<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T07:59:58.596356+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6d093ac3-ebaf-47fc-bf81-3a9c9333278f/export</id>
    <title>6d093ac3-ebaf-47fc-bf81-3a9c9333278f</title>
    <updated>2026-05-07T07:59:59.022356+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6d093ac3-ebaf-47fc-bf81-3a9c9333278f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39937", "type": "seen", "source": "https://t.me/cvedetector/73", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39937 - supOS 5.0 allows api/image/download?fileName=../ d\", \n  \"Content\": \"CVE ID : CVE-2024-39937 \nPublished : July 4, 2024, 10:15 p.m. | 28\u00a0minutes ago \nDescription : supOS 5.0 allows api/image/download?fileName=../ directory traversal for reading files. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-05T00:47:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6d093ac3-ebaf-47fc-bf81-3a9c9333278f/export"/>
    <published>2024-07-05T00:47:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/317f3307-b13f-4d54-b16d-36413b3d92e5/export</id>
    <title>317f3307-b13f-4d54-b16d-36413b3d92e5</title>
    <updated>2026-05-07T07:59:59.017397+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "317f3307-b13f-4d54-b16d-36413b3d92e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39937", "type": "seen", "source": "https://t.me/kasraone_com/709", "content": "\ud83d\udd34CVE \n\n    CVE-2024-39937\n\nLINK NEWS \n\n\u0627\u06cc\u0646 CVE \u0628\u0647 \u0645\u0634\u06a9\u0644 \u0627\u0645\u0646\u06cc\u062a\u06cc \u062e\u0627\u0635\u06cc \u062f\u0631 supOS 5.0 \u0627\u0634\u0627\u0631\u0647 \u062f\u0627\u0631\u062f \u06a9\u0647 \u0628\u0647 \u06a9\u0645\u06a9 \u0622\u0646 \u0627\u0641\u0631\u0627\u062f \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0641\u0631\u0627\u062e\u0648\u0627\u0646\u06cc API \u0628\u0627 \u067e\u0627\u0631\u0627\u0645\u062a\u0631 fileName=../ \u0628\u0647 \u062f\u0627\u06cc\u0631\u06a9\u062a\u0648\u0631\u06cc \u0647\u0627\u06cc \u062f\u06cc\u06af\u0631 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f \u0648 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0622\u0646 \u0631\u0627 \u0628\u062e\u0648\u0627\u0646\u0646\u062f. \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0633\u0631\u0642\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u0645\u0646\u062c\u0631 \u0634\u0648\u062f \u0648 \u0646\u06cc\u0627\u0632\u0645\u0646\u062f \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0648 \u0631\u0641\u0639 \u0622\u0646 \u0627\u0633\u062a \u062a\u0627 \u0627\u0632 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0646 \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0634\u0648\u062f.\n\napi/image/download?fileName=../ \n\n\n\n\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0 \u2661 \u2800\u2800 \u3007\u2800\u00a0 \u2800 \u2399\u2800\u200c\u00a0 \u200c \u2332\u2063 \n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u02e1\u2071\u1d4f\u1d49\u00a0 \u1d9c\u1d52\u1d50\u1d50\u1d49\u207f\u1d57\u00a0\u00a0 \u02e2\u1d43\u1d5b\u1d49\u00a0 \u02e2\u02b0\u1d43\u02b3\u1d49\n\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 K1\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 kasraone", "creation_timestamp": "2024-07-11T12:03:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/317f3307-b13f-4d54-b16d-36413b3d92e5/export"/>
    <published>2024-07-11T12:03:43+00:00</published>
  </entry>
</feed>
