<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T08:58:46.627072+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/6e5ef5eb-0ff7-4bc7-8cd1-b4e862089f7c/export</id>
    <title>6e5ef5eb-0ff7-4bc7-8cd1-b4e862089f7c</title>
    <updated>2026-05-04T08:58:47.012819+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6e5ef5eb-0ff7-4bc7-8cd1-b4e862089f7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40156", "type": "seen", "source": "https://t.me/cibsecurity/28924", "content": "\u203c CVE-2021-40156 \u203c\n\nA maliciously crafted DWG file in Autodesk Navisworks 2019, 2020, 2021, 2022 can be forced to write beyond allocated boundaries when parsing the DWG files. This vulnerability can be exploited to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-15T20:22:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6e5ef5eb-0ff7-4bc7-8cd1-b4e862089f7c/export"/>
    <published>2021-09-15T20:22:12+00:00</published>
  </entry>
</feed>
