<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T08:43:02.092192+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ba40f523-86ae-4735-a1ad-1067dcb0063e/export</id>
    <title>ba40f523-86ae-4735-a1ad-1067dcb0063e</title>
    <updated>2026-05-05T08:43:02.635451+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ba40f523-86ae-4735-a1ad-1067dcb0063e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "seen", "source": "https://t.me/cibsecurity/30644", "content": "\u203c CVE-2021-40724 \u203c\n\nAcrobat Reader for Android versions 21.8.0 (and earlier) are affected by a Path traversal vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-15T18:28:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ba40f523-86ae-4735-a1ad-1067dcb0063e/export"/>
    <published>2021-10-15T18:28:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dc41ffb2-92e2-41a6-b41e-cd34ac7e97d4/export</id>
    <title>dc41ffb2-92e2-41a6-b41e-cd34ac7e97d4</title>
    <updated>2026-05-05T08:43:02.635387+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dc41ffb2-92e2-41a6-b41e-cd34ac7e97d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8594", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 RCE in Adobe Acrobat Reader For Android (CVE-2021-40724).\n\nhttps://hulkvision.github.io/blog/post1/", "creation_timestamp": "2022-01-16T07:02:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dc41ffb2-92e2-41a6-b41e-cd34ac7e97d4/export"/>
    <published>2022-01-16T07:02:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7384e44b-9073-415f-ad06-c432e3aee60a/export</id>
    <title>7384e44b-9073-415f-ad06-c432e3aee60a</title>
    <updated>2026-05-05T08:43:02.635316+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7384e44b-9073-415f-ad06-c432e3aee60a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5215", "content": "#exploit\n1. CVE-2021-40724:\nRCE in Adobe Acrobat Reader for Android\nhttps://hulkvision.github.io/blog/post1\n\n2. CVE-2021-32648:\nOctoberCMS &amp;lt; 1.0.472 - Auth Bypass\nhttps://github.com/Immersive-Labs-Sec/CVE-2021-32648", "creation_timestamp": "2022-01-21T06:24:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7384e44b-9073-415f-ad06-c432e3aee60a/export"/>
    <published>2022-01-21T06:24:19+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/22e275b8-0a71-4890-bf0f-9d5b009d6379/export</id>
    <title>22e275b8-0a71-4890-bf0f-9d5b009d6379</title>
    <updated>2026-05-05T08:43:02.635112+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "22e275b8-0a71-4890-bf0f-9d5b009d6379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1421", "content": "RCE in Adobe Acrobat Reader for Android (CVE-2021-40724)\nanalysis: https://hulkvision.github.io/blog/post1/", "creation_timestamp": "2022-02-18T10:41:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/22e275b8-0a71-4890-bf0f-9d5b009d6379/export"/>
    <published>2022-02-18T10:41:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6633b72e-3e5b-410b-984c-3d9aa369a352/export</id>
    <title>6633b72e-3e5b-410b-984c-3d9aa369a352</title>
    <updated>2026-05-05T08:43:02.634815+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6633b72e-3e5b-410b-984c-3d9aa369a352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1422", "content": "Here is exploitation flow of RCE in Adobe Acrobat Reader for Android (CVE-2021-40724)", "creation_timestamp": "2022-09-09T04:38:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6633b72e-3e5b-410b-984c-3d9aa369a352/export"/>
    <published>2022-09-09T04:38:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4d17bb9a-485a-40c2-af35-e9ef09957e21/export</id>
    <title>4d17bb9a-485a-40c2-af35-e9ef09957e21</title>
    <updated>2026-05-05T08:43:02.633412+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4d17bb9a-485a-40c2-af35-e9ef09957e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "Telegram/Y8KZH4iKLZNDV3OzlQacoZkHsOa4lWcU2LYqypPFXeeVEl4", "content": "", "creation_timestamp": "2025-06-15T21:00:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4d17bb9a-485a-40c2-af35-e9ef09957e21/export"/>
    <published>2025-06-15T21:00:05+00:00</published>
  </entry>
</feed>
