,{"source":66,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":88,"cvss_v4_0":9},{"baseScore":58,"baseSeverity":84,"vectorString":61,"impactScore":85,"exploitabilityScore":86},[90],{"ecosystem":9,"name":91,"vendor":92,"product":93,"cpe_part":94,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":95},"Adobe Connect","adobe","adobe connect","a",[96],{"version":97,"is_range":98,"range_type":60,"version_start":9,"version_start_type":9,"version_end":99,"version_end_type":100,"fixed_in":9},"\u003C= 12.10",true,"12.10","including"]