<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T17:23:46.651915+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/834ebe40-72ec-4381-843b-4461cb90c79a/export</id>
    <title>834ebe40-72ec-4381-843b-4461cb90c79a</title>
    <updated>2026-04-30T17:23:47.027910+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "834ebe40-72ec-4381-843b-4461cb90c79a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21148", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/834ebe40-72ec-4381-843b-4461cb90c79a/export"/>
    <published>2021-11-20T09:53:52+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d12753ef-ae04-4438-aed0-0af6fd3e5aee/export</id>
    <title>d12753ef-ae04-4438-aed0-0af6fd3e5aee</title>
    <updated>2026-04-30T17:23:47.027857+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d12753ef-ae04-4438-aed0-0af6fd3e5aee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21141", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2985", "content": "#exploit\nCVE-2021-21123, CVE-2021-21129, CVE-2021-21130, CVE-2021-21131, CVE-2021-21141:\nGoogle Chrome File System Access API vulnerabilities\nhttps://github.com/Puliczek/CVE-2021-21123-PoC-Google-Chrome", "creation_timestamp": "2022-07-04T20:50:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d12753ef-ae04-4438-aed0-0af6fd3e5aee/export"/>
    <published>2022-07-04T20:50:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/02427923-3848-4c6b-975c-a7ac071af490/export</id>
    <title>02427923-3848-4c6b-975c-a7ac071af490</title>
    <updated>2026-04-30T17:23:47.027802+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "02427923-3848-4c6b-975c-a7ac071af490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21148", "type": "seen", "source": "https://t.me/arpsyndicate/1006", "content": "#ExploitObserverAlert\n\nCVE-2021-21148\n\nDESCRIPTION: Exploit Observer has 18 entries related to CVE-2021-21148. Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\nFIRST-EPSS: 0.019330000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-03T19:05:52.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/02427923-3848-4c6b-975c-a7ac071af490/export"/>
    <published>2023-12-03T19:05:52+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/db8adfbc-2408-45aa-a7cb-26b52df45b87/export</id>
    <title>db8adfbc-2408-45aa-a7cb-26b52df45b87</title>
    <updated>2026-04-30T17:23:47.027751+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "db8adfbc-2408-45aa-a7cb-26b52df45b87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21141", "type": "seen", "source": "MISP/45220254-d37d-4ca6-bd1b-8fd75bdd19f3", "content": "", "creation_timestamp": "2024-11-14T06:08:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/db8adfbc-2408-45aa-a7cb-26b52df45b87/export"/>
    <published>2024-11-14T06:08:20+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/27cab4c9-94c8-44b7-9011-012c3870e2d6/export</id>
    <title>27cab4c9-94c8-44b7-9011-012c3870e2d6</title>
    <updated>2026-04-30T17:23:47.027698+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "27cab4c9-94c8-44b7-9011-012c3870e2d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21148", "type": "seen", "source": "MISP/1122b900-e4ba-4aaa-8ce3-cc7fc447cb31", "content": "", "creation_timestamp": "2024-11-14T06:08:25.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/27cab4c9-94c8-44b7-9011-012c3870e2d6/export"/>
    <published>2024-11-14T06:08:25+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e0119e31-67a3-4215-b09b-2753ae600bec/export</id>
    <title>e0119e31-67a3-4215-b09b-2753ae600bec</title>
    <updated>2026-04-30T17:23:47.027645+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e0119e31-67a3-4215-b09b-2753ae600bec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21148", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971073", "content": "", "creation_timestamp": "2024-12-24T20:23:52.189049Z"}</content>
    <link href="https://db.gcve.eu/sighting/e0119e31-67a3-4215-b09b-2753ae600bec/export"/>
    <published>2024-12-24T20:23:52.189049+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b4e02d45-9fff-4c76-a079-ce439efeb26d/export</id>
    <title>b4e02d45-9fff-4c76-a079-ce439efeb26d</title>
    <updated>2026-04-30T17:23:47.027590+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b4e02d45-9fff-4c76-a079-ce439efeb26d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21148", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b4e02d45-9fff-4c76-a079-ce439efeb26d/export"/>
    <published>2025-02-23T02:09:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3e7d27c0-c8b7-4742-bb63-ca4d60c7d07d/export</id>
    <title>3e7d27c0-c8b7-4742-bb63-ca4d60c7d07d</title>
    <updated>2026-04-30T17:23:47.027511+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3e7d27c0-c8b7-4742-bb63-ca4d60c7d07d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21148", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/c7343d52-dd13-4321-947f-fb29745f05d2", "content": "", "creation_timestamp": "2026-02-02T12:28:45.196492Z"}</content>
    <link href="https://db.gcve.eu/sighting/3e7d27c0-c8b7-4742-bb63-ca4d60c7d07d/export"/>
    <published>2026-02-02T12:28:45.196492+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/97fa966a-1b03-4dea-914c-89a08bd32c04/export</id>
    <title>97fa966a-1b03-4dea-914c-89a08bd32c04</title>
    <updated>2026-04-30T17:23:47.023922+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "97fa966a-1b03-4dea-914c-89a08bd32c04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21148", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/c7343d52-dd13-4321-947f-fb29745f05d2", "content": "", "creation_timestamp": "2026-02-02T12:28:45.196492Z"}</content>
    <link href="https://db.gcve.eu/sighting/97fa966a-1b03-4dea-914c-89a08bd32c04/export"/>
    <published>2026-02-02T12:28:45.196492+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4af479bc-cb59-4d42-863f-0e09fd8f6f2c/export</id>
    <title>4af479bc-cb59-4d42-863f-0e09fd8f6f2c</title>
    <updated>2026-04-30T17:23:47.018986+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "4af479bc-cb59-4d42-863f-0e09fd8f6f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-21148", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=548", "content": "", "creation_timestamp": "2026-03-17T14:55:01.571377Z"}</content>
    <link href="https://db.gcve.eu/sighting/4af479bc-cb59-4d42-863f-0e09fd8f6f2c/export"/>
    <published>2026-03-17T14:55:01.571377+00:00</published>
  </entry>
</feed>
