{"vulnerability": "CVE-2024-27090", "sightings": [{"uuid": "b9df8a49-e7e6-4b13-b742-72a5b124a1d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27090", "type": "seen", "source": "https://t.me/cvedetector/579", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-27090 - Decidim is a participatory democracy framework, wr\", \n  \"Content\": \"CVE ID : CVE-2024-27090 \nPublished : July 10, 2024, 7:15 p.m. | 26\u00a0minutes ago \nDescription : Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. If an attacker can infer the slug or URL of an unpublished or private resource, and this resource can be embbeded (such as a Participatory Process, an Assembly, a Proposal, a Result, etc), then some data of this resource could be accessed. This vulnerability is fixed in 0.27.6. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T21:49:10.000000Z"}]}