{"vulnerability": "CVE-2024-7005", "sightings": [{"uuid": "c02f7824-90f6-437b-be5d-0a4902d618b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7005", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1227", "content": "\ud83d\udccd #\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc_\u0628\u062d\u0631\u0627\u0646\u06cc \u062f\u0631 #Microsoft_Edge: \u0644\u0632\u0648\u0645 \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0641\u0648\u0631\u06cc\n\n\u0645\u0631\u0648\u0631\u06af\u0631 Microsoft Edge \u0627\u062e\u06cc\u0631\u0627\u064b \u062f\u0633\u062a\u062e\u0648\u0634 \u0686\u0646\u062f\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0639\u0648\u0627\u0642\u0628 \u0648\u062e\u06cc\u0645\u06cc \u0645\u0627\u0646\u0646\u062f \u0627\u0646\u06a9\u0627\u0631 \u0633\u0631\u0648\u06cc\u0633\u060c \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0648 \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0634\u0648\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u062f\u0631 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634 \u0627\u0632 127.0.2651.74 \u0627\u06cc\u0646 \u0645\u0631\u0648\u0631\u06af\u0631 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647\u200c\u0627\u0646\u062f.\n\n\u062a\u0648\u0635\u06cc\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc:\n- \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0641\u0648\u0631\u06cc: \u0628\u0631\u0627\u06cc \u0631\u0641\u0639 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u060c \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0628\u0627\u06cc\u062f \u0647\u0631\u0686\u0647 \u0633\u0631\u06cc\u0639\u200c\u062a\u0631 \u0628\u0647 \u0646\u0633\u062e\u0647 127.0.2651.74 \u06cc\u0627 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u062c\u062f\u06cc\u062f\u062a\u0631 Microsoft Edge \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u06a9\u0646\u0646\u062f.\n- \u0627\u0639\u062a\u0628\u0627\u0631\u0633\u0646\u062c\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631: \u0642\u0628\u0644 \u0627\u0632 \u0646\u0635\u0628 \u0647\u0631 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc\u060c \u0628\u0647 \u0648\u06cc\u0698\u0647 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u060c \u062d\u062a\u0645\u0627\u064b \u0635\u062d\u062a \u0648 \u0627\u0635\u0627\u0644\u062a \u0622\u0646 \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0648\u0628\u200c\u0633\u0627\u06cc\u062a \u0631\u0633\u0645\u06cc \u0641\u0631\u0648\u0634\u0646\u062f\u0647 \u062a\u0623\u06cc\u06cc\u062f \u06a9\u0646\u06cc\u062f.\n\n\u062c\u0632\u0626\u06cc\u0627\u062a \u0641\u0646\u06cc: \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647\u200c\u0647\u0627\u06cc CVE-2024-6988 \u062a\u0627 CVE-2024-7005\u060c CVE-2024-38103 \u0648 CVE-2024-39379 \u0634\u0646\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f \u0648 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0634\u062f\u062a \u0628\u0627\u0644\u0627\u06cc \u062e\u0637\u0631\u060c \u0646\u06cc\u0627\u0632\u0645\u0646\u062f \u062a\u0648\u062c\u0647 \u0648\u06cc\u0698\u0647 \u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0647\u0633\u062a\u0646\u062f.\n\n\ud83d\udd17 \u062c\u0647\u062a \u0645\u0637\u0627\u0644\u0639\u0647 \u0627\u062f\u0627\u0645\u0647 \u0645\u0642\u0627\u0644\u0647 \u0628\u0647 \u0627\u06cc\u0646 \u0633\u0627\u06cc\u062a \u0645\u0631\u0627\u062c\u0639\u0647 \u06a9\u0646\u06cc\u062f:\n\n\ud83c\udf10 https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20240726\n\n\ud83d\udccd Critical Vulnerabilities in Microsoft Edge: Urgent Update Required\n\nThe Microsoft Edge browser has recently been exposed to several severe vulnerabilities that could lead to severe consequences such as denial of service, remote execution of malicious code, and disclosure of sensitive user information. These vulnerabilities have been identified in versions prior to 127.0.2651.74 of the browser.\n\nSecurity Recommendations:\n- Immediate Update: Users should update to version 127.0.2651.74 or later of Microsoft Edge as soon as possible to address these vulnerabilities.\n- Software Validation: Before installing any software, especially updates, ensure its authenticity and validity through the official vendor's website.\n\nTechnical Details: These vulnerabilities are identified by CVE-2024-6988 through CVE-2024-7005, CVE-2024-38103, and CVE-2024-39379. Due to their high severity, they require special attention from cybersecurity experts.\n\n\ud83d\udd17 To read the full article, visit:\n\n\ud83c\udf10 https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20240726", "creation_timestamp": "2024-07-31T14:40:48.000000Z"}, {"uuid": "94f4af81-a1f7-4206-a63c-b8623e1bdc16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7005", "type": "seen", "source": "https://t.me/cvedetector/2602", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7005 - Google Chrome UI Gesture Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-7005 \nPublished : Aug. 6, 2024, 4:15 p.m. | 36\u00a0minutes ago \nDescription : Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a malicious file. (Chromium security severity: Low) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-06T19:12:05.000000Z"}]}