<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 15:40:57 +0000</lastBuildDate>
    <item>
      <title>6d093ac3-ebaf-47fc-bf81-3a9c9333278f</title>
      <link>https://vulnerability.circl.lu/sighting/6d093ac3-ebaf-47fc-bf81-3a9c9333278f/export</link>
      <description>{"uuid": "6d093ac3-ebaf-47fc-bf81-3a9c9333278f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39937", "type": "seen", "source": "https://t.me/cvedetector/73", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39937 - supOS 5.0 allows api/image/download?fileName=../ d\", \n  \"Content\": \"CVE ID : CVE-2024-39937 \nPublished : July 4, 2024, 10:15 p.m. | 28\u00a0minutes ago \nDescription : supOS 5.0 allows api/image/download?fileName=../ directory traversal for reading files. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-05T00:47:29.000000Z"}</description>
      <content:encoded>{"uuid": "6d093ac3-ebaf-47fc-bf81-3a9c9333278f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39937", "type": "seen", "source": "https://t.me/cvedetector/73", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39937 - supOS 5.0 allows api/image/download?fileName=../ d\", \n  \"Content\": \"CVE ID : CVE-2024-39937 \nPublished : July 4, 2024, 10:15 p.m. | 28\u00a0minutes ago \nDescription : supOS 5.0 allows api/image/download?fileName=../ directory traversal for reading files. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-05T00:47:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6d093ac3-ebaf-47fc-bf81-3a9c9333278f/export</guid>
      <pubDate>Fri, 05 Jul 2024 00:47:29 +0000</pubDate>
    </item>
    <item>
      <title>317f3307-b13f-4d54-b16d-36413b3d92e5</title>
      <link>https://vulnerability.circl.lu/sighting/317f3307-b13f-4d54-b16d-36413b3d92e5/export</link>
      <description>{"uuid": "317f3307-b13f-4d54-b16d-36413b3d92e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39937", "type": "seen", "source": "https://t.me/kasraone_com/709", "content": "\ud83d\udd34CVE \n\n    CVE-2024-39937\n\nLINK NEWS \n\n\u0627\u06cc\u0646 CVE \u0628\u0647 \u0645\u0634\u06a9\u0644 \u0627\u0645\u0646\u06cc\u062a\u06cc \u062e\u0627\u0635\u06cc \u062f\u0631 supOS 5.0 \u0627\u0634\u0627\u0631\u0647 \u062f\u0627\u0631\u062f \u06a9\u0647 \u0628\u0647 \u06a9\u0645\u06a9 \u0622\u0646 \u0627\u0641\u0631\u0627\u062f \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0641\u0631\u0627\u062e\u0648\u0627\u0646\u06cc API \u0628\u0627 \u067e\u0627\u0631\u0627\u0645\u062a\u0631 fileName=../ \u0628\u0647 \u062f\u0627\u06cc\u0631\u06a9\u062a\u0648\u0631\u06cc \u0647\u0627\u06cc \u062f\u06cc\u06af\u0631 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f \u0648 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0622\u0646 \u0631\u0627 \u0628\u062e\u0648\u0627\u0646\u0646\u062f. \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0633\u0631\u0642\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u0645\u0646\u062c\u0631 \u0634\u0648\u062f \u0648 \u0646\u06cc\u0627\u0632\u0645\u0646\u062f \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0648 \u0631\u0641\u0639 \u0622\u0646 \u0627\u0633\u062a \u062a\u0627 \u0627\u0632 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0646 \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0634\u0648\u062f.\n\napi/image/download?fileName=../ \n\n\n\n\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0 \u2661 \u2800\u2800 \u3007\u2800\u00a0 \u2800 \u2399\u2800\u200c\u00a0 \u200c \u2332\u2063 \n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u02e1\u2071\u1d4f\u1d49\u00a0 \u1d9c\u1d52\u1d50\u1d50\u1d49\u207f\u1d57\u00a0\u00a0 \u02e2\u1d43\u1d5b\u1d49\u00a0 \u02e2\u02b0\u1d43\u02b3\u1d49\n\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 K1\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 kasraone", "creation_timestamp": "2024-07-11T12:03:43.000000Z"}</description>
      <content:encoded>{"uuid": "317f3307-b13f-4d54-b16d-36413b3d92e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39937", "type": "seen", "source": "https://t.me/kasraone_com/709", "content": "\ud83d\udd34CVE \n\n    CVE-2024-39937\n\nLINK NEWS \n\n\u0627\u06cc\u0646 CVE \u0628\u0647 \u0645\u0634\u06a9\u0644 \u0627\u0645\u0646\u06cc\u062a\u06cc \u062e\u0627\u0635\u06cc \u062f\u0631 supOS 5.0 \u0627\u0634\u0627\u0631\u0647 \u062f\u0627\u0631\u062f \u06a9\u0647 \u0628\u0647 \u06a9\u0645\u06a9 \u0622\u0646 \u0627\u0641\u0631\u0627\u062f \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0641\u0631\u0627\u062e\u0648\u0627\u0646\u06cc API \u0628\u0627 \u067e\u0627\u0631\u0627\u0645\u062a\u0631 fileName=../ \u0628\u0647 \u062f\u0627\u06cc\u0631\u06a9\u062a\u0648\u0631\u06cc \u0647\u0627\u06cc \u062f\u06cc\u06af\u0631 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f \u0648 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0622\u0646 \u0631\u0627 \u0628\u062e\u0648\u0627\u0646\u0646\u062f. \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0633\u0631\u0642\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u0645\u0646\u062c\u0631 \u0634\u0648\u062f \u0648 \u0646\u06cc\u0627\u0632\u0645\u0646\u062f \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0648 \u0631\u0641\u0639 \u0622\u0646 \u0627\u0633\u062a \u062a\u0627 \u0627\u0632 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0646 \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0634\u0648\u062f.\n\napi/image/download?fileName=../ \n\n\n\n\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0 \u2661 \u2800\u2800 \u3007\u2800\u00a0 \u2800 \u2399\u2800\u200c\u00a0 \u200c \u2332\u2063 \n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u02e1\u2071\u1d4f\u1d49\u00a0 \u1d9c\u1d52\u1d50\u1d50\u1d49\u207f\u1d57\u00a0\u00a0 \u02e2\u1d43\u1d5b\u1d49\u00a0 \u02e2\u02b0\u1d43\u02b3\u1d49\n\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 K1\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 kasraone", "creation_timestamp": "2024-07-11T12:03:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/317f3307-b13f-4d54-b16d-36413b3d92e5/export</guid>
      <pubDate>Thu, 11 Jul 2024 12:03:43 +0000</pubDate>
    </item>
  </channel>
</rss>
