{"vulnerability": "CVE-2023-39264", "sightings": [{"uuid": "e2767404-f8fb-49da-9944-ea6702f961cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39264", "type": "seen", "source": "https://t.me/arpsyndicate/593", "content": "#ExploitObserverAlert\n\nCVE-2023-39264\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-39264. By default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users.\u00a0This vulnerability exists in Apache Superset versions up to and including 2.1.0.\n\nFIRST-EPSS: 0.000620000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2023-11-27T21:38:11.000000Z"}, {"uuid": "0785e01c-d8f1-478c-91d9-120e541e9e57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39264", "type": "seen", "source": "https://t.me/cibsecurity/70002", "content": "\u203c CVE-2023-39264 \u203c\n\nBy default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users.\u00c2\u00a0This vulnerability exists in Apache Superset versions up to and including 2.1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T16:17:45.000000Z"}]}