<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T11:47:59.548541+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/b1865bcc-0c3c-46cf-9391-8a8cc54dd675/export</id>
    <title>b1865bcc-0c3c-46cf-9391-8a8cc54dd675</title>
    <updated>2026-05-07T11:47:59.899915+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b1865bcc-0c3c-46cf-9391-8a8cc54dd675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45335", "type": "seen", "source": "https://t.me/cibsecurity/34671", "content": "\u203c CVE-2021-45335 \u203c\n\nSandbox component in Avast Antivirus prior to 20.4 has an insecure permission which could be abused by local user to control the outcome of scans, and therefore evade detection or delete arbitrary system files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-27T16:23:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b1865bcc-0c3c-46cf-9391-8a8cc54dd675/export"/>
    <published>2021-12-27T16:23:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5cd353f7-0ac4-4cf8-93e5-86812dd27e0f/export</id>
    <title>5cd353f7-0ac4-4cf8-93e5-86812dd27e0f</title>
    <updated>2026-05-07T11:47:59.898708+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5cd353f7-0ac4-4cf8-93e5-86812dd27e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45335", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7732", "content": "#exploit\n1. CVE-2021-45335, CVE-2021-45336, CVE-2021-45337:\nEoP from Everyone through Avast Sandbox to System AmPPL\nhttps://the-deniss.github.io/posts/2023/02/09/elevation-of-privileges-from-everyone-through-avast-av-sandbox-to-system-amppl.html\n\n2. CVE-2023-21746:\nThe LocalPotato attack - type of NTLM reflection attack that targets local authentication\nhttps://github.com/decoder-it/LocalPotato", "creation_timestamp": "2023-02-14T04:50:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5cd353f7-0ac4-4cf8-93e5-86812dd27e0f/export"/>
    <published>2023-02-14T04:50:02+00:00</published>
  </entry>
</feed>
