<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T10:04:27.755936+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8b8d9fe8-0ca1-475b-81c9-165a2a908706/export</id>
    <title>8b8d9fe8-0ca1-475b-81c9-165a2a908706</title>
    <updated>2026-05-09T10:04:28.136712+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8b8d9fe8-0ca1-475b-81c9-165a2a908706", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6322", "type": "seen", "source": "https://t.me/cvedetector/3674", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6322 - Nutanix Acropolis VMware vSphere Allowed Data Source Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-6322 \nPublished : Aug. 20, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-20T21:19:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8b8d9fe8-0ca1-475b-81c9-165a2a908706/export"/>
    <published>2024-08-20T21:19:13+00:00</published>
  </entry>
</feed>
