<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T22:44:38.944009+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/3fe8b36a-73bd-4810-8e20-cc660415a3ba/export</id>
    <title>3fe8b36a-73bd-4810-8e20-cc660415a3ba</title>
    <updated>2026-05-08T22:44:39.514260+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3fe8b36a-73bd-4810-8e20-cc660415a3ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27045", "type": "seen", "source": "https://t.me/cibsecurity/28920", "content": "\u203c CVE-2021-27045 \u203c\n\nA maliciously crafted PDF file in Autodesk Navisworks 2019, 2020, 2021, 2022 can be forced to read beyond allocated boundaries when parsing the PDF file. This vulnerability can be exploited to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-15T20:22:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3fe8b36a-73bd-4810-8e20-cc660415a3ba/export"/>
    <published>2021-09-15T20:22:06+00:00</published>
  </entry>
</feed>
