<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 00:45:53 +0000</lastBuildDate>
    <item>
      <title>988e1907-355b-4360-8df2-bc69ed5f4b9d</title>
      <link>https://vulnerability.circl.lu/sighting/988e1907-355b-4360-8df2-bc69ed5f4b9d/export</link>
      <description>{"uuid": "988e1907-355b-4360-8df2-bc69ed5f4b9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39379", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1227", "content": "\ud83d\udccd #\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc_\u0628\u062d\u0631\u0627\u0646\u06cc \u062f\u0631 #Microsoft_Edge: \u0644\u0632\u0648\u0645 \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0641\u0648\u0631\u06cc\n\n\u0645\u0631\u0648\u0631\u06af\u0631 Microsoft Edge \u0627\u062e\u06cc\u0631\u0627\u064b \u062f\u0633\u062a\u062e\u0648\u0634 \u0686\u0646\u062f\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0639\u0648\u0627\u0642\u0628 \u0648\u062e\u06cc\u0645\u06cc \u0645\u0627\u0646\u0646\u062f \u0627\u0646\u06a9\u0627\u0631 \u0633\u0631\u0648\u06cc\u0633\u060c \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0648 \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0634\u0648\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u062f\u0631 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634 \u0627\u0632 127.0.2651.74 \u0627\u06cc\u0646 \u0645\u0631\u0648\u0631\u06af\u0631 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647\u200c\u0627\u0646\u062f.\n\n\u062a\u0648\u0635\u06cc\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc:\n- \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0641\u0648\u0631\u06cc: \u0628\u0631\u0627\u06cc \u0631\u0641\u0639 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u060c \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0628\u0627\u06cc\u062f \u0647\u0631\u0686\u0647 \u0633\u0631\u06cc\u0639\u200c\u062a\u0631 \u0628\u0647 \u0646\u0633\u062e\u0647 127.0.2651.74 \u06cc\u0627 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u062c\u062f\u06cc\u062f\u062a\u0631 Microsoft Edge \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u06a9\u0646\u0646\u062f.\n- \u0627\u0639\u062a\u0628\u0627\u0631\u0633\u0646\u062c\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631: \u0642\u0628\u0644 \u0627\u0632 \u0646\u0635\u0628 \u0647\u0631 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc\u060c \u0628\u0647 \u0648\u06cc\u0698\u0647 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u060c \u062d\u062a\u0645\u0627\u064b \u0635\u062d\u062a \u0648 \u0627\u0635\u0627\u0644\u062a \u0622\u0646 \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0648\u0628\u200c\u0633\u0627\u06cc\u062a \u0631\u0633\u0645\u06cc \u0641\u0631\u0648\u0634\u0646\u062f\u0647 \u062a\u0623\u06cc\u06cc\u062f \u06a9\u0646\u06cc\u062f.\n\n\u062c\u0632\u0626\u06cc\u0627\u062a \u0641\u0646\u06cc: \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647\u200c\u0647\u0627\u06cc CVE-2024-6988 \u062a\u0627 CVE-2024-7005\u060c CVE-2024-38103 \u0648 CVE-2024-39379 \u0634\u0646\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f \u0648 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0634\u062f\u062a \u0628\u0627\u0644\u0627\u06cc \u062e\u0637\u0631\u060c \u0646\u06cc\u0627\u0632\u0645\u0646\u062f \u062a\u0648\u062c\u0647 \u0648\u06cc\u0698\u0647 \u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0647\u0633\u062a\u0646\u062f.\n\n\ud83d\udd17 \u062c\u0647\u062a \u0645\u0637\u0627\u0644\u0639\u0647 \u0627\u062f\u0627\u0645\u0647 \u0645\u0642\u0627\u0644\u0647 \u0628\u0647 \u0627\u06cc\u0646 \u0633\u0627\u06cc\u062a \u0645\u0631\u0627\u062c\u0639\u0647 \u06a9\u0646\u06cc\u062f:\n\n\ud83c\udf10 https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20240726\n\n\ud83d\udccd Critical Vulnerabilities in Microsoft Edge: Urgent Update Required\n\nThe Microsoft Edge browser has recently been exposed to several severe vulnerabilities that could lead to severe consequences such as denial of service, remote execution of malicious code, and disclosure of sensitive user information. These vulnerabilities have been identified in versions prior to 127.0.2651.74 of the browser.\n\nSecurity Recommendations:\n- Immediate Update: Users should update to version 127.0.2651.74 or later of Microsoft Edge as soon as possible to address these vulnerabilities.\n- Software Validation: Before installing any software, especially updates, ensure its authenticity and validity through the official vendor's website.\n\nTechnical Details: These vulnerabilities are identified by CVE-2024-6988 through CVE-2024-7005, CVE-2024-38103, and CVE-2024-39379. Due to their high severity, they require special attention from cybersecurity experts.\n\n\ud83d\udd17 To read the full article, visit:\n\n\ud83c\udf10 https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20240726", "creation_timestamp": "2024-07-31T14:40:48.000000Z"}</description>
      <content:encoded>{"uuid": "988e1907-355b-4360-8df2-bc69ed5f4b9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39379", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1227", "content": "\ud83d\udccd #\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc_\u0628\u062d\u0631\u0627\u0646\u06cc \u062f\u0631 #Microsoft_Edge: \u0644\u0632\u0648\u0645 \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0641\u0648\u0631\u06cc\n\n\u0645\u0631\u0648\u0631\u06af\u0631 Microsoft Edge \u0627\u062e\u06cc\u0631\u0627\u064b \u062f\u0633\u062a\u062e\u0648\u0634 \u0686\u0646\u062f\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0639\u0648\u0627\u0642\u0628 \u0648\u062e\u06cc\u0645\u06cc \u0645\u0627\u0646\u0646\u062f \u0627\u0646\u06a9\u0627\u0631 \u0633\u0631\u0648\u06cc\u0633\u060c \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0648 \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0634\u0648\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u062f\u0631 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634 \u0627\u0632 127.0.2651.74 \u0627\u06cc\u0646 \u0645\u0631\u0648\u0631\u06af\u0631 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647\u200c\u0627\u0646\u062f.\n\n\u062a\u0648\u0635\u06cc\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc:\n- \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0641\u0648\u0631\u06cc: \u0628\u0631\u0627\u06cc \u0631\u0641\u0639 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u060c \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0628\u0627\u06cc\u062f \u0647\u0631\u0686\u0647 \u0633\u0631\u06cc\u0639\u200c\u062a\u0631 \u0628\u0647 \u0646\u0633\u062e\u0647 127.0.2651.74 \u06cc\u0627 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u062c\u062f\u06cc\u062f\u062a\u0631 Microsoft Edge \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u06a9\u0646\u0646\u062f.\n- \u0627\u0639\u062a\u0628\u0627\u0631\u0633\u0646\u062c\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631: \u0642\u0628\u0644 \u0627\u0632 \u0646\u0635\u0628 \u0647\u0631 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc\u060c \u0628\u0647 \u0648\u06cc\u0698\u0647 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u060c \u062d\u062a\u0645\u0627\u064b \u0635\u062d\u062a \u0648 \u0627\u0635\u0627\u0644\u062a \u0622\u0646 \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0648\u0628\u200c\u0633\u0627\u06cc\u062a \u0631\u0633\u0645\u06cc \u0641\u0631\u0648\u0634\u0646\u062f\u0647 \u062a\u0623\u06cc\u06cc\u062f \u06a9\u0646\u06cc\u062f.\n\n\u062c\u0632\u0626\u06cc\u0627\u062a \u0641\u0646\u06cc: \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647\u200c\u0647\u0627\u06cc CVE-2024-6988 \u062a\u0627 CVE-2024-7005\u060c CVE-2024-38103 \u0648 CVE-2024-39379 \u0634\u0646\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f \u0648 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0634\u062f\u062a \u0628\u0627\u0644\u0627\u06cc \u062e\u0637\u0631\u060c \u0646\u06cc\u0627\u0632\u0645\u0646\u062f \u062a\u0648\u062c\u0647 \u0648\u06cc\u0698\u0647 \u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0647\u0633\u062a\u0646\u062f.\n\n\ud83d\udd17 \u062c\u0647\u062a \u0645\u0637\u0627\u0644\u0639\u0647 \u0627\u062f\u0627\u0645\u0647 \u0645\u0642\u0627\u0644\u0647 \u0628\u0647 \u0627\u06cc\u0646 \u0633\u0627\u06cc\u062a \u0645\u0631\u0627\u062c\u0639\u0647 \u06a9\u0646\u06cc\u062f:\n\n\ud83c\udf10 https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20240726\n\n\ud83d\udccd Critical Vulnerabilities in Microsoft Edge: Urgent Update Required\n\nThe Microsoft Edge browser has recently been exposed to several severe vulnerabilities that could lead to severe consequences such as denial of service, remote execution of malicious code, and disclosure of sensitive user information. These vulnerabilities have been identified in versions prior to 127.0.2651.74 of the browser.\n\nSecurity Recommendations:\n- Immediate Update: Users should update to version 127.0.2651.74 or later of Microsoft Edge as soon as possible to address these vulnerabilities.\n- Software Validation: Before installing any software, especially updates, ensure its authenticity and validity through the official vendor's website.\n\nTechnical Details: These vulnerabilities are identified by CVE-2024-6988 through CVE-2024-7005, CVE-2024-38103, and CVE-2024-39379. Due to their high severity, they require special attention from cybersecurity experts.\n\n\ud83d\udd17 To read the full article, visit:\n\n\ud83c\udf10 https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20240726", "creation_timestamp": "2024-07-31T14:40:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/988e1907-355b-4360-8df2-bc69ed5f4b9d/export</guid>
      <pubDate>Wed, 31 Jul 2024 14:40:48 +0000</pubDate>
    </item>
    <item>
      <title>190e9c3b-4a34-455c-b3f6-dd59bfc2e296</title>
      <link>https://vulnerability.circl.lu/sighting/190e9c3b-4a34-455c-b3f6-dd59bfc2e296/export</link>
      <description>{"uuid": "190e9c3b-4a34-455c-b3f6-dd59bfc2e296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39379", "type": "seen", "source": "https://t.me/cvedetector/2137", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39379 - Adobe Acrobat Edge Information Disclosure Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39379 \nPublished : July 31, 2024, 1:15 p.m. | 43\u00a0minutes ago \nDescription : Acrobat for Edge versions 126.0.2592.81 and earlier are affected by an out-of-bounds read vulnerability that could lead to arbitrary file system read access. An attacker could exploit this vulnerability to read contents from a location in memory past the buffer boundary, potentially leading to sensitive information disclosure. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T15:59:55.000000Z"}</description>
      <content:encoded>{"uuid": "190e9c3b-4a34-455c-b3f6-dd59bfc2e296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39379", "type": "seen", "source": "https://t.me/cvedetector/2137", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39379 - Adobe Acrobat Edge Information Disclosure Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39379 \nPublished : July 31, 2024, 1:15 p.m. | 43\u00a0minutes ago \nDescription : Acrobat for Edge versions 126.0.2592.81 and earlier are affected by an out-of-bounds read vulnerability that could lead to arbitrary file system read access. An attacker could exploit this vulnerability to read contents from a location in memory past the buffer boundary, potentially leading to sensitive information disclosure. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T15:59:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/190e9c3b-4a34-455c-b3f6-dd59bfc2e296/export</guid>
      <pubDate>Wed, 31 Jul 2024 15:59:55 +0000</pubDate>
    </item>
  </channel>
</rss>
