<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T15:21:40.676506+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/47c4ed23-f6ec-44ba-b7f9-20a758578e9c/export</id>
    <title>47c4ed23-f6ec-44ba-b7f9-20a758578e9c</title>
    <updated>2026-05-05T15:21:40.988785+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "47c4ed23-f6ec-44ba-b7f9-20a758578e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27036", "type": "seen", "source": "https://t.me/cibsecurity/26033", "content": "\u203c CVE-2021-27036 \u203c\n\nA maliciously crafted PDF, PICT or TIFF file can be used to write beyond the allocated buffer while parsing PDF, PICT or TIFF files in Autodesk 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-09T18:14:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/47c4ed23-f6ec-44ba-b7f9-20a758578e9c/export"/>
    <published>2021-07-09T18:14:56+00:00</published>
  </entry>
</feed>
