<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T23:31:23.604723+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/77aa9ff6-8bed-4771-890f-2f9c697417d9/export</id>
    <title>77aa9ff6-8bed-4771-890f-2f9c697417d9</title>
    <updated>2026-05-11T23:31:23.973754+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "77aa9ff6-8bed-4771-890f-2f9c697417d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39344", "type": "seen", "source": "https://t.me/cvedetector/3788", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39344 - Docusign Auth Session Compromise Vulnerability in Salesforce\", \n  \"Content\": \"CVE ID : CVE-2024-39344 \nPublished : Aug. 21, 2024, 4:15 p.m. | 39\u00a0minutes ago \nDescription : An issue was discovered in the Docusign API package 8.142.14 for Salesforce. The Apttus_DocuApi__DocusignAuthentication__mdt object is installed via the marketplace from this package and stores some configuration information in a manner that could be compromised. With the default settings when installed for all users, the object can be accessible and (via its fields) could disclose some keys. These disclosed components can be combined to create a valid session via the Docusign API. This will generally lead to a complete compromise of the Docusign account because the session is for an administrator service account and may have permission to re-authenticate as specific users with the same authorization flow. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T19:05:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/77aa9ff6-8bed-4771-890f-2f9c697417d9/export"/>
    <published>2024-08-21T19:05:15+00:00</published>
  </entry>
</feed>
