<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T16:28:56.460358+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/23e5b05e-a544-4bd3-a8e8-b99094b6a5b6/export</id>
    <title>23e5b05e-a544-4bd3-a8e8-b99094b6a5b6</title>
    <updated>2026-05-07T16:28:56.781910+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "23e5b05e-a544-4bd3-a8e8-b99094b6a5b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39900", "type": "seen", "source": "https://t.me/cvedetector/478", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39900 - OpenSearch Dashboards Reports allows \u2018Report Owner\", \n  \"Content\": \"CVE ID : CVE-2024-39900 \nPublished : July 9, 2024, 10:15 p.m. | 28\u00a0minutes ago \nDescription : OpenSearch Dashboards Reports allows \u2018Report Owner\u2019 export and share reports from OpenSearch Dashboards. An issue in the OpenSearch reporting plugin allows unintended access to private tenant resources like notebooks. The system did not properly check if the user was the resource author when accessing resources in a private tenant, leading to potential data being revealed. The patches are included in OpenSearch 2.14. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T00:52:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/23e5b05e-a544-4bd3-a8e8-b99094b6a5b6/export"/>
    <published>2024-07-10T00:52:10+00:00</published>
  </entry>
</feed>
