<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T22:39:01.911959+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/daf71c1e-eeb1-4f7b-850f-01b45b813ad0/export</id>
    <title>daf71c1e-eeb1-4f7b-850f-01b45b813ad0</title>
    <updated>2026-05-09T22:39:02.348219+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "daf71c1e-eeb1-4f7b-850f-01b45b813ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39902", "type": "seen", "source": "https://t.me/cvedetector/1444", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39902 - Tuleap Unchecked Permission Checkbox Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-39902 \nPublished : July 22, 2024, 2:15 p.m. | 33\u00a0minutes ago \nDescription : Tuleap is an open source suite to improve management of software developments and collaboration. Prior to Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8, the checkbox \"Apply same permissions to all sub-items of this folder\" in the document manager permissions modal is not taken into account and always considered as unchecked. In situations where the permissions are being restricted some users might still keep, incorrectly, the possibility to edit or manage items. Only change made via the web UI are affected, changes directly made via the REST API are not impacted. This vulnerability is fixed in Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T16:59:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/daf71c1e-eeb1-4f7b-850f-01b45b813ad0/export"/>
    <published>2024-07-22T16:59:34+00:00</published>
  </entry>
</feed>
