<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T15:21:41.613018+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/7ae2c99f-7ff8-43ec-b57a-d71949c3ad65/export</id>
    <title>7ae2c99f-7ff8-43ec-b57a-d71949c3ad65</title>
    <updated>2026-05-05T15:21:42.032456+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7ae2c99f-7ff8-43ec-b57a-d71949c3ad65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27035", "type": "seen", "source": "https://t.me/cibsecurity/26032", "content": "\u203c CVE-2021-27035 \u203c\n\nA maliciously crafted TIFF, PDF, PICT or DWF files in Autodesk 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PDF, PICT or DWF files. This vulnerability can be exploited to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-09T18:14:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7ae2c99f-7ff8-43ec-b57a-d71949c3ad65/export"/>
    <published>2021-07-09T18:14:55+00:00</published>
  </entry>
</feed>
