<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T06:04:01.486979+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/a3f2a89c-1b45-4e2c-aaee-da16d0e1bb74/export</id>
    <title>a3f2a89c-1b45-4e2c-aaee-da16d0e1bb74</title>
    <updated>2026-05-05T06:04:01.865731+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a3f2a89c-1b45-4e2c-aaee-da16d0e1bb74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-V95C-P5HM-XQ8F", "type": "seen", "source": "https://t.me/BlueRedTeam/1289", "content": "#exploit\n1. CVE-2021-43784:\nrunc/libcontainer - insecure handling of bind mount sources\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2241\n]-&amp;gt; https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f\n\n2. CVE-2021-1048:\nrefcount increment on mid-destruction file\nhttps://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2021/CVE-2021-1048.html\n\n@BlueRedTeam", "creation_timestamp": "2021-12-07T09:32:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a3f2a89c-1b45-4e2c-aaee-da16d0e1bb74/export"/>
    <published>2021-12-07T09:32:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b63a18cc-3f03-443f-9958-dbefd23eeae2/export</id>
    <title>b63a18cc-3f03-443f-9958-dbefd23eeae2</title>
    <updated>2026-05-05T06:04:01.863428+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b63a18cc-3f03-443f-9958-dbefd23eeae2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-V95C-P5HM-XQ8F", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4922", "content": "#exploit\n1. CVE-2021-43784:\nrunc/libcontainer - insecure handling of bind mount sources\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2241\n]-&amp;gt; https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f\n\n2. CVE-2021-1048:\nrefcount increment on mid-destruction file\nhttps://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2021/CVE-2021-1048.html", "creation_timestamp": "2021-12-07T15:16:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b63a18cc-3f03-443f-9958-dbefd23eeae2/export"/>
    <published>2021-12-07T15:16:34+00:00</published>
  </entry>
</feed>
